MendozaGuerrero_L_1.5.3.6
docx
keyboard_arrow_up
School
Greenville Technical College *
*We aren’t endorsed by this school
Course
110
Subject
Industrial Engineering
Date
Feb 20, 2024
Type
docx
Pages
16
Uploaded by HighnessFlowerBadger33
GTC IST-110 PT Lab: Communicating in a Cyber World
Addressing Table
Device
Private IP
Address
Public IP Address
Subnet Mask
Site
FTP / web server
10.44.1.254
209.165.201.3
255.255.255.0
Metropolis Bank HQ
E-mail / DNS server
10.44.1.253
209.165.201.4
255.255.255.0
Metropolis Bank HQ
NTP / AAA server
10.44.1.252
209.165.201.5
255.255.255.0
Metropolis Bank HQ
File backup server
10.44.2.254
N / A
255.255.255.0
Gotham Healthcare Branch
Objectives
Part 1: sending e-mails between users
Part 2: Upload and download files via FTP
Part 3: remote access to an enterprise router via Telnet
Part 4: remote access to an enterprise router via SSH
Background / Scenario
In this exercise, you are using common network services to communicate across multiple remote networks. The IP address, network configuration and service configurations are already available. You will use client devices in different geographic regions to connect to servers and other client devices.
GTC - CPT Dept
Page 1
of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World
Screenshots (Output)
For screenshots (snips) make sure to include enough to determine proper source and/or target devices. This could be via including the name of the PC/Device, the hostname of the networking device (Router or switch) or ipconfig output
Example: Ipconfig and Ping (single snip)
GTC - CPT Dept
Page 2
of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World
Example: Wireless Network Status
Example: Web Browser
GTC - CPT Dept
Page 3
of 16 IST 110 Lab
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
GTC IST-110 PT Lab: Communicating in a Cyber World
Part 1:
Send Email between Users
Step 1:
Access the email client on Mike’s PC.
a.
Click the Gotham Healthcare Branch site and then click the PC Mike
.
b.
Click the Desktop tab and then click Email.
Step 2:
Send an email to Sally.
a.
Create an email by clicking the Compose button.
b.
In the To: field, enter the email sally@cisco.corp
1)
In the Subject: field, enter the string of text “
Urgent- Call me
”.
2)
In the Message section, enter. “
Call me when you are free today to discuss the new sale.
”
Screenshot (below): Email creation
GTC - CPT Dept
Page 4
of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World
c.
Click the Send button to transmit the email.
d.
What protocol was used to send the email to the email server? (spell out acronyms)
Simple Mail Transfer Protocol, or SMTP
e.
Return to the geographic (root) view by clicking on the “back one level” arrow on the right top horizontal menu bar:
Step 3:
Have Sally check her email.
a.
Enter the Metropolis Bank HQ site and then click the PC Sally
.
b.
Click the Desktop tab and then click Email.
c.
Click the Receive button to retrieve the email sent from Mike.
GTC - CPT Dept
Page 5
of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World
Screenshot (below): Email retrieval
d.
What protocol was used to retrieve the email from the email server? (spell out acronyms)
Post Office Protocol , or POP3
Part 2:
Upload Files using FTP Step 1:
Set the packet sniffer to capture traffic on the correct port. a.
Enter the geographic (root) view to see all three remote sites. b.
Click the Cyber Criminals Sniffer. c.
Click Port1
to capture packets on this port. d.
Leave the Cyber Criminal Sniffer open and visible for the rest of this part. GTC - CPT Dept
Page 6
of 16 IST 110 Lab
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
GTC IST-110 PT Lab: Communicating in a Cyber World
Step 2:
Remotely connect to the FTP server. a.
Enter the Healthcare at Home site and then click the PC Mary. b.
Click the Desktop tab and then click Command Prompt. c.
Connect to the FTP/Web server at Metropolis Bank HQ by entering ftp 209.165.201.3
in the command prompt. d.
Enter the username of mary
and a password = cisco123
Step 3:
Upload a file to the FTP server. a.
At the ftp>
prompt, enter the command dir
to view the current files stored on the remote FTP server. b.
Mary has a file containing sensitive information regarding new healthcare client information. c.
Upload the newclients.txt file to the FTP server by entering the command put newclients.txt
d.
At the ftp>
prompt, enter the command dir
and verify the newclients.txt file is now on the FTP server. e.
Why is FTP considered an insecure protocol for moving files? (1-2 sentences)
Most people think that FTP is not a safe way to move files because it does not encrypt data or login information. This means that brute force attacks can happen.
Step 4:
Analyze the FTP traffic. a.
Enter the geographic (root) view to see all three remote sites. b.
Click the Cyber Criminals Sniffer. c.
Under the GUI tab on the left, click the 1st FTP packet available to select it. d.
Then scroll down to the bottom of the window displayed on the right. e.
What information is displayed in clear text from the FTP header? GTC - CPT Dept
Page 7
of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World
Screenshot (below): FTP Command and Argument
f.
On the left, click the 2nd FTP packet available to select it. Then scroll down to the bottom of the window displayed on the right. What is displayed on the FPT header?
GTC - CPT Dept
Page 8
of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World
Screenshot (below): FTP Command and Argument (2
nd
entry)
g.
Do this again for the 3rd FTP packet. h.
Continue looking at the FTP Command headers on additional packets in the Cyber Sniffer.
i.
Besides the username, what other sensitive information is displayed in clear text from the FTP header? (be descriptive)
Along with the username, the password is shown in plain text, along with the
file that was sent to the server.
Part 3:
Remotely Access an Enterprise Router Using Telnet Step 1:
Remotely connect to an enterprise router. a.
Enter the Healthcare at Home site and then click on the PC Dave. b.
Click the Desktop tab and then click Command Prompt. c.
Ping the enterprise router using the command ping 209.165.201.2 to verify reachability
GTC - CPT Dept
Page 9
of 16 IST 110 Lab
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
GTC IST-110 PT Lab: Communicating in a Cyber World
Screenshot (below): output of ipconfig and ping command
d.
Use the command telnet 209.165.201.2
to telnet to the IP address of the enterprise router. e.
Authenticate to the enterprise router with the username of admin and the password = cisco123
GTC - CPT Dept
Page 10
of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World
Screenshot (below): telnet connection (once completed)
f.
Use the command show users
to view the active Telnet connection to the enterprise router. GTC - CPT Dept
Page 11
of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World
Screenshot (below): show users output
g.
Why is Telnet considered an insecure protocol for remotely managing a device? (1-2 sentences)
This is the same as FTP: Telnet does not encrypt credentials. Someone could get a hold of an employee's login information and use it to steal their identity and access to the server.
h.
Re-review the Cyber Sniffer logs
i.
What observation can you make from reviewing the Cyber Sniffer logs from the Telnet Packets? (you may need to review them all) (3-4 sentences)
Each letter is sent by a separate Telnet packet. In FTP, all the user's input for
GTC - CPT Dept
Page 12
of 16 IST 110 Lab
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
GTC IST-110 PT Lab: Communicating in a Cyber World
each line was contained in a single packet. In Telnet, however, each packet only has one letter.
Part 4:
Remotely Access an Enterprise Router Using SSH Step 1:
Remotely connect to an enterprise router. a.
Enter the Gotham Healthcare Branch site and then click the PC Tim. b.
Click the Desktop tab and then click Command Prompt. c.
Ping the enterprise router using the command ping 209.165.201.2
to verify reachability.
Screenshot (below): output of ipconfig and ping command
d.
d. Use the command ssh -l admin 209.165.201.2
to SSH to the IP address of the enterprise router. Note: that the ssh command uses the dash
symbol and a lowercase L
GTC - CPT Dept
Page 13
of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World
e.
Authenticate to the enterprise router with the password = cisco123
Screenshot (below): ssh connection (once completed)
f.
Use the command show users
to view the active SSH connection to the enterprise router. GTC - CPT Dept
Page 14
of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World
Screenshot (below): show users output
g.
Why is SSH considered a secure protocol for remotely managing a device? (1-2 sentences)
Given that traffic over SSH is private. Everything that is sent over SSH is encrypted, even passwords and actions.
h.
Enter the global configuration mode using configure terminal command. Type: config t
i.
Create an enable secret password of cisco with the command enable secret cisco
j.
Exit configuration mode by typing the command exit
k.
View the running configuration of the HQ_Router
by typing the command
show run
l.
Re-review the Cyber Sniffer logs
m.
What observation can you make from reviewing the Cyber Sniffer logs from the SSH Packets? (you may need to review all logs during the ssh connection) (3-4 sentences)
This is all that the SSH packets show: "Encrypted Data." That's all the GTC - CPT Dept
Page 15
of 16 IST 110 Lab
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
GTC IST-110 PT Lab: Communicating in a Cyber World
information that the packet sniffer can get. An attacker would have a hard time breaking this encryption, which would stop a cyberattack.
n.
Does it go against what you expected for SSH communications? Explain your findings (3-4 sentences)
No, this is what I thought SSH would show me. SSH, compared to FTP or Telnet, encrypts all data to keep it safe. With those protocols, it's easy to quickly get all the login information you need and use a packet sniffer to see
what the user is doing. SSH, on the other hand, doesn't give out such private
information.
GTC - CPT Dept
Page 16
of 16 IST 110 Lab