MendozaGuerrero_L_1.5.3.6

docx

School

Greenville Technical College *

*We aren’t endorsed by this school

Course

110

Subject

Industrial Engineering

Date

Feb 20, 2024

Type

docx

Pages

16

Uploaded by HighnessFlowerBadger33

Report
GTC IST-110 PT Lab: Communicating in a Cyber World Addressing Table Device Private IP Address Public IP Address Subnet Mask Site FTP / web server 10.44.1.254 209.165.201.3 255.255.255.0 Metropolis Bank HQ E-mail / DNS server 10.44.1.253 209.165.201.4 255.255.255.0 Metropolis Bank HQ NTP / AAA server 10.44.1.252 209.165.201.5 255.255.255.0 Metropolis Bank HQ File backup server 10.44.2.254 N / A 255.255.255.0 Gotham Healthcare Branch Objectives Part 1: sending e-mails between users Part 2: Upload and download files via FTP Part 3: remote access to an enterprise router via Telnet Part 4: remote access to an enterprise router via SSH Background / Scenario In this exercise, you are using common network services to communicate across multiple remote networks. The IP address, network configuration and service configurations are already available. You will use client devices in different geographic regions to connect to servers and other client devices. GTC - CPT Dept Page 1 of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World Screenshots (Output) For screenshots (snips) make sure to include enough to determine proper source and/or target devices. This could be via including the name of the PC/Device, the hostname of the networking device (Router or switch) or ipconfig output Example: Ipconfig and Ping (single snip) GTC - CPT Dept Page 2 of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World Example: Wireless Network Status Example: Web Browser GTC - CPT Dept Page 3 of 16 IST 110 Lab
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
GTC IST-110 PT Lab: Communicating in a Cyber World Part 1: Send Email between Users Step 1: Access the email client on Mike’s PC. a. Click the Gotham Healthcare Branch site and then click the PC Mike . b. Click the Desktop tab and then click Email. Step 2: Send an email to Sally. a. Create an email by clicking the Compose button. b. In the To: field, enter the email sally@cisco.corp 1) In the Subject: field, enter the string of text “ Urgent- Call me ”. 2) In the Message section, enter. “ Call me when you are free today to discuss the new sale. Screenshot (below): Email creation GTC - CPT Dept Page 4 of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World c. Click the Send button to transmit the email. d. What protocol was used to send the email to the email server? (spell out acronyms) Simple Mail Transfer Protocol, or SMTP e. Return to the geographic (root) view by clicking on the “back one level” arrow on the right top horizontal menu bar: Step 3: Have Sally check her email. a. Enter the Metropolis Bank HQ site and then click the PC Sally . b. Click the Desktop tab and then click Email. c. Click the Receive button to retrieve the email sent from Mike. GTC - CPT Dept Page 5 of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World Screenshot (below): Email retrieval d. What protocol was used to retrieve the email from the email server? (spell out acronyms) Post Office Protocol , or POP3 Part 2: Upload Files using FTP Step 1: Set the packet sniffer to capture traffic on the correct port. a. Enter the geographic (root) view to see all three remote sites. b. Click the Cyber Criminals Sniffer. c. Click Port1 to capture packets on this port. d. Leave the Cyber Criminal Sniffer open and visible for the rest of this part. GTC - CPT Dept Page 6 of 16 IST 110 Lab
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
GTC IST-110 PT Lab: Communicating in a Cyber World Step 2: Remotely connect to the FTP server. a. Enter the Healthcare at Home site and then click the PC Mary. b. Click the Desktop tab and then click Command Prompt. c. Connect to the FTP/Web server at Metropolis Bank HQ by entering ftp 209.165.201.3 in the command prompt. d. Enter the username of mary and a password = cisco123 Step 3: Upload a file to the FTP server. a. At the ftp> prompt, enter the command dir to view the current files stored on the remote FTP server. b. Mary has a file containing sensitive information regarding new healthcare client information. c. Upload the newclients.txt file to the FTP server by entering the command put newclients.txt d. At the ftp> prompt, enter the command dir and verify the newclients.txt file is now on the FTP server. e. Why is FTP considered an insecure protocol for moving files? (1-2 sentences) Most people think that FTP is not a safe way to move files because it does not encrypt data or login information. This means that brute force attacks can happen. Step 4: Analyze the FTP traffic. a. Enter the geographic (root) view to see all three remote sites. b. Click the Cyber Criminals Sniffer. c. Under the GUI tab on the left, click the 1st FTP packet available to select it. d. Then scroll down to the bottom of the window displayed on the right. e. What information is displayed in clear text from the FTP header? GTC - CPT Dept Page 7 of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World Screenshot (below): FTP Command and Argument f. On the left, click the 2nd FTP packet available to select it. Then scroll down to the bottom of the window displayed on the right. What is displayed on the FPT header? GTC - CPT Dept Page 8 of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World Screenshot (below): FTP Command and Argument (2 nd entry) g. Do this again for the 3rd FTP packet. h. Continue looking at the FTP Command headers on additional packets in the Cyber Sniffer. i. Besides the username, what other sensitive information is displayed in clear text from the FTP header? (be descriptive) Along with the username, the password is shown in plain text, along with the file that was sent to the server. Part 3: Remotely Access an Enterprise Router Using Telnet Step 1: Remotely connect to an enterprise router. a. Enter the Healthcare at Home site and then click on the PC Dave. b. Click the Desktop tab and then click Command Prompt. c. Ping the enterprise router using the command ping 209.165.201.2 to verify reachability GTC - CPT Dept Page 9 of 16 IST 110 Lab
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
GTC IST-110 PT Lab: Communicating in a Cyber World Screenshot (below): output of ipconfig and ping command d. Use the command telnet 209.165.201.2 to telnet to the IP address of the enterprise router. e. Authenticate to the enterprise router with the username of admin and the password = cisco123 GTC - CPT Dept Page 10 of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World Screenshot (below): telnet connection (once completed) f. Use the command show users to view the active Telnet connection to the enterprise router. GTC - CPT Dept Page 11 of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World Screenshot (below): show users output g. Why is Telnet considered an insecure protocol for remotely managing a device? (1-2 sentences) This is the same as FTP: Telnet does not encrypt credentials. Someone could get a hold of an employee's login information and use it to steal their identity and access to the server. h. Re-review the Cyber Sniffer logs i. What observation can you make from reviewing the Cyber Sniffer logs from the Telnet Packets? (you may need to review them all) (3-4 sentences) Each letter is sent by a separate Telnet packet. In FTP, all the user's input for GTC - CPT Dept Page 12 of 16 IST 110 Lab
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
GTC IST-110 PT Lab: Communicating in a Cyber World each line was contained in a single packet. In Telnet, however, each packet only has one letter. Part 4: Remotely Access an Enterprise Router Using SSH Step 1: Remotely connect to an enterprise router. a. Enter the Gotham Healthcare Branch site and then click the PC Tim. b. Click the Desktop tab and then click Command Prompt. c. Ping the enterprise router using the command ping 209.165.201.2 to verify reachability. Screenshot (below): output of ipconfig and ping command d. d. Use the command ssh -l admin 209.165.201.2 to SSH to the IP address of the enterprise router. Note: that the ssh command uses the dash symbol and a lowercase L GTC - CPT Dept Page 13 of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World e. Authenticate to the enterprise router with the password = cisco123 Screenshot (below): ssh connection (once completed) f. Use the command show users to view the active SSH connection to the enterprise router. GTC - CPT Dept Page 14 of 16 IST 110 Lab
GTC IST-110 PT Lab: Communicating in a Cyber World Screenshot (below): show users output g. Why is SSH considered a secure protocol for remotely managing a device? (1-2 sentences) Given that traffic over SSH is private. Everything that is sent over SSH is encrypted, even passwords and actions. h. Enter the global configuration mode using configure terminal command. Type: config t i. Create an enable secret password of cisco with the command enable secret cisco j. Exit configuration mode by typing the command exit k. View the running configuration of the HQ_Router by typing the command show run l. Re-review the Cyber Sniffer logs m. What observation can you make from reviewing the Cyber Sniffer logs from the SSH Packets? (you may need to review all logs during the ssh connection) (3-4 sentences) This is all that the SSH packets show: "Encrypted Data." That's all the GTC - CPT Dept Page 15 of 16 IST 110 Lab
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
GTC IST-110 PT Lab: Communicating in a Cyber World information that the packet sniffer can get. An attacker would have a hard time breaking this encryption, which would stop a cyberattack. n. Does it go against what you expected for SSH communications? Explain your findings (3-4 sentences) No, this is what I thought SSH would show me. SSH, compared to FTP or Telnet, encrypts all data to keep it safe. With those protocols, it's easy to quickly get all the login information you need and use a packet sniffer to see what the user is doing. SSH, on the other hand, doesn't give out such private information. GTC - CPT Dept Page 16 of 16 IST 110 Lab