Answer Sheet-TCP Attack (Part 2)

.docx

School

Utica College *

*We aren’t endorsed by this school

Course

356

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

4

Uploaded by BrigadierJellyfishPerson5726

Report
Answer Sheet: TCP Attack (Part 2) Your Name: Maddie O’Malley Total Points: 65 Task Pt s Questions Your Answer Task 1 15 (1) At this moment, you have known all the IPs. Put the IPs of the VMs to the following table (replacing 10.0.2.A, 10.0.2.S, 10.0.2.C with the real IPs). Copy and paste the entire table to the answer sheet. 1. Attacker Machine “SEEDUbuntu16.04” 10.0.2.6 Server “SEEDServer” 10.0.2.5 Client/Observe r “SEEDClient” 10.0.2.15 5 (2) What is the CIDR representation of the Server IP address? 10.0.2.5/24 5 (3) How can we check if the Attacker VM can reach to the Server VM? Take a screenshot of the command and its output and paste it in the answer sheet. Use ping command
Task 2 5 Step 3: Take a screenshot of the message you got and paste it in the answer sheet. 5 Step 4: (1) Locate the TCP RST/TCP RST ACK packet in your Wireshark capture, select it and take a screenshot of the packet with TCP details (shown above), paste it in the answer sheet. 5 (2) Do you think the TCP RST attack is successful? Briefly explain why in the answer sheet. Yes, the attacker is in the same network as the server (victim) and was able to end the session 5 (3) What is the source IP of the attacking traffic in the network capture?. 10.0.2.5 5 (4) These packets No it does not mean the packets were sent by the real client. The RST packet sent to the client was able to be spoofed because the
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help