Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Assignment 1

Overview

Throughout this class we will use 2 Virtual machines.

One machine will act as the attacker machine one machine will be the victim machine. This will allow us to practice in a controlled environment, if you do not follow the instructions this can lead to your account being banned on Fordham's Network.

Requirements

• The lab prep lab must have been completed before proceeding

• Ensure both network adapters on Kali and the Metasploitable virtual machines are set to a private network or host only network depending on your virtual

o This ensures the traffic never leaves your laptop
o Remember Fordham's network does have security systems which can flag your machine for malicious activity

• Metasploitable will be referred to as the target

• Document the IP addresses of each system

o Kali -
o Metasploitable -

• Only run these commands against your target machine metasploitable!

• Scanning Fordham's network will get you blocked.

• Use NMAP Commands from the presentation to complete the lab

Tasks

• Preform and document the steps outlined below
• Use the technical documentation examples as inspiration for formatting of the lab document
• Reflection should be at least one page long

Design

1617_Design.jpg

NMAP Basics

1. Perform a SYN Scan
2. Preform a Connect Scan
3. Perform an XMAS Tree Scan
4. Scan the system to discover operating system
5. Run a scan to show service version
6. Run a scan using the text list option
7. Run the banner script
8. Output the results to a text file
9. Grep those results to find open ports
10. Run 3 more different scans and document the results

Information Gathering

• Which ports are open on the target?
• What version of SSH is the target running?
• What version of FTP is the target running?
• What is port 5900 used for on the target?
• What OS is running on the target?
• How could you run stealth scan on the target?
• What is some other information you gathered from NMAP

Reflection

• Why would you want to detect NMAP activity on your network?
• How can NMAP be used to troubleshoot?
• Why is this tool useful from a network perspective?
• Why is this tool useful from a security perspective?

Assignment 2

Overview

The following lab will require the use of wireshark to show proficiency in network traffic analysis. Document the instructions and analysis outlined below. Complete all tasks below, provide explanation on how you identified your answers.

You should write a report responding and explain all questions and points outlined below. Screenshots should be used but sparingly and only of the relevant information not your whole desktop.

Accessing wireshark in SecOnion - Terminal wireshark

Task 1:

Instructions

• Start a wireshark capture
• Navigate to an HTTP Site (non HTTPS)
• Stop the capture

Analysis

• Create a filter for all HTTP Traffic

o What is the user agent string used?
o Was TCP or UDP used to communicate to google?
o What HTTP methods were used in the traffic?
o Use a TCP stream to view the images transferred

• Create a filter for all DNS Traffic

o Provide a screenshot of the response for the DNS request
o Was TCP or UDP used to communicate to google?
o What was the DNS server that was queried?

• Create a filter for ARP Traffic

o Why did this occur?

• Identify the three way handshake

o Show which TCP flags were used

Task 2:

Instructions

• Start a wireshark capture
• run the ping command to yahoo.com
• Stop the capture

Analysis

• Create a filter to display ICMP traffic
• What ICMP codes were used?

Task 3:

This is a capture of a client connecting to a simple HTTP webpage.

Instructions

• Open the BasicHTTPTraffic.pcap into wireshark

Analysis

• What is the OS and Web architecture used on the server?

• Follow the HTTP Stream

o What is the title of the page that was visited?

• Why doesn't this capture have any ARP Packets?

Task 4:

This is a capture of a telnet communication to a server

Instructions

• Open the telnet-raw.pcap into wireshark
• Filter on telnet
• Follow the TCP stream

Analysis

• What is the login username?
• What is the password?
• What Warning was issued?
• What OS is the server?
• When was the last login?
• What site was pinged?
• How many packets were transmitted in the ping?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M92581121

Have any Question?


Related Questions in Computer Network & Security

Data communications and networks assignment -aim a library

Data Communications and Networks Assignment - Aim: A library research and industry related project is to be carried out on a topic of your choice. The project topic must be related to Data Communications and Networking. ...

Question 12326 packet tracer - configuring pap and chap

Question 1 2.3.2.6 Packet Tracer - Configuring PAP and CHAP Authentication Submit your answer as Q1.pka Question 2 2.5.1.2 Packet Tracer - Skills Integration Challenge Submit your answer as Q2.pka Question 3 3.4.2.4 Pack ...

Americans purchase a lot of coffee grown in brazil and

Americans purchase a lot of coffee grown in Brazil and elsewhere in Latin America. It would seem that in order to avoid the huge transportation costs of bringing coffee here and to provide jobs for Americans, we should g ...

With smaller companies saving thousands and larger

With smaller companies saving thousands and larger companies saving billions through flexible manufacturing, if you are a discrete parts manufacturer seeking to be more lean, it is important to consider whether this migh ...

Suppose that serendipity bank has excess reserves of 12000

Suppose that Serendipity Bank has excess reserves of $12,000 and check able deposits of $150,000. If the reserve ratio is 20 percent, what is the size of the bank's actual reserves?

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

Part - athe assignmentwrite a critique review of the

Part - A The assignment Write a critique / review of the following paper: Mark Pollitt Eoghan Casey David-Olivier Jaquet-Chiffelle Pavel Gladyshev, "A Framework for Harmonizing Forensic Science Practices and Digital/Mult ...

Content analysis assignmentoverviewthis assignment has

Content Analysis Assignment Overview This assignment has three major aims: - To help students gain good understanding of all ITECH1102 theoretical and practical material. - To encourage students to use content analysis s ...

The abstract should not be more than 250 words describe

The abstract should not be more than 250 words. Describe your project, focusing on research questions and research method for next stage of the project. 1. Introduction [The introduction should describe what the project ...

Wireless networks and security assignment - design and

Wireless Networks and Security Assignment - Design and implementation of secure enterprise wireless network Purpose of the assessment - The purpose of this assignment is to design and implement a secure enterprise wirele ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As