Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

include screenshots with answers to all parts for upvote please pkt_const.py: #!/usr/bin/python3 from scapy.all import * ### ATTENTION ### # Before lauching this program, open

include screenshots with answers to all parts for upvote please image text in transcribed
pkt_const.py:
#!/usr/bin/python3
from scapy.all import *
### ATTENTION ###
# Before lauching this program, open Wireshark and capture the traffic
# Examine how the destination responds to this spoofed packet
#
ip = IP(src='10.0.2.17', dst='10.0.2.19')
udp = UDP(sport=1234, dport=9999)
data = 'Hello World'
pkt = ip/udp/data #build a protocol stack from lower to higher
pkt.show()
send(pkt)
4. IP Spoofing Total: 35 pts In this task, the attacker will conduct an IP spoofing against the server VM by masquerading as the Client. On the Attacker VM, start capturing the network traffic and conduct an experiment for IP spoofing using pkt_const.py and send a packet to a UDP port Helpful wireshark filter: (udp || icmp) && !dns && !dhcp Documentation: a. (15 pts) Present your experiment in a logical manner and with screenshots b. (5 pts) In the UDP packet, what are src MAC, dst MAC, sro IP, and dst IP? c. (5 pts) As a response, the target sends out an packet with and for the Type and the Code field, respectively. d. (5 pts) What protocols are included in the payload of the response packet of the target? Present a screenshot to support your answer. e. (5 pts) Which machine will receive the response packet? How will the response packet be processed? Explain your answer in detail. Present a screenshot to support your answer if the screenshot for the question d is not enough. 4. IP Spoofing Total: 35 pts In this task, the attacker will conduct an IP spoofing against the server VM by masquerading as the Client. On the Attacker VM, start capturing the network traffic and conduct an experiment for IP spoofing using pkt_const.py and send a packet to a UDP port Helpful wireshark filter: (udp || icmp) && !dns && !dhcp Documentation: a. (15 pts) Present your experiment in a logical manner and with screenshots b. (5 pts) In the UDP packet, what are src MAC, dst MAC, sro IP, and dst IP? c. (5 pts) As a response, the target sends out an packet with and for the Type and the Code field, respectively. d. (5 pts) What protocols are included in the payload of the response packet of the target? Present a screenshot to support your answer. e. (5 pts) Which machine will receive the response packet? How will the response packet be processed? Explain your answer in detail. Present a screenshot to support your answer if the screenshot for the question d is not enough

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Readings In Database Systems

Authors: Michael Stonebraker

2nd Edition

0934613656, 9780934613651

More Books

Students also viewed these Databases questions

Question

Explain the strength of acid and alkali solutions with examples

Answered: 1 week ago

Question

Introduce and define metals and nonmetals and explain with examples

Answered: 1 week ago

Question

7. Explain why retirees may be valuable as part-time employees.

Answered: 1 week ago