Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

On IT - Laptop, scan your local network to determine potential vulnerabilities . Use Zenmap to display the operating systems of devices on the 1

On IT-Laptop, scan your local network to determine potential vulnerabilities . Use Zenmap to display the operating systems of devices on the 192.168.0.0/24 network. Answer Question 1. On ITAdmin, use net view to check for unauthorized shared folders on CorpFiles16 The only authorized shares are Confidential , Departments , and Backup Answer Question 2. On IT-Laptop, simulate a TCP SYN flood attack using hping3 and analyze the packets with Wireshark. Use Wireshark to capture packets on the enp2s0 network interface. Use the filter, tcp.flags.syn , to show just TCP SYN packets. Use hping3 to launch a SYN flood attack against rmksupplies.com . After gathering packets for several seconds , stop the packet capture and cancel the SYN flood attack Examine a TCP SYN packet with the destination address of 208.33.42.28 Answer Question 3. On IT-Laptopfind employees ' personally identifiable information (PII) in clear text via email . Use Wireshark to capture packets on the enp2s0 network interface . Find packets containing the following PII information : Social security numbers ( SSN) Birth dates Mother's maiden name

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Advanced Oracle Solaris 11 System Administration

Authors: Bill Calkins

1st Edition

0133007170, 9780133007176

More Books

Students also viewed these Databases questions