Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

On ITAdmin, use SMAC to spoof Exec - Laptop's MAC address. MAC address: ( 0 0 : 0 0 : 5 5 : 5 5

On ITAdmin, use SMAC to spoof Exec-Laptop's MAC address.
MAC address: (00:00:55:55:44:62)
Refresh your MAC and IP addresses to match the target machine.
On ITAdmin, run a vulnerability scan to detect any issues with the wireless access controller.
Use the Security Evaluator.
Wireless access controller IP address: 192.168.0.36
Remediate the vulnerabilities found in the vulnerability report using settings of your choice:
Administration console: http://192.168.0.36
Current login credentials:
Username: admin
Password: password
3. On IT-Laptop, simulate a SYN flood attack.
Use Zenmap to find the FTP port on CorpServer (192.168.0.10).
Use Metasploit to send a SYN flood attack using the following parameters:
Remote host: 192.168.0.10
Source host: 192.168.0.43
Set the FTP port to match the FTP port used by CorpServer.
Use Wireshark to capture the SYN flood on the enp2s0 interface.
Filter the SYN packets using host 192.168.0.10 and tcp.flags.syn==1 as the filter.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

SQL Server Query Performance Tuning

Authors: Sajal Dam, Grant Fritchey

4th Edition

1430267429, 9781430267423

More Books

Students also viewed these Databases questions

Question

7 Name at least three selection methods.

Answered: 1 week ago

Question

8. Explain competency models and the process used to develop them.

Answered: 1 week ago