Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

PART 2 TASK 4: Filtering, Inspecting, and Analyzing Packet Capture with Wireshark Think of the fact that a DoS attack tries to make a web




PART 2TASK 4: Filtering, Inspecting, and Analyzing Packet Capture with Wireshark



  1. Think of the fact that a DoS attack tries to make a web resource unavailable to legitimate users by flooding the target URL/host with more requests to overwhelm the server. What can you infer from the statistical information in the Destination and Ports window as far as a DoS attack is concerned?
  2. Cybercriminals can illegitimately use DoS attacks to extort money from companies. They may also use ransomware vis social engineering. Determine if this is a Distributed Denial of Service (DDoS) or DoS attack [hint: a DDoS attack originates from multiples sources almost simultaneously].
  3. What is your point of view of the Rateand Percentcolumns of the Statisticsoutput with respect to the Count column? Does this information indicate any possibility of a compromise? If so, why?
  4. Besides the DDoS attack, do you see any indication of any attack such as brute force, SQL injections attack upon analyzing the web traffic? Why or why not?
  5. How is this indication different from the Statistics information retrieved earlier and from the perspective of this attack?
  6. What legitimate or illegitimate role does the host/user with the 192.168.10.111 IP address play in the suspected attack?
  7. If malicious actors got into your network to access your network security logs, how could they use the packet details to their advantage? Specifically, what utilities within Wireshark can you count on?
  8. From the details of the packet details pane above, why do you think there are several ICMP destination ports unreachable? Does this suggest an indication of an attack? Please comment on your observations.

PART 2TASK 5, 6: Scanning Multiple Hosts and Networks with Zenmap

  1. What is your opinion about the results and the security implications of the output of this tab? Comment on the data of interest in your findings such as host status and ports used.
  2. How many ports are reported by the scans, and how more so many are open ports?
  3. What is one most impactful security vulnerability in your opinion? Recommend a good mitigation strategy to address any vulnerabilities identified.
  4. What can you say about the results when scanning multiple hosts and/or a subnet compared with the individual host scans?
  5. Recommend a good mitigation strategy to address any vulnerabilities identified.
  6. In your opinion, why are some hosts reported as down? Do you recognize any security concerns? [Hint: use the ping utility to see if any IP within the range is reachable from the Windows machine].

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Computer Networks

Authors: Andrew S. Tanenbaum, David J. Wetherall

5th edition

132126958, 978-0132126953

More Books

Students also viewed these Computer Network questions

Question

=+b) Is this model appropriate for this series? Explain.

Answered: 1 week ago