Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Scenario: Ms. Wilde, pleased with your performance on the malware case, has decided to give you another incident. The overworked, underpaid, and understaffed IT administrator

Scenario: Ms. Wilde, pleased with your performance on the malware case, has decided to give you another incident. The overworked, underpaid, and understaffed IT administrator of a small business has contacted Palindrome to analyze some network traffic around the time of an abnormal spike in traffic. Your mission, should you choose to accept it - and Ms. Wilde has decided that you do - is to analyze the provided packet capture and report on the activity found therein which may. To aid in your goals, the administrator has provided a few details about the network from which the capture originated. There are four computers on the network. The IT administrator admin box is an Ubuntu server. They control the DHCP and web servers and is the only individual within the company with authorization for access to that server. There are two other employees, Bob Smith, a new hire and recent college graduate, who uses a workstation with network access running Windows XP, and Sarah, a developer who uses a workstation with a standard installation of Ubuntu also with network access. Both Bob and Sarah are authorized to have access to their own workstation and no others.

Deliverables:

A professional-quality report in two sections.

First, a management summary, written with no technical language, which provides a summary of what was found. The summary should be roughly a paragraph in length. This will require some thinking on your part to digest all that you've seen and turn that into something a manager can read quickly, but also come away with, and comprehend, the relevant information you gathered.

The second part will be the technical section where you will answer the following questions. Include the question and the answer.

1. What is the network address and subnet mask?

2. For each computer: a. What is the IP of the computer? b. What OS is it running? c. What is the MAC address?

3. What computer (refer by OS name and last octet of the IP address, e.g., Win7.128) is serving as a DHCP server? How do you know? a. What other services is the DHCP server running? How do you know?

4. What computer (refer by OS name and last octet of the IP address) is running a web server? a. Which computer(s) accessed this web server? b. How do you know a web page was accessed? What was the file name of the web page accessed? c. What web browser was the user running? d. At what time did the access occur? e. What web server application was running? (include version number)

5. What computer (refer by OS name and last octet of the IP address) is running the telnet service? a. Which computer(s) accessed the telnet server? b. At what time(s)/date did this access occur?

6. What usernames/passwords were used to access the telnet server? a. What did the attacker do, if anything, from the telnet server? Explain why the attacker might have done this.

7. What is a buffer overflow? What is an SQL Injection? Identify the packet series that contains what appears to be a buffer overflow followed by an SQL Injection. Describe how the attacker attempts to effect the buffer overflow. You may need additional material from the Web. Use your own words; do not copy and paste an answer.

8. What is a port scan? a. How many port scans were run? b. What computer initiated the port scan(s)? What were the target computers? c. What type of port scan(s) did the attacker use (refer to the man page for nmap)?

9. What did the 'attacker' do once on the FTP server?

a. How many commands were run on the ftp server? b. What username/password was used to access the FTP server?

c. From what computer was the FTP server accessed? d. Date and time? e. What file was downloaded from the ftp server? f. To which computer was this file downloaded?

10. What is the IP address of the attacker? In your opinion, how technically sophisticated is the attacker? Provide evidence to support your claims.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Systems Design Implementation And Management

Authors: Peter Robb,Carlos Coronel

5th Edition

061906269X, 9780619062699

More Books

Students also viewed these Databases questions

Question

4. Identify cultural variations in communication style.

Answered: 1 week ago

Question

9. Understand the phenomenon of code switching and interlanguage.

Answered: 1 week ago

Question

8. Explain the difference between translation and interpretation.

Answered: 1 week ago