Steps: 1. Create a Python script having the TCP/IP stack as below (skeleton code given below) Display the reocest packet shouing the entire trectefnarlood stack su 5 ese the stack usiny art it bislay the roiponin packet showing the antire repiry utaci. rat Seed the respense gackint using ur( ) 2. Start apache web server on port 80 3. Open Wireshark, and start packet capture on loopback interface 4. Change permission of the Python script using chmod 5. Run the script 6. Analyze the Wireshark capture 7. Did you see the response packet? Why/Why not (write your answer below): 1. Create a Python script having the TCP/IP stack as below (skeleton code given below) H./bin/env python import sys froe scapy,alt isport import string getstr = "GET / HTTP/1.1SrlnHost: 127. . . 8. 1lrinlrin" \#t Create a variable having TCP/IP stack with source-and destination IP addresses ef as 127, 0. e.1. TCP destination port as 8e, TCP source port as 5555 as and TCP flags as is" Ef Create a request variable stacking the getstr payload on top of the Tcp/ipistack variable Eisplay the request packet showing the: entire TCp/tp/payload stack te Send the stack using sir() * Create a response variable with Ip source and destination addresses as 127.0.0.1. and TCP dporte5555, TCP source port "previous packet"s destination port, TCP acknowledgement number in (previous packet's 5s+1). Af and TCP flags is isA \# Display the response packet showing the entire TCP/IP stack Fend the response packet using sri) 2. Start apache web server on port 80 3. Open Wireshark, and start packet capture on loopback interface 4. Change permission of the Python script using chmod 5. Run the script 6. Analyze the Wireshark capture 7. Did you see the response packet? Why/Why not (write your answer below)