Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

System Security Alice, Bob and Mallory are all on a local network. Mallory is an off-path attacker with a super-fast connection: her packets always arrive

System Security

Alice, Bob and Mallory are all on a local network. Mallory is an off-path attacker with a super-fast connection: her packets always arrive first.

Assume Mallory knows the MAC and IP addresses of Alice and Bob's computers. Assume that Alice will accept the first valid packet she receives as coming from Bob, and ignore what happens once Bob's real packet arrives.

  1. Alice and Bob are communicating through UDP on some unknown ports. What does Mallory need to guess to insert a fake UDP datagram from Bob to Alice?
  2. Alice and Bob are communicating through TCP on some unknown ports. What does Mallory need to guess to insert a fake TCP packet from Bob to Alice?
  3. Alice is about to send a DNS request to Bob's resolver for 1.2.3.4.5.6.7.com. What does Mallory need to guess to spoof the reply? (
  4. Alice is about to send an ARP request for Bob's MAC address. What does Mallory need to guess to spoof the reply?
  5. If Mallory was on-path, could she spoof all of the above responses with a 100% success rate.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Infrastructure For Medical Research In Databases

Authors: Thomas Heinis ,Anastasia Ailamaki

1st Edition

1680833480, 978-1680833485

More Books

Students also viewed these Databases questions