Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

The entire network is on a standard 192.168.0.0/24 subnet. You have been given administrator account credentials to the primary servers and network devices. During an

The entire network is on a standard 192.168.0.0/24 subnet. You have been given administrator account credentials to the primary servers and network devices.

During an assessment of the network you have spotted a machine that does not meet the standard naming conventions of the other systems. Running nmap from the Linux administrative machine that you were given access to fails to return any information on the offending system. The primary access point router (and firewall) is running DD-WRT (and thus iptables) presumably to save this small business some money compared to standard corporate solutions. Accessing the router via ssh with the given credentials, issuing:

iptables -L -v --line-number -n

image text in transcribed

1. What is the likely IP address of the rogue machine?

2. Waht is the suspected protocol that the rogue machine is likely exploiting and what was the attacker likely doing with it?

3.Give 3 iptables commands that would allow your nmap scan to work?

4. How would you accomplish the above (3) in 1 command WITHOUT messing up any other possible neccesary block or allow rules i.e -iptable-F not acceptable?

5 Descript any faults in the above iptables rules NOT including the FORWARDING chain rule set?

iptables -L-v--line-number-n results in the following output: Chain INPUT (policy ACCEPT 0 packets, bytes) num pkts bytes target prot opt in tep tcp ali destination 192.168.0.15 ?.?.0.0/0 out tep dpt:21 tep dpt 21 state RELATED , ESTABLISHED 0 ACCEPT 0 ACCEPT 0.0.0.0/e 192. 168 .0 , 15 2 100 ACCEPT lo 59 5779 ACCEPTall 0.0.0.0/0 0.0.0.0/0 Chain FORWARD (policy ACCEPT 0 packets, bytes) num pkts bytes target prot opt in ot source destination Chain ouTPUT (policy ACCEPT packets, 0 bytes) num pkts bytes target prot opt in t source destination tcp dpt:21 tep dpt:21 192, 168.9.15 e e ACCEPT tcp tep 192.168.0.15 0.0.0.0/e 0 ACCEPT 0.0.0.0/0 0.0.0.0/e Lo 2100 ACCEPT 0 ACCEPT 2 112 ACCEPT 0 ACCEPT all state RELATED ,ESTABLISHED udp dpt:53 tcp dpt:80 state NEW tcp dpt:443 state NEW udp tcp eth 0.0.0.0/0 eth ,0.0.0/0 0.0.0.0/0 ?.?.0.0/0 Chain port-scan (e references) num pkts bytes target prot opt in ut tcp source 0.0.0.0/0 destination 192.168.0.15 O RETURN 8 DROP tcp flags:0x17/0x04 linit: avg 1/sec burst 5 iptables -L-v--line-number-n results in the following output: Chain INPUT (policy ACCEPT 0 packets, bytes) num pkts bytes target prot opt in tep tcp ali destination 192.168.0.15 ?.?.0.0/0 out tep dpt:21 tep dpt 21 state RELATED , ESTABLISHED 0 ACCEPT 0 ACCEPT 0.0.0.0/e 192. 168 .0 , 15 2 100 ACCEPT lo 59 5779 ACCEPTall 0.0.0.0/0 0.0.0.0/0 Chain FORWARD (policy ACCEPT 0 packets, bytes) num pkts bytes target prot opt in ot source destination Chain ouTPUT (policy ACCEPT packets, 0 bytes) num pkts bytes target prot opt in t source destination tcp dpt:21 tep dpt:21 192, 168.9.15 e e ACCEPT tcp tep 192.168.0.15 0.0.0.0/e 0 ACCEPT 0.0.0.0/0 0.0.0.0/e Lo 2100 ACCEPT 0 ACCEPT 2 112 ACCEPT 0 ACCEPT all state RELATED ,ESTABLISHED udp dpt:53 tcp dpt:80 state NEW tcp dpt:443 state NEW udp tcp eth 0.0.0.0/0 eth ,0.0.0/0 0.0.0.0/0 ?.?.0.0/0 Chain port-scan (e references) num pkts bytes target prot opt in ut tcp source 0.0.0.0/0 destination 192.168.0.15 O RETURN 8 DROP tcp flags:0x17/0x04 linit: avg 1/sec burst 5

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Intelligent Databases Object Oriented Deductive Hypermedia Technologies

Authors: Kamran Parsaye, Mark Chignell, Setrag Khoshafian, Harry Wong

1st Edition

0471503452, 978-0471503453

More Books

Students also viewed these Databases questions

Question

How do modern Dashboards differ from earlier implementations?

Answered: 1 week ago