Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

What are the IP addresses of telehack.com and sdf . org? Screenshots of the packet dump for the TELNET operation and the SSH operation. Please

What are the IP addresses of telehack.com and sdf.org?
Screenshots of the packet dump for the TELNET operation and the SSH operation. Please choose the packets with relatively large size (i.e., greater than 300 bytes) so that we can see the data contents.
Please answer, which protocol does PuTTY use to establish encryption key with the SSH server (i.e., which key exchange algorithm is used)? It is okay to consult external sources such as textbooks, online videos, or the web to find the answer to this question.
Shortly analyze the packet dump and explain why SSH is more secure than TELNET.
Now open the packet capture for the TELNET operations again. You will notice that there are many other types of packets such as DNS, TCP, etc. Please answer: (1) List all different IP addresses that you see in these captured packets; (2) List all the MAC addresses that you see in these captured packets; (3) List all TCP connections between the IP addresses that you capture. Please note that for a TCP connection, you need to provide (Source IP, Source PORT, Destination IP, Destination PORT).

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Handbook Of Relational Database Design

Authors: Candace C. Fleming, Barbara Von Halle

1st Edition

0201114348, 978-0201114348

More Books

Students also viewed these Databases questions