14) Stealth port scanning: Recall that IP packet header contains a 16 bit identification field that...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
14) Stealth port scanning: Recall that IP packet header contains a 16 bit identification field that is used for assembling packet fragments. IP mandates that the identification field be unique for each packet for a given (sourceIP, DestIP) pair. A common method for implementing the identification field is to maintain a single counter that is incremented by one for every packet sent. The current value of the counter is embedded in each outgoing packet. Since this counter is used for all connections to the host we say that the host implements a global identification field. (1 mark) a) Suppose a host P (whom we'll call the Patsy for reasons that become clear later) implements a global identification field. Suppose further that P responds to ICMP ping requests. You control some other host A. How can you test if P send a packet to anyone (other than A) within a certain one minute window? You are allowed to send your own packets to P. b) Your goal new is to test whether a victim host V is running a server that accepts connection to port n (that is, test if V is listening to port n). You wish to hide the identity of your machine A. Hence, A cannot directly send a packet to V, unless that packet contains a spoofed source IP address. Explain how to use the patsy host P to do this. c) How would you change host P to avoid this problem? You are not allowed to modify the TCP/IP protocol or the services running on P. You may only modify the implementation of TCP/IP on host P. 14) Stealth port scanning: Recall that IP packet header contains a 16 bit identification field that is used for assembling packet fragments. IP mandates that the identification field be unique for each packet for a given (sourceIP, DestIP) pair. A common method for implementing the identification field is to maintain a single counter that is incremented by one for every packet sent. The current value of the counter is embedded in each outgoing packet. Since this counter is used for all connections to the host we say that the host implements a global identification field. (1 mark) a) Suppose a host P (whom we'll call the Patsy for reasons that become clear later) implements a global identification field. Suppose further that P responds to ICMP ping requests. You control some other host A. How can you test if P send a packet to anyone (other than A) within a certain one minute window? You are allowed to send your own packets to P. b) Your goal new is to test whether a victim host V is running a server that accepts connection to port n (that is, test if V is listening to port n). You wish to hide the identity of your machine A. Hence, A cannot directly send a packet to V, unless that packet contains a spoofed source IP address. Explain how to use the patsy host P to do this. c) How would you change host P to avoid this problem? You are not allowed to modify the TCP/IP protocol or the services running on P. You may only modify the implementation of TCP/IP on host P.
Expert Answer:
Related Book For
Business Data Communications Infrastructure Networking and Security
ISBN: 978-0133023893
7th edition
Authors: William Stallings, Tom Case
Posted Date:
Students also viewed these programming questions
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Python and most Python libraries are free to download or use, though many users use Python through a paid service. Paid services help IT organizations manage the risks associated with the use of...
-
If you can't find similar ratios to class-covered ones, use financial formulas to calculate them manually. Choose up to two of the following: Operating Margin EBITDA Margin Payout Ratio 3. Analysis...
-
Cost Table A shows a breakdown of the ending inventory from Inventory Table A according to various costs per unit. Complete Cost Table A. Number of units on hand Cost per unit Total cost $850 $1,760...
-
How do technological advancements and digital innovations contribute to accelerated social change, and what are the implications for societal cohesion and individual identity in a rapidly evolving...
-
A single cylinder, four stroke cycle oil engine is fitted with a rope brake. The diameter of the brake wheel is \(600 \mathrm{~mm}\) and rope diameter is \(26 \mathrm{~mm}\). The dead load on the...
-
Day, Corp., is considering the use of activity-based costing. The following information is provided for the production of two product lines: Day plans to produce 400 units of Product A and 375 units...
-
Wardell Company purchased a minicomputer on January 1, 2022, at a cost of $57,000. The computer was depreciated using the straight-line method over an estimated five-year life with an estimated...
-
Raymond Constructions trial balance at December 31, 2020, is presented as follows. All 2020 transactions have been recorded except for the items described below. Unrecorded transactions: 1. On May 1,...
-
Are the following expressions propositions? 1. Bummer! 2. Its a beautiful day. 3. The light is on 4. The patient has diabetes
-
July 31st Revenue 7900 Retained Earnings 7900 July 31st Income Summary 5200 Rent Expense 400 Wages Expense 1750 Repairs & Maintenance Expense 350 Supplies Expense 1400 Depriciation Expense 100 Income...
-
Why are U.S treasuries considered safe and how can one lose money by investing in them? How do investors use bond ratings when investing
-
Bill currently has no savings but would like to have accumulated $400,000 in his RRSP by the time he retires in 25 years approximately how much must bill save at the end of each month between now and...
-
What would you make as your goal as a financial manager if you were the financial manager at Apple or Microsoft?
-
Round any decimals to the nearest penny. Your fixed expenses are $1,763.25/month. You saved 6 months' worth for an emergency fund in a savings account earning a 4.5% APR over 3 years. After 3 years,...
-
What do you think your company has done to create these competitive advantages for itself? Finally, suppose you were a competitor to the company you have chosen, what could you do to combat that...
-
Three successive resonance frequencies in an organ pipe are 1310, 1834, and 2358 Hz. (a) Is the pipe closed at one end or open at both ends? (b) What is the fundamental frequency? (c) What is the...
-
Let \[f(x, y)=\frac{1}{2} \sin (x+y), 0 \leq x, y \leq \frac{\pi}{2}\] be the joint probability density of the random vector \((X, Y)\). (1) Determine the marginal densities. (2) Are \(X\) and \(Y\)...
-
A large population of rats had been fed with individually varying mixtures of wholegrain wheat and puffed wheat to see whether the composition of the food has any influence on the lifetimes of the...
-
The random vector \((X, Y)\) is defined as follows: \(X\) is uniformly distributed in the interval \([0,10]\). On condition \(X=x\), the random variable \(Y\) is uniformly distributed in the interval...
Study smarter with the SolutionInn App