Question: 9. See table below and answer the following questions; Source IP Destination IP Source Port Destination Port Number of Bytes 1.2.3.4 5.6.7.8 23456 443 105678
9. See table below and answer the following questions;
| Source IP | Destination IP | Source Port | Destination Port | Number of Bytes |
| 1.2.3.4 | 5.6.7.8 | 23456 | 443 | 105678 |
| 1.2.3.4 | 5.6.7.8 | 23456 | 443 | 904567 |
| 1.2.3.4 | 5.6.7.8 | 23456 | 443 | 94856 |
| 1.2.3.4 | 5.6.7.8 | 23456 | 443 | 497989 |
| 5.6.7.8 | 1.2.3.4 | 443 | 23456 | 2500 |
Provide responses for the following given the table above.
* What is the IP address of the client
* What is the IP address of the web server?
* What protocol is being used between the two IP addresses? What does that protocol provide?
* If machine with IP address 5.6.7.8 is owned by a hacker, analyze the table above and determine what is happening.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
