Question: Assignment Content Complete labs 1 and 2 in the NETLAB. Answer the following short feedback and submit. From EH lab (1)/(2) What is NSLOOKUP
Assignment Content\ Complete labs 1 and 2 in the NETLAB. Answer the following short feedback and submit.\ From EH lab
(1)/(2)\ What is NSLOOKUP used for?\ Do a quick web search at why PFsense is such a popular choice to use as a firewall. What did you find out?\ Would the SERVER command be effective against a remote web server behind a firewall in a private IP network?\ If so, how could an attacker gain "back side" or access to the private network the web server occupies to potentially use a\ different attack method?\ Do you see any way a web server can protect itself from this type of penetration?\ From lab 2:\ What does Time to Live mean?\ Is there a danger to a packet with infinite TTL? Why or why not?\ What do you think you could do with succesful packet crafting as a bad guy? Give a short detail as to your dastardly plan!\ What are SYN, ACK packets? Why are they so important to reliable network traffic flow?

Assignment Content Complete labs 1 and 2 in the NETLAB. Answer the following short feedback and submit. From EH lab 1/2 1. What is NSLOOKUP used for? 2. Do a quick web search at why PFsense is such a popular choice to use as a firewall. What did you find out? 3. Would the SERVER command be effective against a remote web server behind a firewall in a private IP network? 4. If so, how could an attacker gain "back side" or access to the private network the web server occupies to potentially use a different attack method? 5. Do you see any way a web server can protect itself from this type of penetration? From lab 2: 6. What does Time to Live mean? 7. Is there a danger to a packet with infinite TTL? Why or why not? 8. What do you think you could do with succesful packet crafting as a bad guy? Give a short detail as to your dastardly plan! 9. What are SYN, ACK packets? Why are they so important to reliable network traffic flow
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
