BIT354 Network Vulnerability Pen X M Inbox (1,306) - binodgautam 1948 x C Apps S a....
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
BIT354 Network Vulnerability Pen X M Inbox (1,306) - binodgautam 1948 x C Apps S a. online.melbournepolytechnic.edu.au/mod/quiz/attempt.php?attempt=557994&cmid=1242826 Subscene - Passion... LE LIVVT JUULUV 13 3.998508862 14 4.325809522 15 4.907829860 16 4.998352310 17 5.997823935 18 6.239984664 10 6 007000716 New Tab YouTube M Google Accounts LUE. AVU.0.211 192.168.50.177 192.168.50.177 ASUSTeKC_a5:46:d0 192.168.50.177 192.168.50.177 Espressi_f3:fe:f0 PDF certificate_of_ackn....pdf ASUSTOKS 25:16.do Hardware type: Ethernet (1) Protocol type: IPv4 (0x0800) Hardware size: 6 Protocol size: 4 Opcode: request (1) [Is gratuitous: True] [Is announcement: True] Type here to search Mail - Binod S1460265- Outlook X Google Scholar Course: BIT353 - Ne... UUT UDP MDNS STP UDP UDP ARP STD AVE. AVU.vu.com Sender MAC address: Espressi_f3:fe:f0 (84:f3:eb:f3:fe:f0) Sender IP address: 192.168.50.155 Target MAC address: 00:00:00 00:00:00 (00:00:00:00:00:00) O 192.168.50.255 224.0.0.251 6: 192.168.50.255 192.168.50.255 < Frame 18: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface any, id 0 Linux cooked capture Address Resolution Protocol (ARP Announcement) n how this attack would work. Consider the following: PDF BIT352 Assessmen....pdf FOR Case Study Compt....pdf ^ ~ Messenger What is the purpose of the highlighted packet (Packet 18)? Explain your answer. What attack can you perform should you have access to the data in this screenshot? b. Time left 3:09:58 x + LUII-LVU 5491554915 Len=263 307 85 Standard query 0x0000 PTR _sleep-prox 62 Conf. Root = 32768/0/d4:5d:64:a5:46:d 307 5491554915 Len=263 307 54915 54915 Len=263 62 ARP Announcement for 192.168.50.155 62 Conf Dont - 22760/0/11:5d:61:35:16.d 0 Show all 9:05 AM 11/10/2020 X : X BIT354 Network Vulnerability Pen X M Inbox (1,306) - binodgautam 1948 x C Apps S Subscene - Passion... Apps 2- H No. T online.melbournepolytechnic.edu.au/mod/quiz/attempt.php?attempt=557994&cmid=1242826 New Tab YouTube M Google Accounts Google ScholarCourse: BIT353 - Ne... Refer to the screenshot taken from Wireshark below and answer the following questions. Time Protocol Length Info 71 7.283672749 72 7.283690456 73 7.292448252 74 7.292448405 84 7.439496800 85 7.439512483 192.168.50.163 192.168.50.163 192.168.50.163 192.168.50.1 192.168.50.1 192.168.50.163 86 7.448350403 192.168.50.1 87 7.448350464 192.168.50.1 5138 11.545218393 192.168.50.163 5139 11.545232910 192.168.50.163 5140 11.554214410 192.168.50.1 5141 11.554214500 192.168.50.1 5149 11.696483409 192.168.50.163 5150 11.696496220 192.168.50.163 [151 11 607220070 103 160 50 1 Source PDF certificate_of_ackn....pdf Mail - Binod S1460265- Outlook X ~ Messenger User Datagram Protocol, Src Port: 41665, Dst Port: 53 Domain Name System (query) Time left 3:09:43 action ID: 0x638d s: 0x0100 Standard query PDF BIT352 Assessmen....pdf Type here to search O Destination 192.168.50.1 192.168.50.1 192.168.50.163 192.168.50.163 192.168.50.1 192.168.50.1 192.168.50.163 192.168.50.163 192.168.50.1 192.168.50.1 192.168.50.163 192.168.50.163 192.168.50.1 192.168.50.1 102 160 50 162 6: ( Frame 5138: 72 bytes on wire (576 bits), 72 bytes captured (576 bits) on interface any, id 0 Linux cooked capture Internet Protocol Version 4, Src: 192.168.50.163, Dst: 192.168.50.1 DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DUC PDF Case Study Compt....pdf x + 89 Standard query 0x9e9e A safebrowsing. 89 Standard query 0x4b93 AAAA safebrowsi 105 Standard query response 0x9e9e A safe 117 Standard query response 0x4b93 AAAA s 75 Standard query 0xc569 A ocsp.pki.goog 75 Standard query 0x0d54 AAAA ocsp.pki.g 126 Standard query response 0xc569 A ocsp 138 Standard query response 0x0d54 AAAA c 72 Standard query 0x638d A google.com 72 Standard query Oxba92 AAAA google.com 88 Standard query response 0x638d A goog 100 Standard query response Oxba92 AAAA g 76 Standard query 0x5c3b A www.google.co 76 Standard query 0x1c3f AAAA www.google 02 Standard 2 Pa Coononno Oxfo2h Ou Fath A 0 Show all 9:05 AM 11/10/2020 X : X BIT354 Network Vulnerability Pen X M Inbox (1,306) - binodgautam1948 X online.melbournepolytechnic.edu.au/mod/quiz/attempt.php?attempt=557994&cmid=1242826 Apps Subscene - Passion... YouTube M Google Accounts TARGET is in the format MAC/IP/IPv6/PORTS (see the man for further detail) Sniffing and Attack options: -M, --mitm -0, --only-mitm -b, -- broadcast -B, --bridge -p, --nopromisc 7:54.437 -S, --nosslmitm -u, -- unoffensive -r, --read -f, --pcapfilter -R, - reversed -t, --proto --certificate --private-key New Tab PDF certificate of ackn....pdf Type here to search BIT352 Assessmen....pdf Mail - Binod S1460265- Outlook X 6: Google Scholar ~ Messenger Time left 3:09:48 o the screenshot taken from Wireshark below and answer the following questions. Course: BIT353 - Ne... + perform a mitm attack don't sniff, only perform the mitm attack sniff packets destined to broadcast use bridged sniff (needs 2 ifaces) do not put the iface in promisc mode do not forge SSL certificates do not forward packets Case Study Compt....pdf read data from pcapfile set the pcap filter reversed TARGET matching sniff only this proto (default is all) certificate file to use for SSL MTM private key file to use for SSL MiTM :)) 0 Show all 9:05 AM 11/10/2020 X : X BIT354 Network Vulnerability Pen x M Inbox (1,306) - binodgautam 1948 x C Apps S online.melbournepolytechnic.edu.au/mod/quiz/attempt.php?attempt=557994&cmid=1242826 Subscene - Passion... No. Question 1 Not yet answered Marked out of 30.00 Flag question 1- Refer to the screenshot taken from Wireshark below and answer the following questions. Capturing from any File Edit View Go Capture Analyze Statistics Telephony Wireless Tools Help Apply a display filter ... Time Source 9 2.446276242 10 2.666124197 11 2.907748740 12 2.997583230 13 3.998508862 14 4.325809522 New Tab YouTube M Google Accounts Google ScholarCourse: BIT353 - Ne... 192.168.50.164 192.168.50.155 ASUSTeKC_a5:46:d0 192.168.50.177 192.168.50.177 192.168.50.177 Time left 3:10:03.907829860 ASUSTeKC_a5:46:d0 PDF certificate_of_ackn....pdf Type here to search Mail - Binod S1460265- Outlook X PDF BIT352 Assessmen....pdf O 6: Destination 224.0.0.251 255.255.255.255 Messenger 192.168.50.255 192.168.50.255 224.0.0.251 PDF Case Study Compt.....pdf (= Protocol Length Info MDNS UDP STP UDP UDP MDNS STP x + 2 Pa 160 Standard query response 0x0000 SRV, c 232 491546667 Len-188 62 Conf. Root = 32768/0/d4:5d:64:a5:46:d 307 54915 54915 Len=263 307 5491554915 Len=263 85 Standard query 0x0000 PTR _sleep-prox 62 Conf. Root = 32768/0/d4:5d:64:a5:46:d 0 Show all 9:04 AM 11/10/2020 X : X BIT354 Network Vulnerability Pen X M Inbox (1,306) - binodgautam 1948 x C Apps S a. b. H C. d. e. online.melbournepolytechnic.edu.au/mod/quiz/attempt.php?attempt=557994&cmid=1242826 Subscene - Passion... Flags: 0x0100 Standard query Questions: 1 Answer RRS: 0 Authority RRs: 0 Additional RRs: 0 Queries [Response In: 5140] A BI Time left 3:09:39 PDF certificate_of_ackn....pdf New Tab YouTube M Google Accounts Google ScholarCourse: BIT353 - Ne... What is the purpose of the highlighted packet (packet 5138 )? Explain your answer. What is the response to that packet? What is the number of the response packet? What attack can you perform based on the information you see in this screenshot? If that attack was successful, what are the consequences? What would the hacker be able to do? Type here to search Mail - Binod S1460265- Outlook X III PDF BIT352 Assessmen....pdf O 6: US Messenger X PDF Case Study Compt.....pdf x x + E E # I 2 Pa 88 0 Show all 9:05 AM 11/10/2020 X : X BIT354 Network Vulnerability Pen X M Inbox (1,306) - binodgautam 1948 x C Apps S T a. b. C. e. online.melbournepolytechnic.edu.au/mod/quiz/attempt.php?attempt=557994&cmid=1242826 Subscene - Passion... New Tab YouTube M Google Accounts Google Scholar Course: BIT353 - Ne... Taryel MAC address, 0.00.00_00.00.00 100.00.00.00.00.00 Mail - Binod S1460265- Outlook X Messenger What is the purpose of the highlighted packet (Packet 18)? Explain your answer. What attack can you perform should you have access to the data in this screenshot? Explain how this attack would work. Consider the following: Victim's IP address is 192.168.250.155 Gateway's IP address is 192.168.250.1 Attacker's IP address is 192.168.250.227, MAC: AB:CD:EF:FE:DC:BA d. Write the command to perform the attack, referring to the screenshot below: If that attack was successful, what are the consequences? What would the hacker be able to do? ahmed@kali:~$ ettercap -h ettercap 0.8.3.1 copyright 2001-2020 Ettercap Development Team /usi Time left 3:09:52 ttercap [OPTIONS] [TARGET1] [TARGET21 PDF certificate_of_ackn....pdf PDF BIT352 Assessmen....pdf FOR Case Study Compt....pdf Type here to search O x + 6: 422 0 Show all 9:05 AM 11/10/2020 X : X BIT354 Network Vulnerability Pen X M Inbox (1,306) - binodgautam 1948 x C Apps S a. online.melbournepolytechnic.edu.au/mod/quiz/attempt.php?attempt=557994&cmid=1242826 Subscene - Passion... LE LIVVT JUULUV 13 3.998508862 14 4.325809522 15 4.907829860 16 4.998352310 17 5.997823935 18 6.239984664 10 6 007000716 New Tab YouTube M Google Accounts LUE. AVU.0.211 192.168.50.177 192.168.50.177 ASUSTeKC_a5:46:d0 192.168.50.177 192.168.50.177 Espressi_f3:fe:f0 PDF certificate_of_ackn....pdf ASUSTOKS 25:16.do Hardware type: Ethernet (1) Protocol type: IPv4 (0x0800) Hardware size: 6 Protocol size: 4 Opcode: request (1) [Is gratuitous: True] [Is announcement: True] Type here to search Mail - Binod S1460265- Outlook X Google Scholar Course: BIT353 - Ne... UUT UDP MDNS STP UDP UDP ARP STD AVE. AVU.vu.com Sender MAC address: Espressi_f3:fe:f0 (84:f3:eb:f3:fe:f0) Sender IP address: 192.168.50.155 Target MAC address: 00:00:00 00:00:00 (00:00:00:00:00:00) O 192.168.50.255 224.0.0.251 6: 192.168.50.255 192.168.50.255 < Frame 18: 62 bytes on wire (496 bits), 62 bytes captured (496 bits) on interface any, id 0 Linux cooked capture Address Resolution Protocol (ARP Announcement) n how this attack would work. Consider the following: PDF BIT352 Assessmen....pdf FOR Case Study Compt....pdf ^ ~ Messenger What is the purpose of the highlighted packet (Packet 18)? Explain your answer. What attack can you perform should you have access to the data in this screenshot? b. Time left 3:09:58 x + LUII-LVU 5491554915 Len=263 307 85 Standard query 0x0000 PTR _sleep-prox 62 Conf. Root = 32768/0/d4:5d:64:a5:46:d 307 5491554915 Len=263 307 54915 54915 Len=263 62 ARP Announcement for 192.168.50.155 62 Conf Dont - 22760/0/11:5d:61:35:16.d 0 Show all 9:05 AM 11/10/2020 X : X BIT354 Network Vulnerability Pen X M Inbox (1,306) - binodgautam 1948 x C Apps S Subscene - Passion... Apps 2- H No. T online.melbournepolytechnic.edu.au/mod/quiz/attempt.php?attempt=557994&cmid=1242826 New Tab YouTube M Google Accounts Google ScholarCourse: BIT353 - Ne... Refer to the screenshot taken from Wireshark below and answer the following questions. Time Protocol Length Info 71 7.283672749 72 7.283690456 73 7.292448252 74 7.292448405 84 7.439496800 85 7.439512483 192.168.50.163 192.168.50.163 192.168.50.163 192.168.50.1 192.168.50.1 192.168.50.163 86 7.448350403 192.168.50.1 87 7.448350464 192.168.50.1 5138 11.545218393 192.168.50.163 5139 11.545232910 192.168.50.163 5140 11.554214410 192.168.50.1 5141 11.554214500 192.168.50.1 5149 11.696483409 192.168.50.163 5150 11.696496220 192.168.50.163 [151 11 607220070 103 160 50 1 Source PDF certificate_of_ackn....pdf Mail - Binod S1460265- Outlook X ~ Messenger User Datagram Protocol, Src Port: 41665, Dst Port: 53 Domain Name System (query) Time left 3:09:43 action ID: 0x638d s: 0x0100 Standard query PDF BIT352 Assessmen....pdf Type here to search O Destination 192.168.50.1 192.168.50.1 192.168.50.163 192.168.50.163 192.168.50.1 192.168.50.1 192.168.50.163 192.168.50.163 192.168.50.1 192.168.50.1 192.168.50.163 192.168.50.163 192.168.50.1 192.168.50.1 102 160 50 162 6: ( Frame 5138: 72 bytes on wire (576 bits), 72 bytes captured (576 bits) on interface any, id 0 Linux cooked capture Internet Protocol Version 4, Src: 192.168.50.163, Dst: 192.168.50.1 DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DNS DUC PDF Case Study Compt....pdf x + 89 Standard query 0x9e9e A safebrowsing. 89 Standard query 0x4b93 AAAA safebrowsi 105 Standard query response 0x9e9e A safe 117 Standard query response 0x4b93 AAAA s 75 Standard query 0xc569 A ocsp.pki.goog 75 Standard query 0x0d54 AAAA ocsp.pki.g 126 Standard query response 0xc569 A ocsp 138 Standard query response 0x0d54 AAAA c 72 Standard query 0x638d A google.com 72 Standard query Oxba92 AAAA google.com 88 Standard query response 0x638d A goog 100 Standard query response Oxba92 AAAA g 76 Standard query 0x5c3b A www.google.co 76 Standard query 0x1c3f AAAA www.google 02 Standard 2 Pa Coononno Oxfo2h Ou Fath A 0 Show all 9:05 AM 11/10/2020 X : X BIT354 Network Vulnerability Pen X M Inbox (1,306) - binodgautam1948 X online.melbournepolytechnic.edu.au/mod/quiz/attempt.php?attempt=557994&cmid=1242826 Apps Subscene - Passion... YouTube M Google Accounts TARGET is in the format MAC/IP/IPv6/PORTS (see the man for further detail) Sniffing and Attack options: -M, --mitm -0, --only-mitm -b, -- broadcast -B, --bridge -p, --nopromisc 7:54.437 -S, --nosslmitm -u, -- unoffensive -r, --read -f, --pcapfilter -R, - reversed -t, --proto --certificate --private-key New Tab PDF certificate of ackn....pdf Type here to search BIT352 Assessmen....pdf Mail - Binod S1460265- Outlook X 6: Google Scholar ~ Messenger Time left 3:09:48 o the screenshot taken from Wireshark below and answer the following questions. Course: BIT353 - Ne... + perform a mitm attack don't sniff, only perform the mitm attack sniff packets destined to broadcast use bridged sniff (needs 2 ifaces) do not put the iface in promisc mode do not forge SSL certificates do not forward packets Case Study Compt....pdf read data from pcapfile set the pcap filter reversed TARGET matching sniff only this proto (default is all) certificate file to use for SSL MTM private key file to use for SSL MiTM :)) 0 Show all 9:05 AM 11/10/2020 X : X BIT354 Network Vulnerability Pen x M Inbox (1,306) - binodgautam 1948 x C Apps S online.melbournepolytechnic.edu.au/mod/quiz/attempt.php?attempt=557994&cmid=1242826 Subscene - Passion... No. Question 1 Not yet answered Marked out of 30.00 Flag question 1- Refer to the screenshot taken from Wireshark below and answer the following questions. Capturing from any File Edit View Go Capture Analyze Statistics Telephony Wireless Tools Help Apply a display filter ... Time Source 9 2.446276242 10 2.666124197 11 2.907748740 12 2.997583230 13 3.998508862 14 4.325809522 New Tab YouTube M Google Accounts Google ScholarCourse: BIT353 - Ne... 192.168.50.164 192.168.50.155 ASUSTeKC_a5:46:d0 192.168.50.177 192.168.50.177 192.168.50.177 Time left 3:10:03.907829860 ASUSTeKC_a5:46:d0 PDF certificate_of_ackn....pdf Type here to search Mail - Binod S1460265- Outlook X PDF BIT352 Assessmen....pdf O 6: Destination 224.0.0.251 255.255.255.255 Messenger 192.168.50.255 192.168.50.255 224.0.0.251 PDF Case Study Compt.....pdf (= Protocol Length Info MDNS UDP STP UDP UDP MDNS STP x + 2 Pa 160 Standard query response 0x0000 SRV, c 232 491546667 Len-188 62 Conf. Root = 32768/0/d4:5d:64:a5:46:d 307 54915 54915 Len=263 307 5491554915 Len=263 85 Standard query 0x0000 PTR _sleep-prox 62 Conf. Root = 32768/0/d4:5d:64:a5:46:d 0 Show all 9:04 AM 11/10/2020 X : X BIT354 Network Vulnerability Pen X M Inbox (1,306) - binodgautam 1948 x C Apps S a. b. H C. d. e. online.melbournepolytechnic.edu.au/mod/quiz/attempt.php?attempt=557994&cmid=1242826 Subscene - Passion... Flags: 0x0100 Standard query Questions: 1 Answer RRS: 0 Authority RRs: 0 Additional RRs: 0 Queries [Response In: 5140] A BI Time left 3:09:39 PDF certificate_of_ackn....pdf New Tab YouTube M Google Accounts Google ScholarCourse: BIT353 - Ne... What is the purpose of the highlighted packet (packet 5138 )? Explain your answer. What is the response to that packet? What is the number of the response packet? What attack can you perform based on the information you see in this screenshot? If that attack was successful, what are the consequences? What would the hacker be able to do? Type here to search Mail - Binod S1460265- Outlook X III PDF BIT352 Assessmen....pdf O 6: US Messenger X PDF Case Study Compt.....pdf x x + E E # I 2 Pa 88 0 Show all 9:05 AM 11/10/2020 X : X BIT354 Network Vulnerability Pen X M Inbox (1,306) - binodgautam 1948 x C Apps S T a. b. C. e. online.melbournepolytechnic.edu.au/mod/quiz/attempt.php?attempt=557994&cmid=1242826 Subscene - Passion... New Tab YouTube M Google Accounts Google Scholar Course: BIT353 - Ne... Taryel MAC address, 0.00.00_00.00.00 100.00.00.00.00.00 Mail - Binod S1460265- Outlook X Messenger What is the purpose of the highlighted packet (Packet 18)? Explain your answer. What attack can you perform should you have access to the data in this screenshot? Explain how this attack would work. Consider the following: Victim's IP address is 192.168.250.155 Gateway's IP address is 192.168.250.1 Attacker's IP address is 192.168.250.227, MAC: AB:CD:EF:FE:DC:BA d. Write the command to perform the attack, referring to the screenshot below: If that attack was successful, what are the consequences? What would the hacker be able to do? ahmed@kali:~$ ettercap -h ettercap 0.8.3.1 copyright 2001-2020 Ettercap Development Team /usi Time left 3:09:52 ttercap [OPTIONS] [TARGET1] [TARGET21 PDF certificate_of_ackn....pdf PDF BIT352 Assessmen....pdf FOR Case Study Compt....pdf Type here to search O x + 6: 422 0 Show all 9:05 AM 11/10/2020 X : X
Expert Answer:
Related Book For
Advanced Financial Accounting
ISBN: 978-0137030385
6th edition
Authors: Thomas Beechy, Umashanker Trivedi, Kenneth MacAulay
Posted Date:
Students also viewed these computer network questions
-
1. Prepare a list showing all tasks and their durations. 2. Analyze the fact situation carefully to determine which tasks are concurrent and which ones are dependent on other tasks. 3. Using PERT/CPM...
-
A 120.0-V motor draws a current of 7.00 A when running at normal speed. The resistance of the armature wire is 0.720 . (a) Determine the back emf generated by the motor. (b) What is the current at...
-
A partially inflated and irregularly shaped balloon is shown in Figure P18.35. Rank the points on the balloon's surface in order of \((a)\) increasing tension in the membrane and \((b)\) increasing...
-
Does a man standing in an elevator that is moving upward at a constant speed of \(10 \mathrm{~m} / \mathrm{s}\) feel heavier or lighter? What if the elevator is moving downward at the same speed? If...
-
Carmen Camry operates a consulting firm called Help Today. On August 31, the companys records show the following accounts and amounts for the month of August. Use this information to prepare an...
-
The _ _ _ _ function enables you to retrieve separate characters in a string. A . at ( ) B . char _ at ( ) C . indexof ( ) D . value _ of ( )
-
Christy Albright and Dan Ralls formed the Charter Company on 11/30/2012, and chose a tax year ending on 11/30. Charter was formed to operate a restaurant (at 7848 Pesca Dr., San Francisco, CA 94123)...
-
Are rapidly growing countries likely to have a financial account surplus or deficit? Why?
-
Case: Two months ago, Lisa was honorably discharged from the Air Force where she spent four years training as an airplane mechanic. After discharge, she relocated to take a 40 hour per week...
-
How to modify the following algorithms to display the total number of swap operations. The following algorithms are given: def Algorithm_1(lyst): i = 0 while i < len(lyst) - 1: minIndex = i j = i + 1...
-
How do businesspersons develop the audience profile during the writing process?
-
There are many laws that surround the First Amendment. What rights are guaranteed by the First Amendment?
-
(d) Aina just got her driver license, and she wants to buy a new car cost for RM70,000. She has RM3,000 to invest as a lump sum today. Aina is a conservative investor and she only invests in safe...
-
Countdown Ltd owns and manages a large office block and classifies it as an investment property. It acquired the property on January 3, 2018 for a total cost of $18 million. It is estimated that 25%...
-
For the following exercises, rewrite the sum as a product of two functions or the product as a sum of two functions. Give your answer in terms of sines and cosines. Then evaluate the final answer...
-
What are the advantages for the acquirer of obtaining control over assets by a purchase of shares rather than by a direct purchase of assets?
-
On January 1, 20X6, Parent Ltd. purchased 100% of the outstanding voting common shares of Sub Ltd. for $ 2,800,000. Any revaluation arising from the purchase of depreciable assets is to be amortized...
-
What are the two basic approaches to the preparation of interim statements? Which approach is recommended by IAS 34?
-
Quick Copies recorded a cash collection on account by debiting Cash and crediting Accounts Payable. What will the trial balance show for this error? a. Cash is overstated. b. Liabilities are...
-
Schuster Services reported assets of $800 and equity of $480. What is Schuster Services debt ratio? a. 60% b. 40% c. 67% d. Not enough information is provided.
-
Daniel Bronstein practices medicine under the business title Daniel Bronstein, M.D. During July, the medical practice completed the following transactions: The business uses the following accounts:...
Study smarter with the SolutionInn App