Question: IV . There is an active connection between a Telnet client ( 1 0 . 0 . 2 . 5 ) and a Telnet server

IV. There is an active connection between a Telnet client (10.0.2.5) and a Telnet server
(10.0.2.9). The server has just acknowledged a sequence number 1000, and the client has
just acknowledged a sequence number 3000. An attacker wants to launch the TCP session
hijacking attack on the connection, so he can execute a command on the server. He is on
the same local area network as these two computers. You need to construct a TCP packet
for the attacker. Please fill in the following fields:
Source IP and Destination IP
Source port and Destination port
Sequence number
The TCP data field.
Section 5: PKI Public Key Infrastructure
I. The following is an X.509 certificate.
Certificate:
Data:
Version: 3(02)
Serial Number:
3d:0e: 98:b2:bf : af : fa: 9e: 99: 91:05:64:69:6e:11:2a
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, O=Symantec Corporation,
OU=Symantec Trust Network,
CN=Symantec Class 3EV SSL CA - G3
Validity
Not Before: Aug 1400:00:002017 GMT
Not After : Sep 1323:59:592018 GMT
Subject: .. C C=US/postalCode=22230, ST=Virginia,
L= Arlington/street =4201WilsonBlvd,
O=National Science Foundation, OU=DIS,
CN=www . nsf . gov
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus :
00:ca:fb:26:78:06:25:b1:9e:67:1d:69:0b:10:06 :
cf: 25: b6: 7d: de :8e:56:80: e 1:1c:38:52:62:43:fd :
...
Exponent: 65537(0x10001)
Signature Algorithm: sha256WithRSAEncryption
4b:0d: 62:11:b4:dc:78:09:12:c1:1b:24:ff:98:43:58:1c:54 :
0a:34: be: 8f: 3f : 12:8f:17:4a: fe: 5b:26:13:1a: 5f:a7: 87:ad:
...
ba:2c: 10:c7:bc:8b:2c:15:6e:0c:d2:d0:8b:74:52:c8:ed:05:
ob: 9b:62:41
a) Who issues the certificate?
(b) Who is the owner of the certificate?
(c) Who generated the signature on this certificate, and how can this signature be verified?
(d) The public key contained in this certificate is based on the RSA algorithm. Using
the RSA algorithm, to encrypt a message M, we calculate Memodn. What is
the value of e and n in this public key? If a number is too large, you only need to
write down its first four bytes.
(e) Before issuing the certificate, the CA needs to do a verification regarding the subject
field. Please describe what this verification is, and why it is necessary.
 IV. There is an active connection between a Telnet client (10.0.2.5)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!