Question: Note: Pls include screenshots and detailed explanations to receive a thumbs-up. Thank you. Task 2.2B: Spoof an ICMP Echo Request. Spoof an ICMP echo request
Task 2.2B: Spoof an ICMP Echo Request. Spoof an ICMP echo request packet on behalf of another machine (i.e., using another machine's IP address as its source IP address). This packet should be sent to a remote machine on the Internet (the machine must be alive). You should turn on your Wireshark, so if your spoofing is successful, you can see the echo reply coming back from the remote machine. Questions. Please answer the following questions. Question 4. Can you set the IP packet length field to an arbitrary value, regardless of how big the actual packet is? Question 5. Using the raw socket programming, do you have to calculate the checksum for the IP header? Question 6. Why do you need the root privilege to run the programs that use raw sockets? Where does the program fail if executed without the root privilege
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
