Question: Note: Pls include screenshots and detailed explanations to receive a thumbs-up. Thank you. Task 2.2B: Spoof an ICMP Echo Request. Spoof an ICMP echo request

Note: Pls include screenshots and detailed explanations to receive a thumbs-up. Thank you. Note: Pls include screenshots and detailed explanations to receive a thumbs-up. Thank

Task 2.2B: Spoof an ICMP Echo Request. Spoof an ICMP echo request packet on behalf of another machine (i.e., using another machine's IP address as its source IP address). This packet should be sent to a remote machine on the Internet (the machine must be alive). You should turn on your Wireshark, so if your spoofing is successful, you can see the echo reply coming back from the remote machine. Questions. Please answer the following questions. Question 4. Can you set the IP packet length field to an arbitrary value, regardless of how big the actual packet is? Question 5. Using the raw socket programming, do you have to calculate the checksum for the IP header? Question 6. Why do you need the root privilege to run the programs that use raw sockets? Where does the program fail if executed without the root privilege

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!