Question: On IT - Laptop, scan your local network to determine potential vulnerabilities. Use Zenmap to display the operating systems of devices on the 1 9

On IT-Laptop, scan your local network to determine potential vulnerabilities.
Use Zenmap to display the operating systems of devices on the 192.168.0.0/24 network.
Answer Question 1.
On ITAdmin, use net view to check for unauthorized shared folders on CorpFiles16.
The only authorized shares are Confidential, Departments, and Backup.
Answer Question 2.
On IT-Laptop, simulate a TCP SYN flood attack using hping3 and analyze the packets with Wireshark.
Use Wireshark to capture packets on the enp2s0 network interface.Use the filter, tcp.flags.syn==1, to show just TCP SYN packets.Use hping3 to launch a SYN flood attack against rmksupplies.com.After gathering packets for several seconds, stop the packet capture and cancel the SYN flood attack.Examine a TCP SYN packet with the destination address of 208.33.42.28.Answer Question 3.
On IT-Laptop, find employees' personally identifiable information (PII) in clear text via email.
Use Wireshark to capture packets on the enp2s0 network interface.Find packets containing the following PII information:
Social security numbers (SSN)Birth datesMother's maiden name
Answer Question 4.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!