Question: Open http://feathersup.com/ in a browser while capturing traffic and find out what User-Agent information did your machine send to the server. Try using the Follow
- Open http://feathersup.com/ in a browser while capturing traffic and find out what User-Agent information did your machine send to the server.
- Try using the "Follow TCP Stream" feature of Wireshark.
- What Level of the TCP/IP model does this information represent?
- Open https://feathersup.com while capturing traffic and find out what version of OpenSSL is used by the server.
- Try using the "Follow TCP Stream" feature of Wireshark.
- Lookup the Heartbleed bug and write a paragraph about the exploit
- Is it affected by the Heartbleed bug? Why or Why NOT?
- Review the reference to the netstat command
- Write a brief summary of what netstat does.
- Use the netstat -?command and provide a screenshot
- What does the option this provide?
- Use the netstatcommand and provide a screenshot
- How many TCP connections are there?
- How many are completed
- How many are in wait states
- What application protocols are being used?
- Use the netstat -bcommand and provide a screenshot (may require admin rights)
- What applications are listed andports are they using
- Does the port match the expected port for the application
- Use the netstat -ecommand and provide a screenshot (may require admin rights)
- Use the netstat -scommand and provide a screenshot of the UDP and TCP info (may require admin rights)
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
