Open http://feathersup.com/ in a browser while capturing traffic and find out what User-Agent information did your machine
Fantastic news! We've Found the answer you've been seeking!
Question:
- Open http://feathersup.com/ in a browser while capturing traffic and find out what User-Agent information did your machine send to the server.
- Try using the "Follow TCP Stream" feature of Wireshark.
- What Level of the TCP/IP model does this information represent?
- Open https://feathersup.com while capturing traffic and find out what version of OpenSSL is used by the server.
- Try using the "Follow TCP Stream" feature of Wireshark.
- Lookup the Heartbleed bug and write a paragraph about the exploit
- Is it affected by the Heartbleed bug? Why or Why NOT?
- Review the reference to the netstat command
- Write a brief summary of what netstat does.
- Use the netstat -?command and provide a screenshot
- What does the option this provide?
- Use the netstatcommand and provide a screenshot
- How many TCP connections are there?
- How many are completed
- How many are in wait states
- What application protocols are being used?
- Use the netstat -bcommand and provide a screenshot (may require admin rights)
- What applications are listed andports are they using
- Does the port match the expected port for the application
- Use the netstat -ecommand and provide a screenshot (may require admin rights)
- Use the netstat -scommand and provide a screenshot of the UDP and TCP info (may require admin rights)
Related Book For
Managing Information Technology
ISBN: 978-0132146326
7th Edition
Authors: Carol Brown, Daniel DeHayes, Jeffrey Hoffer, Wainright Marti
Posted Date: