Question: This is the iptables: ============================================================================================================================= ubuntu@********:~/Desktop$ sudo iptables-save [sudo] password for ubuntu: # Generated by iptables-save v1.4.21 on ####*****##### *filter :INPUT ACCEPT [4236:288269] :FORWARD ACCEPT

 This is the iptables: ============================================================================================================================= ubuntu@********:~/Desktop$ sudo iptables-save [sudo] password for

This is the iptables:

=============================================================================================================================

ubuntu@********:~/Desktop$ sudo iptables-save [sudo] password for ubuntu: # Generated by iptables-save v1.4.21 on ####*****##### *filter :INPUT ACCEPT [4236:288269] :FORWARD ACCEPT [0:0] :OUTPUT ACCEPT [128324:138685455] -A INPUT -i eth0 -p tcp -m tcp --dport 22 -j ACCEPT -A INPUT -m state --state RELATED,ESTABLISHED -j ACCEPT -A INPUT -i eth0 -p icmp -j ACCEPT -A INPUT -i eth0 -j DROP -A FORWARD -s 192.168.56.0/24 -d 143.215.130.30/32 -j ACCEPT -A FORWARD -s 192.168.56.0/24 -d 54.202.185.61/32 -j ACCEPT -A FORWARD -s 192.168.56.0/24 -d 130.207.0.0/16 -j DROP -A FORWARD -s 192.168.56.0/24 -d 143.215.0.0/16 -j DROP -A FORWARD -s 192.168.56.0/24 -d 128.61.0.0/16 -j DROP -A FORWARD -p udp -m udp --dport 135:139 -j DROP -A FORWARD -p tcp -m tcp --dport 135:139 -j DROP -A FORWARD -p udp -m udp --dport 445 -j DROP -A FORWARD -p tcp -m tcp --dport 445 -j DROP -A FORWARD -s 192.168.56.0/24 -i vboxnet0 -o eth0 -m conntrack --ctstate NEW -j ACCEPT -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT COMMIT # Completed on ####******#### # Generated by iptables-save v1.4.21 on #####*****#### *mangle :PREROUTING ACCEPT [131240:215625640] :INPUT ACCEPT [131151:215615392] :FORWARD ACCEPT [78:4448] :OUTPUT ACCEPT [128324:138685455] :POSTROUTING ACCEPT [128953:138753426] -A POSTROUTING -o virbr0 -p udp -m udp --dport 68 -j CHECKSUM --checksum-fill COMMIT # Completed on ####****##### # Generated by iptables-save v1.4.21 on ####****##### *nat :PREROUTING ACCEPT [153:15158] :INPUT ACCEPT [98:7509] :OUTPUT ACCEPT [10318:676861] :POSTROUTING ACCEPT [0:0] -A PREROUTING -p tcp -m tcp --dport 25 -j DNAT --to-destination 143.215.130.30:25 -A POSTROUTING -j MASQUERADE COMMIT # Completed on ********************

What IP address CIDRs are not allowed to be communicated with by our malware? a. Hint: Cuckoo uses the IP addresses 192.168.56.1 and 192.168.56.101 to 1. connect the malware to the Internet. 2. What IP address is all email traffic forwarded to? 3. Do the rules accept SSH connections? (yes or no) 4. Do the rules allow the analysis machine to be ping'd on the eth0 interface? (yes or no) What IP address CIDRs are not allowed to be communicated with by our malware? a. Hint: Cuckoo uses the IP addresses 192.168.56.1 and 192.168.56.101 to 1. connect the malware to the Internet. 2. What IP address is all email traffic forwarded to? 3. Do the rules accept SSH connections? (yes or no) 4. Do the rules allow the analysis machine to be ping'd on the eth0 interface? (yes or no)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!