Preview

Ethical Hacking Lab

Satisfactory Essays
Open Document
Open Document
445 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Ethical Hacking Lab
-------------------------------------------------

-------------------------------------------------
Lab Exercise #2

4500 0028 bc90 0000 3606 5953 43e4 6e78 ac10 1080 0050 0d23 3108 8a5f 7bf0 d439 5011 0047 279b 0000 1703 0100 4856

4500 0028 72f3 4000 8006 18f0 ac10 1080 43e4 6e78 0d23 0050 7bf0 d439 3108 8a60 5010 107a 1768 0000

4500 0028 72f6 4000 8006 18ed ac10 1080 43e4 6e78 0d23 0050 7bf0 d439 3108 8a60 5011 107a 1767 0000

4500 0028 bc91 0000 3606 5952 43e4 6e78 ac10 1080 0050 0d23 3108 8a60 7bf0 d43a 5010 0047 279a 0000 1703 0100 4856

1. Complete the following table for the four frames above:

| Frame 1 | Frame 2 | Frame 3 | Frame 4 | Version (IPv4 or IPv6) | 4 | 4 | 4 | 4 | Header Length (in bytes) | 20 | 20 | 20 | 20 | Total Length of IP Header | 40 | 40 | 40 | 40 | Time To Live | 54 | 128 | 128 | 54 | Protocol | TCP | TCP | TCP | TCP | Source IP Address | 67.228.110.120 | 172.16.16.128 | 172.16.16.128 | 67.228.110.120 | Destination IP Address | 172.16.16.128 | 67.228.110.120 | 67.228.110.120 | 172.16.16.128 | Source Port | 80 | 3363 | 3363 | 80 | Destination Port | 3363 | 80 | 80 | 3363 | Flags Set | ACK/FIN | ACK | ACK/FIN | ACK | Sequence Number | 822643295 | 2079380537 | 2079380537 | 822643296 | Acknowledge Number | 2079380537 | 822643296 | 822643296 | 2079380538 |

2. Copy the capture2 pcap file into the home folder in BTR3. 3. Launch a terminal window. 4. Enter the following command to view the pcap file in hexadecimal format (-x) using absolute, instead of relative, TCP sequence numbers (-S).

------------------------------------------------- tcpdump -r capture2 –xS

5. Analyze the output to check your answers in the table you completed above.

6. Enter the following command to determine how many packets were sent from 67.228.110.120

You May Also Find These Documents Helpful

  • Powerful Essays

    Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    In the Screenshot above, cdn2 has a different IP (54.230.2.234) in one case and cdn0 also has a different IP (54.230.3.190) for three different objects. o Now, because we parse har file w.r.t host name and pcap w.r.t IP, all three of cdn0, cdn2, cdn3 have same TCP connections in the table as they have same IPs. o Better way to read this would be to consider only non-zero download size connections for each of these three domains. Haven’t implemented it to avoid irregularity in the table.…

    • 2486 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    orgo lab

    • 993 Words
    • 4 Pages

    The results of the experiment show a percent yield of 34.34% for the first trial (Part A), and a percent yield of 84.0% for the second trial (Part B). The methods for both trials were generally the same, so the large difference is attributed to the fact that the beaker broke before the gravity-filtering step in the first trial. The beaker was attempted to be picked up by the beaker tongs, but as the hot solution was being poured into the filter, the beaker slipped out of the beaker tongs and shattered, leaving some of the product unfiltered and thus not accounted for in the final product. Although the methods were generally similar in both steps, the gravity filtration step was skipped over in the second trial, which may have accounted for the missing 16% in trial 2, but may have also accounted for the overall relatively high percent yield for this trial. Luckily, the actual melting point of benzoic acid fit within the recorded average…

    • 993 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The List Pane shows the packets that have been captured. The Tree View Pane shows the headers of various protocols encapsulated in the packet. The Tree View Pane also allows the hierarchical view of the header field details. The Byte View Pane shows the raw data sixteen (10 Hex) bytes per row.…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Epic Hacking Research Paper

    • 3326 Words
    • 14 Pages

    On Friday Aug.3.2012 Mat Honan’s personal Computer (PC) system was invaded by hackers. In the space of one hour, Mat’s entire digital life was destroyed. First his google account was taken over, then deleted. Next his twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, Honan’s Apple ID account was broken into, and his hackers used it to remotely erase all of the data on his IPhone, IPad, and MacBook.…

    • 3326 Words
    • 14 Pages
    Better Essays
  • Better Essays

    Analyze the security issues and the HIPAA security requirements and describe the safeguards that the organization needs to implement in order to mitigate the security risks. Ensure that you describe the safeguards in terms of administrative, technical, and physical safeguards.…

    • 1284 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Ethics Case Study

    • 824 Words
    • 3 Pages

    Dr. Williams assistant Jerry does have the training but does not have the ability to make a call for a patient because if he prescribed the wrong dosage amount then there will be in trouble with the patient and also with HIPAA. It will not be in the best interest of Jerry to make this call for Dr. Williams without making a call to Dr. Williams first. In order for this to happen without breaking any laws, Jerry needs to have communication with Dr. Williams. To keep the integrity of office Jerry should ensure that the proper medication and make sure that it is the patient’s correct prescription if Dr. Williams gives the okay for jerry to provide the Valium for the patient. This might have to be a medication that this patient have to go without on his trip.…

    • 824 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Ethics Case Study

    • 819 Words
    • 4 Pages

    Medical laws have been put into place to protect not only the patient, but also the physicians, nurses, and medical office staff. The laws were put into place to ensure that these professionals follow the correct procedures and steps that only qualified persons follow. The definition of practicing medicine has also been clearly explained. Those professionals who do not abide by these set laws are therefore subject to punishment by law (Baxter 2005).…

    • 819 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Ethics Class Case Study

    • 1044 Words
    • 5 Pages

    The basis in the case of Vo v. City of Garden Grove lies within the debate of what is more important the right of free speech, which is given to all American’s as a right under Article 1 in the Constitutional Amendments, or safety of those using the internet cafes in question. Personal safety is not mentioned in the constitution, but as The United State of America’s second President, John Adams, said in 1798, “our constitution was made only for moral and religious people. It is wholly inadequate to the government of any other.” (Joe, 2005). Although the courts sided with the City of Garden Grove, one judge dissented, saying that the decision infringed upon the right to free speech.…

    • 1044 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Warehouse Profiling Case

    • 1329 Words
    • 6 Pages

    WHERE (((ques7.C) Is Null) AND ((ques7.D) Is Null) AND ((ques7.E) Is Null) AND ((ques7.G) Is Null));…

    • 1329 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Penetration-Testing

    • 14938 Words
    • 60 Pages

    tools, both commercial and free. In this thesis a selection of such tools are tested…

    • 14938 Words
    • 60 Pages
    Good Essays
  • Powerful Essays

    Penetration Testing

    • 3406 Words
    • 14 Pages

    Penetration testing has been well popularized by the media. Many companies are now offering penetration services to identify vulnerabilities in systems and the surrounding processes. This report will Discuss "Penetration Testing" as a means of strengthening a corporate network's security. This report is divided into three parts. Introduction will give you a brief and basic overview of Penetration Testing and why we need Penetration Testing, The second part is the technical breakdown explains The strategy, model and type of Penetration Testing. In the conclusion, we will discuss both the value and limitation of Penetration Testing.…

    • 3406 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Ethics of Hacking

    • 275 Words
    • 2 Pages

    Cracking is the correct concept for deconstructing/sabotaging in the cyberspace/Internet, e.g. by circumventing the security of a website and posting your own (critical) stuff on their site or spreading viruses in the Internet. Hacking, on the other hand, is about using and reconstructing the computer or other machines/systems in a new and (by the "owners" and "inventors") unintended way. Hacking is about reclaiming the system, manipulating it and using it, not destroying it. Both terms define people who can break into computer systems and rewrite programs, but hackers do not use their knowledge offensively or illegally. Crackers use their skills for illegal use: distributing pirated materials, stealing money and identities, etc.…

    • 275 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Computer hacking is a term that most everyone in today’s society is familiar with. When the average person hears news about computer hacking, most likely they think about cyber-crimes, website defacements, or knocking various websites offline. This inaccurate description is just the image that today’s media creates. In reality, true hackers are much different. Computer hacking is not the only type of hacking in today’s society. Hacking actually originated from phreaking, which is the art of cracking a telephone network (“A Brief History of Computer Hacking”). Hacking is seen as being blackhat, or wrong, when hacking can also be beneficial to the world. There are different types of computer hackers: “Hacktivists,” ones who hack to express a political opinion, “Hobbyist” hackers, those who hack for enjoyment, and “Research hackers,” those who hack to learn about security and fix vulnerabilities (“License to hack? - Ethical hacking”).…

    • 2912 Words
    • 8 Pages
    Better Essays