Preview

ISS Week 3 Vlab 1

Satisfactory Essays
Open Document
Open Document
136 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
ISS Week 3 Vlab 1
Week 3 Vlab 1
Emerson Yepez
PART 1

PART 2

PART 3

Challenge

Assesment
1. Why would a network administrator use Witeshark and NetWitness Investigator together?
To be able to see all the packets that come in and out on the Network
2. What was the IP address for LanSwich1?
172.30.0.15
3. When the 172.16.8.5 IP host responded to the ICMP echo-request, how many echo-reply packets were sent back to the workstation?
8
4. What was the password for LanSwich 1 and LanSwich 2?
P@ssw0rd!
5. When using SSH to remotely access a Cisco router, can you see the terminal password? why or why not?
Not showing the password, SSH is a secure connection
6. What were the destination IP addresses discovered by the netwitness investigator analysis?
172.30.0.15
172.16.8.5
224.0.0.252
172.30.0.2
172.16.0.255
172.16.20.5
7. Are packet capturing looks like whiteshark less dangerous on switch LANs?
I don’t belive so, it’s a brute attack either way

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    b. SYN-ACK: In response, the server replies with a SYN-ACK. The acknowledgment number is set to one more than the received sequence number, and the sequence number that the server chooses for the packet is another random number.…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Is317 Lab #3 Questions

    • 430 Words
    • 2 Pages

    It traces the routes packets from the user to the target, it shows a packets hops to the target, and they target the host address.…

    • 430 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Lab 12

    • 3059 Words
    • 13 Pages

    In this lab you will use the Wireshark packet analyzer to capture and display the control information and data stored in packets transmitted over a network. Wireshark collects network traffic data and creates files that display packet header information in a layered format like that used by the Internet model. These layers can be expanded to view details that may prove helpful in determining the source of problems that your network might be experiencing. Creating filters that hide unwanted data and facilitate data analysis will also be discussed in this lab.…

    • 3059 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    notes for ISS 220

    • 321 Words
    • 2 Pages

    -Pascual Orozco (1882-1915)-managed to make good fortune for himself in mining in Chuhuahua and Pancho Villa (1878-1923) from Durango Centaur of the North…

    • 321 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    and identify the devices on the network and the operating systems and services running on them.…

    • 652 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It is also important to explore the device(s) that were targeted by the attack. In this instance, being the SMB server within the LAN. The SMB server utilizes an application layer network protocol, which can run atop the session layer. It provides shared access to files, printers, serial ports, and network nodes (workstations, laptops, desktops, etc.) and provides a client/server relationship throughout the network. This means that every domain layer of the IT Infrastructure…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Chapter 9 ISS

    • 620 Words
    • 3 Pages

    6 Identify a security principle that can be satisfied with an asymmetric digital signature and not by a symmetric signature.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Also large numbers of packets caught by your router or firewall's egress filters. Remember that egress filters prevent spoofed packets from leaving your network, so if your filter is catching them you need to identify their source, because that's a clear sign that machines on your network have been compromised. Unscheduled reboots of server machines may sometimes signify that they are compromised as well. You should already be watching the event logs of your servers for failed logons and other security-related events.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Module 5 Lab (5.09)

    • 487 Words
    • 2 Pages

    Your first lab link can be found at Temper Tantrums. A written transcript is also available for this lab.…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    ISS 418 Lab 7 and 8

    • 1105 Words
    • 5 Pages

    When you want to enable a Linux Kernel command and enable it immediately without a physical re-boot of the system, what command must you enable in front of the command parameter? Explain what the following command will do : echo “1” > /proc/sys/net/ipv4/ip_forward…

    • 1105 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Refining Solutions

    • 947 Words
    • 4 Pages

    A program that allows people to see how computers on the network are running, allowing the opportunity for regular maintenance on systems. There is also the ability to contact a professional immediately and have help with any possible problems that might be at hand.…

    • 947 Words
    • 4 Pages
    Good Essays
  • Good Essays

    3. Did the targeted IP hosts respond to the ICMP echo-request packet with an ICMP echo-reply packet when you initiated the “ping” command at your DOS prompt? If yes, how many ICMP echo-request packets were sent back to the IP source?…

    • 1091 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    This paperwork of SCI 207 Week 2 Laboratory 1 shows the solutions to the following problems:…

    • 488 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Acn Working

    • 3420 Words
    • 14 Pages

    1. Ping: Ping sends an ICMP ECHO_REQUEST packet to the specified host. If the host…

    • 3420 Words
    • 14 Pages
    Powerful Essays