What ip address or addresses did the attacker use

Assignment Help Computer Networking
Reference no: EM131291783

Network Forensic

You are notified of a phishing email attempting to lure victims to a fictitious Federal Bank Online website. The Federal Bank Online is a division of Bank of Atlas which provides financial services to members of the U.S. federal government. The phishing email contains a link to a website purporting to be run by the Federal Bank Online. Bank of Atlas has confirmed that the site, hosted at IP address 12.184.79.86, is not an authorized site (all IP addresses and site names in this scenario are fictitious and do not represent any actual persons or organizations).

You contact the owner of the web server using IP address 12.184.79.86. The administrator states that he was unaware of the Federal Bank Online site being on his server and provides the following logs from the server. Analyze the logs and determine the following, citing specific log entries to support all of your answers:

1. How did the attacker gain access to the system? Provide as much detail as possible about the attack, the tool used, etc.

2. What IP address or addresses did the attacker use?

3. How did the attacker create the fictitious Federal Bank Online site on the server?

4. Was the attacker successful at his first attempt at creating the fictitious Federal Bank ?Online site?

5. Did the attacker create any other fictitious sites on the server?

6. Can you provide any other information about the attack that you feel is relevant?

Reference no: EM131291783

Questions Cloud

Would organizations have tried to drive ethical behavior : Think about the impact of the U.S. Sentencing Guidelines. Would organizations have tried to drive ethical behavior among employees without government encouragement?
Analyze the ethical culture at tap : Analyze the ethical culture at TAP. Does the culture appear to be in alignment? Misalignment?- Why did his culture change effort fail? What would it take for it to succeed?
What extent do mental disorders such as adhd : what extent do mental disorders such as Attention Deficit Hyperactivity Disorder (ADHD) and Post-Traumatic Stress Disorder (PTSD) affect learning among school going, children?How does such school going children behave when learning, especially, in ..
What types of physical security measures are in place why : What types of physical security measures are in place? Why? What specific tools or hardware are used for physical security? Why? How effective is the process to administer physical security?
What ip address or addresses did the attacker use : What IP address or addresses did the attacker use? How did the attacker create the fictitious Federal Bank Online site on the server? Was the attacker successful at his first attempt at creating the fictitious Federal Bank ?Online site?
How cloud technology could align with the companys business : Create a workflow diagram to illustrate how analytics and cloud technology could align with the company's business processes. Note: The graphically depicted solution is not included in the required page length.
What is the maximum rate of change of the elevation : If you are at the point (60,100) in what direction is the elevation changing fastest? What is the maximum rate of change of the elevation at this point?
Active directory replication topology for your company : How do you choose the appropriate Active Directory replication topology for your company? What kinds of problems do you want to prevent? Give examples. Please explain in approximately in two paragraphs.
Discuss about the diversity issues in career counseling : Discuss about the Diversity Issues in Career Counseling.A discussion of each of the following and discuss why is it important that all forensic psychologists need to be well-versed in them:Specific Amendments to the U.S. Constitution and why they ar..

Reviews

Write a Review

Computer Networking Questions & Answers

  What is the implication of the switch-over to

when will the switch-over from ipv4 to ipv6 happen? what is the implication of the switch-over to companies? nbspassume

  Explain the osi model and tcp-ip protocol

Define and explain the OSI model, TCP/IP protocol, File transfer protocol, or wireless workstation giving examples of its usage and explaining its' background and history

  Dynamic routes using rip protocol

To define the addressing scheme of the company XYZ network you will indicate: The subnet mask selected, the maximum number of subnets provided by the selected subnet mask

  Explain multiprogramming and time-sharing environment

Write down two such problems? Can we make sure same degree of security in time-shared machine as in dedicated machine?

  Research on wireless standards

Research the 802.11 wireless standards, select 3 implementations (802.11e, 802.11i, 802.11n, 802.11ac, etc.), and describe each of them in 1-2 paragraphs.

  Small internet works prepare a network simulation you will

small internet works prepare a network simulation. you will first be build the existing office network. next you will

  Explain physical address and ip address of a computer

The "ping" command is a computer network tool used to test whether a particular host is reachable across an IP network.

  Write a code for a function called mean

Write a code for a function called mean() that is passed by an army of double called my[], and the size n. Return the mean of the function.

  How company can back up and protect network data

Develop the disaster plan for selected organization which includes how you would suggest company back up and protect network data.

  Evaluate security implication of implementing virtualization

Discuss why virtualization is gaining so much popularity, and compare it with other types of networks that are currently available - Evaluate security implications of implementing virtualization. With reasons, recommend a typical virtualisation set..

  Based on the kercher 2010 article explain how can windows

question 1 based on the greiner 2010 article how can microsoft windows azuretm manage file services?question 2 based on

  Design a lan for firm with five departments in one building

You have been asked to design a LAN for very successful CPA firm with 5 departments in one building and total of 500 employees.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd