Let''s find the ip address that goes along with a domain name

Assignment Help Computer Networking
Reference no: EM13926486

This assignment can be done using either Windows (XP, Vista, 7, or 8), Mac OS/X, or Linux.

If you have a choice, please use Windows. Marked out of 60.

1. Let's see what command line utilities can tell us about a computer and its network activity.

Connect to the internet and surf around a little. Then go to Command Prompt on your computer (if you're using Windows XP,

Vista, or 7 you'll find it under Accessories - in Windows 8 it's an app under Windows System). To close the window type exit. If

you're using a Mac open a Terminal. Then do the following:

a. Let's see how a ping works. Type in ping www.independent.ie - copy and submit the result. How can the good and bad guys

use a ping?

b. Let's find the IP address that goes along with a domain name. Type in nslookup whitehouse.gov - copy and submit the

result. How can the good and bad guys use this information?

c. Finally let's try whois. On Windows you'll have to use a third party utility. Go to whois.net and type in flemingcollege.ca - Mac

users can enter whois trentu.ca in the Terminal.

Copy and submit the Technical Contact information. How can the good and bad guys use this type of information?

2. [16 marks] Let's see what we can find by using the traceroute and IP address utilities. Go to https://www.monitis.com

/traceroute/ and enter the URL for the Sydney Morning Herald newspaper in Australia at https://www.smh.com.au. This will give

you the path from North America, Europe, and Asia to the newspapers servers.

Go to the North American and Europe paths and check the IP addresses to see where the message went. If you mouse over

the stops it will give you the IP address.

Take the IP address and go to https://whatismyipaddress.com/ , go to the grey box in the top right of the page and enter the

IP address and see what it says.

a.  List the cities (if known - determined from IP address search) shown in the trace for North America and do the same for the

European trace.

b. Is there anything surprising with where the paths end? What does this mean?

c. Do several traces for the Sydney Morning Herald. Are the paths always the same? Why is that?

3. Let's see how files are stored on a computer. Windows users should go to https://www.hexworkshop.com/ and download the

latest demo version of Hex Workshop. Mac and Linux users should go to https://www.sweetscape.com/010editor/ and download

the free trial version of the 010 Editor. Install the software on your computer. Open the hex editor.

The left panel will contain addresses, the middle panel contains the bit values stored (in hexadecimal) and the next panel

contains possible character values for the bits stored.

See my clip on Hex Workshop on Blackboard.

a. Most files have signatures so that the computer knows what kind of a file it is so let's see what some common signatures are.

Open a pdf file - what are the first few hex digits you see?

Some files also have trailers that tell the computer that the file has ended. What is the trailer for a pdf file in hex?

b. Then open an rtf file (Word can make this type of file) -

what do you think the signature is for this file in hex?

c. A good way to see if a file has been altered is to do a checksum. Open the file 4550fin-13.doc posted to Blackboard in Hex

Workshop.

Go to Tools and then Generate Checksum. Select CRC (32 bit) as your algorithm, select Entire Document, and generate the

checksum.

How many digits are there in the hex checksum?

What is the checksum in hex? Do another checksum only this time select SHA-2 (512 bit) (or SHA512 in 010 editor) as the

algorithm.

How many digits are there in the hex checksum? What are the first 7 digits of this hex checksum?

d.  Now let's see what effect changing the content of the file has on the checksum.

Save the 4550fin-13.doc file (in case we need it in court) and use a copy of the file for this step.

Go to the right pane in Hex Workshop and change the first letter of the document text from upper case to lower case (i.e.

Trent to trent).

What is the hex checksum CRC (32 bit) and what are the first 7 digits in hex using SHA-2(512 bit)?

How much did the checksums change?

e. Let's see what effect changing the file name has on the checksum.

Save the 4550fin-13.doc file (the original version that was not altered in part (d)) as test.doc then run the CRC (32 bit) and

SHA-2 (512 bit).

How much did the checksums change?

f. Now let's try to recover corrupted files using our hex editor.

Try to open the corrupted1.jpg file. Now use your hex editor and try to figure out why it doesn't open.

Make the needed changes needed to open the file.

What did you do to fix the image?

Describe the picture. (Hint: use your hex editor to open similar image file types and check their signatures).

g.  Now try to open the corrupted2.doc file. Use your hex editor and try to figure out why it doesn't open.

Make the needed changes needed to open the file.

What did you do to fix the file? Describe the contents of the file.

4. [16 marks] Let's do some risk analysis on your own information assets.

a.  List any information that you store on a computer system

(school, financial, social, etc.) that you use and which would be expensive, inconvenient, or impossible to replace if it was lost,

damaged or stolen.

b. Next consider what the impact would be if the information was stolen or lost and what the likelihood is that the information

could be stolen or lost.

Now categorize your information as one of: High impact- High likelihood, High impact - Low likelihood, Low impact - High

likelihood or Low impact and Low likelihood.

State why you think the information fits in that category.

c. Now let's look at how we can manage the risk. Basic techniques are: avoiding the risk, modifying the risk (impact and/or

likelihood), transferring the risk to others, and accepting the risk.

We don't need to worry about Low impact-Low likelihood items but for the rest of them we need to consider how you can

manage your risk.

What techniques would you use and how would you implement it?

 

Reference no: EM13926486

Questions Cloud

Electronic surveillance of employees : Although the law on employee privacy rights is still developing, various federal and state laws limit and define what employers can do when monitoring their employees (Dillon, Hamilton, Thomas, & Usry, 2008). Under federal and most state law, ther..
Firm market value capital structure : What is the firm's market value capital structure? (Round your answers to 4 decimal places. (e.g., 32.1616))
Child in order for the child to take advantage of the family : Explain If It Matters That a Parent Literally Had Nothing to Do With a Biological, Child in Order for the Child to Take Advantage of the Family and
Claims filed using the equation for poisson probability : Suppose Alden wrote 400 policies for the forthcoming weekend. Compute the probability that exactly two claims will be filed using the equation for Poisson Probability.
Let''s find the ip address that goes along with a domain name : Let's see how a ping works. Type in ping www.independent.ie - copy and submit the result. How can the good and bad guys use a ping?
How do they achieve their goals and functions : Write a 750-1000 word paper in APA style which explores the following questions: Research a day reporting center in your state. What is the goal of the day reporting center? How do they achieve their goals and functions
What is the value of the ksp : 1. A saturated solution of Cu(OH)2 at 85Celsuis has [Cu2+] = 0.013M and [OH-] = 0.026M. What is the value of the Ksp for Cu(OH)2 at 85 Celsuis?
State the optimal solution : Southern Sporting Good Company makes basketballs and footballs. Each product is produced from two resources rubber and leather. The resource requirements for each product and the total resources available are as follows:  a. State the optimal solu..
Determining the speed of the wave pulse : 1) What is the speed of the wave pulse? 2) What is the tension in the slinky? 3) What is the average speed of a piece of the slinky as a complete wave pulse passes?

Reviews

Write a Review

Computer Networking Questions & Answers

  How linked-state protocol routing works

Question 1: How do routing protocols work? Question 2: What are 2 examples of linked-state routing protocols?

  Fault tolerance for communicating between the floors

fault tolerance for communicating between the floors

  Access control lists

Per the text, ACLs help by allowing or disallowing a subset of packets from reaching a particular destination. ACLs give network engineers a way to identify and control different types of packets.

  A name the url of the document requested by the browser

consider the following string of ascii characters that were captured by wireshark when the browser sent an http get

  Spanning tree protocol

Its primary purpose is to determine the configuration of devices and to allow different network-layer protocols to learn about each other. Using deductive reasoning, provide three (3) examples that demonstrate the value of CDP when troubleshooting..

  Illustrate direct mapping and address bits for tag field

The main memory of a computer is organized as 128 blocks, with a block size of 16 words. The cache has eight block frames. Illustrate direct mapping and address bits that recognize the tag field, the block number, and the word number.

  List the benefits of the solution

List the benefits of the solution. Ensure that this solution will eliminate all interoffice toll charges. The design and the implemented solution should not adversely affect the network performance across the WAN. Diagram your proposed network lay..

  You were tasked to handle the urgent delivery

You were tasked to handle the urgent delivery of 10TB of data from your company in Washington, D.C to a subsidiary in San Francisco, CA (2,815 miles away).

  Name two different kinds of encryption supported by the gpg

question 1 name two different types of encryption supported by gpg for your key.question 2 what happens when you sign

  Differences between versions of windows server

Develop a report on the differences between the various versions of Windows 2003 Server - Web Edition, Standard Edition, Enterprise Edition, Datacenter Edition

  Write a paper based on emerging network security solutions

Write a paper based on emerging (future/important) network security solutions.

  P, does the congruence x^2 congruent to -1 mod p

1. For what prime numbers, p, does the congruence x^2 congruent to -1 mod p have exactly 2 solutions mod p. Prove it.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd