What ip address or addresses did the attacker use

Assignment Help Computer Networking
Reference no: EM131291783

Network Forensic

You are notified of a phishing email attempting to lure victims to a fictitious Federal Bank Online website. The Federal Bank Online is a division of Bank of Atlas which provides financial services to members of the U.S. federal government. The phishing email contains a link to a website purporting to be run by the Federal Bank Online. Bank of Atlas has confirmed that the site, hosted at IP address 12.184.79.86, is not an authorized site (all IP addresses and site names in this scenario are fictitious and do not represent any actual persons or organizations).

You contact the owner of the web server using IP address 12.184.79.86. The administrator states that he was unaware of the Federal Bank Online site being on his server and provides the following logs from the server. Analyze the logs and determine the following, citing specific log entries to support all of your answers:

1. How did the attacker gain access to the system? Provide as much detail as possible about the attack, the tool used, etc.

2. What IP address or addresses did the attacker use?

3. How did the attacker create the fictitious Federal Bank Online site on the server?

4. Was the attacker successful at his first attempt at creating the fictitious Federal Bank ?Online site?

5. Did the attacker create any other fictitious sites on the server?

6. Can you provide any other information about the attack that you feel is relevant?

Reference no: EM131291783

Questions Cloud

Would organizations have tried to drive ethical behavior : Think about the impact of the U.S. Sentencing Guidelines. Would organizations have tried to drive ethical behavior among employees without government encouragement?
Analyze the ethical culture at tap : Analyze the ethical culture at TAP. Does the culture appear to be in alignment? Misalignment?- Why did his culture change effort fail? What would it take for it to succeed?
What extent do mental disorders such as adhd : what extent do mental disorders such as Attention Deficit Hyperactivity Disorder (ADHD) and Post-Traumatic Stress Disorder (PTSD) affect learning among school going, children?How does such school going children behave when learning, especially, in ..
What types of physical security measures are in place why : What types of physical security measures are in place? Why? What specific tools or hardware are used for physical security? Why? How effective is the process to administer physical security?
What ip address or addresses did the attacker use : What IP address or addresses did the attacker use? How did the attacker create the fictitious Federal Bank Online site on the server? Was the attacker successful at his first attempt at creating the fictitious Federal Bank ?Online site?
How cloud technology could align with the companys business : Create a workflow diagram to illustrate how analytics and cloud technology could align with the company's business processes. Note: The graphically depicted solution is not included in the required page length.
What is the maximum rate of change of the elevation : If you are at the point (60,100) in what direction is the elevation changing fastest? What is the maximum rate of change of the elevation at this point?
Active directory replication topology for your company : How do you choose the appropriate Active Directory replication topology for your company? What kinds of problems do you want to prevent? Give examples. Please explain in approximately in two paragraphs.
Discuss about the diversity issues in career counseling : Discuss about the Diversity Issues in Career Counseling.A discussion of each of the following and discuss why is it important that all forensic psychologists need to be well-versed in them:Specific Amendments to the U.S. Constitution and why they ar..

Reviews

Write a Review

Computer Networking Questions & Answers

  What is the rationale for acquiring professional credentials

List and describe the criteria for selecting information security personnel

  Kinds of business applications in networked business office

Write down types kinds of business applications would you deem significant in networked business office? What kinds of network servers and resources would be essential to run these business applications?

  What factors might cause peak loads in a network

What factors might cause peak loads in a network?  - How can a network designer determine if they are important, and how are they taken into account when designing a data communications network?

  Similarities between each osi layer and the secret letter

Describe any similarities between each OSI layer and the secret letter being sent to your fellow agent. A hint for several of the layers: Think about the address on an envelope. What part(s) are similar to the idea of a data frame? What parts are ..

  Why may the client program be executed

For the client-server application over TCP why must the server program be executed before the client program? why may the client program be executed before the server program.

  Describe the fundamental components of a distributed system

Describe the fundamental components of a distributed system

  What are the downsides to using social media

What are the downsides to using social media

  What is the protocol overhead

What is the protocol overhead (stated as a percentage) - Perform the same calculation, this time assuming both clients are using IPv6.

  What topology used in the manufacturing area to solve

What topology and which type of device can be used in the manufacturing area to solve the cabling difficulties?

  Discuss about the given videos and write about the company

Discuss about the videos and write about the company. Needs to write two paragraph of each parts 1, 2 and 3.

  What a day in life of network administrator would look like

Create a 1-page procedure using Microsoft Word detailing what a day in the life of a network administrator would look like, all of the daily tasks that your team would expect to do.

  Analyse four security procedures that are recommended to

analyse four security procedures that are recommended to protect computer software from corruption and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd