What version of ssh is the target running

Assignment Help Computer Network Security
Reference no: EM131772438

Assignment 1

Overview

Throughout this class we will use 2 Virtual machines.

One machine will act as the attacker machine one machine will be the victim machine. This will allow us to practice in a controlled environment, if you do not follow the instructions this can lead to your account being banned on Fordham's Network.

Requirements

• The lab prep lab must have been completed before proceeding

• Ensure both network adapters on Kali and the Metasploitable virtual machines are set to a private network or host only network depending on your virtual

o This ensures the traffic never leaves your laptop
o Remember Fordham's network does have security systems which can flag your machine for malicious activity

• Metasploitable will be referred to as the target

• Document the IP addresses of each system

o Kali -
o Metasploitable -

• Only run these commands against your target machine metasploitable!

• Scanning Fordham's network will get you blocked.

• Use NMAP Commands from the presentation to complete the lab

Tasks

• Preform and document the steps outlined below
• Use the technical documentation examples as inspiration for formatting of the lab document
• Reflection should be at least one page long

Design

1617_Design.jpg

NMAP Basics

1. Perform a SYN Scan
2. Preform a Connect Scan
3. Perform an XMAS Tree Scan
4. Scan the system to discover operating system
5. Run a scan to show service version
6. Run a scan using the text list option
7. Run the banner script
8. Output the results to a text file
9. Grep those results to find open ports
10. Run 3 more different scans and document the results

Information Gathering

• Which ports are open on the target?
• What version of SSH is the target running?
• What version of FTP is the target running?
• What is port 5900 used for on the target?
• What OS is running on the target?
• How could you run stealth scan on the target?
• What is some other information you gathered from NMAP

Reflection

• Why would you want to detect NMAP activity on your network?
• How can NMAP be used to troubleshoot?
• Why is this tool useful from a network perspective?
• Why is this tool useful from a security perspective?

Assignment 2

Overview

The following lab will require the use of wireshark to show proficiency in network traffic analysis. Document the instructions and analysis outlined below. Complete all tasks below, provide explanation on how you identified your answers.

You should write a report responding and explain all questions and points outlined below. Screenshots should be used but sparingly and only of the relevant information not your whole desktop.

Accessing wireshark in SecOnion - Terminal wireshark

Task 1:

Instructions

• Start a wireshark capture
• Navigate to an HTTP Site (non HTTPS)
• Stop the capture

Analysis

• Create a filter for all HTTP Traffic

o What is the user agent string used?
o Was TCP or UDP used to communicate to google?
o What HTTP methods were used in the traffic?
o Use a TCP stream to view the images transferred

• Create a filter for all DNS Traffic

o Provide a screenshot of the response for the DNS request
o Was TCP or UDP used to communicate to google?
o What was the DNS server that was queried?

• Create a filter for ARP Traffic

o Why did this occur?

• Identify the three way handshake

o Show which TCP flags were used

Task 2:

Instructions

• Start a wireshark capture
• run the ping command to yahoo.com
• Stop the capture

Analysis

• Create a filter to display ICMP traffic
• What ICMP codes were used?

Task 3:

This is a capture of a client connecting to a simple HTTP webpage.

Instructions

• Open the BasicHTTPTraffic.pcap into wireshark

Analysis

• What is the OS and Web architecture used on the server?

• Follow the HTTP Stream

o What is the title of the page that was visited?

• Why doesn't this capture have any ARP Packets?

Task 4:

This is a capture of a telnet communication to a server

Instructions

• Open the telnet-raw.pcap into wireshark
• Filter on telnet
• Follow the TCP stream

Analysis

• What is the login username?
• What is the password?
• What Warning was issued?
• What OS is the server?
• When was the last login?
• What site was pinged?
• How many packets were transmitted in the ping?

Reference no: EM131772438

Questions Cloud

Why was the professor announcement a blunder : A statistics professor once made a big blunder by announcing to his class of about 50 students that he was fairly certain that someone in the room would share.
Define the process used to evaluate system changes : Define the process used to evaluate system changes, including any effect on budgeting and resources, such as time or people, or the severity of the change.
Describe the gambler fallacy in brief : Suppose a friend reports that she has just had a string of "bad luck" with her car. She had three major problems in as many months and now has replaced.
Explain the tax consequences if the shares are held by trust : Explain the tax consequences if the shares are held by the trust at the time Mrs. B dies
What version of ssh is the target running : What version of SSH is the target running? What version of FTP is the target running? What is port 5900 used for on the target? What OS is running on target?
Calculating the yearly accident probability : Find out your yearly car insurance cost. If you don't have a car, find out the yearly cost for a friend or relative.
Discuss ending inventory using a perpetual inventory system : Compare ending inventory using a perpetual inventory system to ending inventory using a periodic inventory system
Determining the defense attorney to convince the jury : Suppose a defense attorney is trying to convince the jury that his client's wallet, found at the scene of the crime, was actually planted there by his client's.
Discuss estate incurs funeral and administrative expenses : Eric dies in the current year and has a gross estate valued at $6,500,000. The estate incurs funeral and administrative expenses

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd