IMPORTANT: Make sure you are using security tools in a virtual internal network or that you have written permission to do so on the network you are connected to. NOTES: • In order to prepare...

can you help me to solve these assignments



IMPORTANT: Make sure you are using security tools in a virtual internal network or that you have written permission to do so on the network you are connected to. NOTES: • In order to prepare for this lab, you should have downloaded the two Lubuntu virtual machines; the first, named Linx, will be the one from which you will launch different security tools; the second, named Hare, will be used as the target. • For Linx, the username is “herzing” and the password “Herzing2021”. You don’t need to login into Hare, for all the required tasks will be done remotely. • The IP addresses are 192.168.100.11 for Linx and 192.168.100.12 for Hare, none of them with outside communication to Internet. • It’s convenient to work as root, so once you open a command-line terminal, execute “sudo su” to become root. You will be asked for the user’s password you logged in with. Please respond to the following questions: tcpdump 1. Try the command “tcpdump -i enp0s3 -c 4 port 80” on Linx. Wait at least for 60 seconds. What is the destination IP of this traffic? What is the filename after the GET command? 2. What command would you use to see only network traffic related to Hare (supposing there were more endpoints on the network)? wireshark 3. Using wireshark and filtering the output of the traffic capture to see only FTP-related traffic, determine the username and password in the communication. nmap 4. Execute “nmap 192.168.100.12” on Linx. How many open ports there are and what are the corresponding services? 5. Execute now “nmap -p25 192.168.100.12”. What is different with the smtp service? What does it mean? 6. What command would look for endpoints with the port 22 open in all the class C network using a TCP SYN scan (hint: use “man nmap” for help)? nikto 7. Using nikto against Hare determine the Apache version (hint: use “nikto -h” for help). 8. What are the allowed HTTP methods? john 9. Now that you have credentials to connect by FTP, execute “ftp 192.168.100.12”, use them. Then, when in the ftp> prompt is shown, list all files with “ls” or “dir” and download the only available file with “get creds.web”. Use John the Ripper (john filename) to crack the password of the user webadmin. What is this user’s password? 10. Open a web browser (world map icon at the bottom) and get to “http://192.168.100.12/private”. You need the username webadmin and the password you just cracked. What message did you get on the browser? Explain how the network security would be improved in each case below: 1. Avoiding single points of failure (SPoF). 2. Using IPv6. 3. Designing a segmented network. 4. Using an IDS for unfiltered traffic. 5. Encrypting protocols (control) in addition to data. 6. Using VPNs for remote access. 7. Embracing the zero trust approach. Explain the risks of each situation below and how would you mitigate them: 8. Switches not supporting VLANs. 9. Static IP addresses. 10. Single factor authentication (SFA). 11. Exposing Remote Desktop Protocol (RDP) to the public. 12.Placing servers with public services, such as a web server, on the Intranet
Dec 15, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here