99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

合肥生活安徽新聞合肥交通合肥房產生活服務合肥教育合肥招聘合肥旅游文化藝術合肥美食合肥地圖合肥社保合肥醫院企業服務合肥法律

代寫 48730-32548程序、代做Cyber Security編程設計
代寫 48730-32548程序、代做Cyber Security編程設計

時間:2024-09-12  來源:合肥網hfw.cc  作者:hfw.cc 我要糾錯



48**0-**548, Cyber Security Week-5 
 
Lab Overview 
 
The learning objective of this lab is to gain first-hand experience on TCP/IP vulnerabilities, as well as 
attacks against these vulnerabilities. The vulnerabilities in the TCP/IP protocols represent a special genre 
of vulnerabilities in protocol designs and implementations. They provide an invaluable lesson as to why 
security should be designed in from the beginning, rather than being added as an afterthought. Moreover, 
studying these vulnerabilities help students understand the challenges of cyber security and why many 
cyber security measures are needed. Vulnerabilities of the TCP/IP protocols occur at several layers. This 
lab is designed to learn them step-by-step. 
 
Lab Environment Setup 
 
To conduct this lab, we require all the three virtual machines: Server, Client and Attacker. The tools being 
used for this lab are Wireshark/Tshark, Netwox/Netwag. 
 
Netwox/Netwag 
 
We need tools to send out network packets of different types and with different contents. We can use 
Netwag to do that. However, the GUI interface of Netwag makes it difficult for us to automate our process. 
Therefore, we strongly suggest that you use its command-line version, the Netwox command, which is 
the underlying command invoked by Netwag. 
 
Netwox consists of a suite of tools, each having a specific number. You can run the command as following 
(the parameters depend on which tool you are using). For some of the tools, you have to run it with the 
root privilege: 
➢ netwox <number> [parameters ...]
 
If you are not sure how to set the parameters, you can look at the manual by issuing "netwox <number> --
help". You can also learn the parameter settings by running Netwag for each command you execute from the 
graphic interface, Netwag actually invokes a corresponding Netwox command, and it displays the parameter 
settings. Therefore, you can simply copy and paste the displayed command. 
 
Wireshark Tool. 
 
You also need a good network-traffic sniffer tool for this lab. Although Netwox comes with a sniffer, you 
will find that another tool called Wireshark is a much better sniffer tool. 
 
Both Netwox and Wireshark can be downloaded. If you are using our pre-built virtual machine, both tools 
are already installed. To sniff all the network traffic, both tools need to be run with root privilege. 
 
Tshark Tool. 
 
It is a terminal based network packet analyzer. You also need a good command line network-traffic sniffer 
tool for this lab. 
 
48**0-**548, Cyber Security Week-5 
 
 The lab is based on documents “SEED Labs” provided by Wenliang Du, Syracuse University 
 
Lab Tasks 
 
In this lab, you need to conduct attacks on the TCP/IP protocols. You can use the Netwox or Netwag, 
Wireshark, Tshark tools in the attacks. All the attacks are performed on Linux operating systems. However, 
you can also conduct the same attack on the other operating system and compare the observations after 
lab classes. You are supposed to use all the three Virtual Machines for the experiments. 
 
To simplify the “guess” of TCP sequence numbers and source port numbers, we assume that attacks are 
on the same physical network as the victims (Think of where such attacks may happen?). Therefore, you 
can use sniffer tools to get that information. The following is the list of attacks that need to be 
implemented and studied in this lab. 
 
Before starting the task, disconnect the internet from the Server VM. 
 
Task 1: SYN Flooding Attack 
 
SYN flood is a form of DoS attack in which attackers send many SYN requests to a victim’s TCP port, but 
the attackers have no intention to finish the 3-way handshake procedure. Attackers either use spoofed IP 
address or do not continue the procedure. Through this attack, attackers can flood the victim’s queue that 
is used for half-opened connections, i.e. the connections that has finished SYN, SYN-ACK, but has not yet 
got a final ACK back. When this queue is full, the victim cannot take any more connection. Following figure 
illustrates the attack. 
 
48**0-**548, Cyber Security Week-5 
 
 The lab is based on documents “SEED Labs” provided by Wenliang Du, Syracuse University 
 
The size of the queue has a system-wide setting. In Linux, you can check the system queue size setting 
using the following command: 
➢ sysctl -q net.ipv4.tcp_max_syn_backlog
You can use command netstat -na to check the usage of the queue, i.e., the number of half opened 
connection associated with a listening port. 
 
For this task, Netwag Tool 76 will be used to conduct the attack, and tshark tool to capture the packets. 
 
Steps: 
 
1. As SYN flood produces a lot of traffic in the VM due to high speed, Wireshark might 
crash. It is recommended to use “tshark” by entering “sudo tshark” on Terminal of the 
Client VM. 
 
2. Then go to Attacker VM and start Netwag by entering “sudo netwag” on the Terminal. 
3. Select 76: Synflood. 
4. Enter the details and click run it. (Screenshot required) 
5. Observe the captured packets on Client VM. (Screenshot required) 
 
Questions: 
 
1. Observe the attack and take screenshots of the attack scenario. 
2. Comment on your observation. 
3. Categorize this attack in terms of severity and how it is linked to the DoS attack 
48**0-**548, Cyber Security Week-5 
 
 The lab is based on documents “SEED Labs” provided by Wenliang Du, Syracuse University 
 
Task 2: ARP cache poisoning 
 
The ARP cache is an important part of the ARP protocol. Once a mapping between a MAC address and an 
IP address is resolved as the result of executing the ARP protocol, the mapping will be cached. Therefore, 
there is no need to repeat the ARP protocol if the mapping is already in the cache. However, because the 
ARP protocol is stateless, the cache can be easily poisoned by maliciously crafted ARP messages. Such an 
attack is called the ARP cache poisoning attack. 
 
Normal Scenario: 
Attackers may use spoofed ARP messages to trick the victim to accept an invalid MAC-to IP mapping, and 
store the mapping in its cache. There can be various types of consequences depending on the motives of 
the attackers. For example, attackers can launch a DoS attack against a victim by associating a non-existent 
MAC address to the IP address of the victim’s default gateway; attackers can also redirect the traffic to 
and from the victim to another machine, etc. 
 
Attack Scenario: 
48**0-**548, Cyber Security Week-5 
 
 The lab is based on documents “SEED Labs” provided by Wenliang Du, Syracuse University 
 5 
 
For this task, Netwag Tool 80 is required to conduct the attack, and wireshark tool to capture the packets. 
 
HINTS: In this task, you need to demonstrate how the ARP cache poisoning attack work. In Linux we can 
use the command arp -a to check the current mapping between IP address and MAC address. 
 
Steps: 
 
1. In Server VM, run “arp -a” on terminal to get the ARP Information (MAC Table). 
(Screenshot Required) 
2. Open Netwag on Attacker VM by entering “sudo netwag” on the Terminal. 
3. Select Tool 80: Periodically Send ARP Replies. 
4. Add the fake MAC address and IP address and select the interface. (Screenshot 
Required) 
5. Click “Run It”. 
6. Check the MAC Table on Server VM and look for the change in MAC address for IP 
address provided in the Netwag tool 80. (Screenshot required) 
 
Questions: 
1. Observe the attack and take screenshots of the attack scenario. 
2. Comment on your observation. 
3. Briefly describe how you can mitigate this attack. 
 
Task 3: ICMP Redirect Attack 
 
The ICMP redirect message is used by routers to provide the up-to-date routing information to hosts, 
which initially have minimal routing information. When a host receives an ICMP redirect message, it will 
modify its routing table according to the message. 
 
Because of the lack of validation, if attackers want the victim to set its routing information in a particular 
way, they can send spoofed ICMP redirect messages to the victim and trick the victim to modify its routing 
table. 
 
For this task, Netwag Tool 86 is required to conduct the attack, and wireshark tool to capture the packets. 
 
HINTS: In this task, you should demonstrate how the ICMP redirect attack works, and describe the 
observed consequence. To check the routing information in Linux, you can use the command route 
 
Steps: 
 
1. Open Wireshark on Client VM by entering “sudo wireshark” in the terminal. 
2. Select the interface and set “icmp” as filter and click “Apply”. 
3. Open a new terminal on Client VM and ping the server. (Screenshot required) 
4. Go to Attacker VM, run Netwag using the terminal. 
5. Select the interface and “spoofip: IP spoof initialization type”. Input the required IP 
address into “gw: new gateway” and “src-ip: source IP address”. (Screenshot Required) 
6. Click “Run It”. 
7. Go back to Client VM, check the Wireshark output. (Screenshot Required) 
  
48**0-**548, Cyber Security Week-5 
 
 The lab is based on documents “SEED Labs” provided by Wenliang Du, Syracuse University 
 
Questions: 
1. Observe the attack and take screenshots of the attack scenario. 
2. Comment on your observation. 
3. Briefly describe how you can mitigate this attack. 
 請加QQ:99515681  郵箱:99515681@qq.com   WX:codinghelp








 

掃一掃在手機打開當前頁
  • 上一篇:代寫SWD604 Program Design and Construction
  • 下一篇:代寫COMP3013、代做C/C++,Python語言程序
  • 無相關信息
    合肥生活資訊

    合肥圖文信息
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    急尋熱仿真分析?代做熱仿真服務+熱設計優化
    出評 開團工具
    出評 開團工具
    挖掘機濾芯提升發動機性能
    挖掘機濾芯提升發動機性能
    海信羅馬假日洗衣機亮相AWE  復古美學與現代科技完美結合
    海信羅馬假日洗衣機亮相AWE 復古美學與現代
    合肥機場巴士4號線
    合肥機場巴士4號線
    合肥機場巴士3號線
    合肥機場巴士3號線
    合肥機場巴士2號線
    合肥機場巴士2號線
    合肥機場巴士1號線
    合肥機場巴士1號線
  • 短信驗證碼 豆包 幣安下載 AI生圖 目錄網

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 hfw.cc Inc. All Rights Reserved. 合肥網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    99爱在线视频这里只有精品_窝窝午夜看片成人精品_日韩精品久久久毛片一区二区_亚洲一区二区久久

          9000px;">

                亚洲国产精品久久久久秋霞影院 | 在线一区二区三区四区五区| 国产精品视频在线看| 9久草视频在线视频精品| av在线播放成人| 国产亚洲精品aa午夜观看| 色综合天天在线| 免费人成网站在线观看欧美高清| 久久久高清一区二区三区| 欧美一级欧美一级在线播放| 精品人伦一区二区色婷婷| 91久久奴性调教| 波多野结衣在线一区| 婷婷综合在线观看| 亚洲成av人片一区二区三区| 日韩女优av电影| 欧美日韩电影在线播放| 在线视频一区二区三区| 亚洲精品乱码久久久久久| 中文字幕在线免费不卡| 中文字幕+乱码+中文字幕一区| 欧美精品一区二| 欧美一三区三区四区免费在线看| 在线观看91av| 国产精品久久久久久久久快鸭| 亚洲精品伦理在线| 日韩精品福利网| 精品少妇一区二区三区| 国产精品小仙女| 91美女在线看| 3atv一区二区三区| 国产精品久久久久久久午夜片| 国产精品美女久久福利网站| 亚洲丝袜自拍清纯另类| 视频一区视频二区在线观看| 久久精品国产亚洲一区二区三区| 暴力调教一区二区三区| 日韩一级二级三级| 亚洲欧美日韩一区二区三区在线观看| 五月天国产精品| 91在线观看地址| 精品日韩在线一区| 夜夜操天天操亚洲| 国产原创一区二区三区| 欧美午夜影院一区| 亚洲日本在线观看| 成人精品一区二区三区四区| 日韩午夜激情视频| 亚洲一二三四在线观看| 99久久免费国产| 国产亚洲欧美中文| 国产精品99久久久| 成人不卡免费av| 亚洲国产高清不卡| 亚洲成人av一区二区三区| 日韩国产欧美三级| 欧美一二三区在线| 美女任你摸久久| 欧美性一级生活| 中文字幕中文字幕在线一区| 亚洲二区在线视频| 亚洲精品视频在线观看免费| 日韩天堂在线观看| 99精品欧美一区二区三区综合在线| 久久国产精品99精品国产| 欧美一区二区三区在线电影 | 一区二区三区高清在线| 岛国精品一区二区| 亚洲私人影院在线观看| 欧美性猛交xxxxxx富婆| 免费人成黄页网站在线一区二区| 欧美成人精精品一区二区频| 成人黄色国产精品网站大全在线免费观看 | 久久国内精品视频| 久久久久国产一区二区三区四区| 久久 天天综合| ㊣最新国产の精品bt伙计久久| 成人免费毛片高清视频| 亚洲福中文字幕伊人影院| 久久久久久久电影| 91.麻豆视频| 色噜噜久久综合| 国产99久久久国产精品免费看| 一区二区三区久久久| 国产日产欧产精品推荐色| 欧美一级高清大全免费观看| 91国产视频在线观看| 福利视频网站一区二区三区| 日韩av一区二区在线影视| 亚洲乱码日产精品bd| 中文字幕一区二区三区四区不卡 | 免费观看30秒视频久久| 国产精品久久综合| 久久这里只有精品6| 在线不卡的av| 欧美精品色一区二区三区| 在线观看日产精品| 在线观看免费视频综合| 欧美午夜精品一区二区蜜桃| 91片黄在线观看| 91精彩视频在线观看| 一本到不卡精品视频在线观看| 99re亚洲国产精品| 成人网在线播放| 欧美三片在线视频观看| 欧美精品第一页| 日韩精品中文字幕一区二区三区 | av在线播放一区二区三区| gogo大胆日本视频一区| 亚洲人成网站在线| 国产日韩欧美精品综合| 亚洲欧美综合色| 亚洲动漫第一页| 国产一区二区三区日韩| 欧美视频一二三区| 欧美大片日本大片免费观看| 精品99一区二区三区| 欧美精品一区二区精品网| 国产精品天干天干在线综合| 亚洲人成小说网站色在线| 日本伊人精品一区二区三区观看方式| 老司机午夜精品99久久| 91成人免费在线视频| 久久蜜桃一区二区| 日韩专区中文字幕一区二区| 国产sm精品调教视频网站| 91精品国产乱码久久蜜臀| 国产综合成人久久大片91| 国产一区二区三区精品欧美日韩一区二区三区 | 青青国产91久久久久久| 色狠狠一区二区三区香蕉| 亚洲国产精品av| 成人高清免费观看| 国产欧美日韩在线| 日本va欧美va欧美va精品| 欧美综合亚洲图片综合区| 91精品国产手机| 亚洲综合一区二区精品导航| 蜜桃视频一区二区| 欧美日韩精品一区二区三区| 国产精品久久一级| 国产成人免费高清| 欧美成人精品二区三区99精品| 樱桃视频在线观看一区| 一本到高清视频免费精品| 国产欧美日韩麻豆91| 国产精品一区二区果冻传媒| 日韩免费看的电影| 国产精品国产馆在线真实露脸| 波多野结衣欧美| 丝袜a∨在线一区二区三区不卡| 日韩亚洲欧美综合| 欧美色图激情小说| 国产69精品久久777的优势| 日韩免费福利电影在线观看| 国产亚洲欧洲一区高清在线观看| 韩国一区二区三区| 国产精品久久影院| 成人永久免费视频| 成人免费在线视频观看| 欧美一级高清片| 日本韩国欧美三级| 国产麻豆精品一区二区| 一区二区在线看| 国产亚洲美州欧州综合国| 欧美日韩综合在线| 蜜桃精品视频在线| 99久久精品国产一区| 免费国产亚洲视频| 亚洲欧美日韩中文播放 | 日韩一二三四区| 欧美在线观看禁18| 处破女av一区二区| 国产成a人亚洲| 国产河南妇女毛片精品久久久| 麻豆国产欧美一区二区三区| 亚洲国产精品久久人人爱蜜臀| 亚洲精品欧美激情| 亚洲二区视频在线| 狠狠色伊人亚洲综合成人| 国产成人亚洲精品青草天美| 成人黄色免费短视频| 欧美亚洲国产怡红院影院| 欧美大片日本大片免费观看| 亚洲国产精品av| 日韩成人免费在线| 国产成人在线视频免费播放| 97久久超碰国产精品| 精品久久一区二区| 亚洲一区二区欧美| 国产精品夜夜嗨| 在线电影一区二区三区| 亚洲视频在线观看三级| 老司机免费视频一区二区| av中文字幕亚洲| 亚洲欧洲日产国码二区| 精品一区二区三区视频在线观看| 欧美三级资源在线| 亚洲精品美国一| 日本高清不卡在线观看|