HANDS ON PROJECT Ch. 9

HANDS ON PROJECT Ch. 9 - 9-1 4. a. 10.0.0.1 b. 10.0.0.68,...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 9-1 4. a. 10.0.0.1 b. 10.0.0.68, 10.0.0.52, 10.0.0.65, 10.0.0.56, 10.0.0.51, 10.0.0.49, 10.0.0.55, 10.0.0.50, c. An attacker could engage in DoS against these hosts or redirect these hosts's traffic to his own computer. This information might also be used to engage the compromised host(s) as an agent, handler or victim of a DDoS attack. This could also be used to gain further information which may lead to any number of other attacks. 9-2 2. The Syn flag 3. Reset and Acknowledgement 4. a. b. c. The probe is fairly obvious since it is systematically checking each port in sequence and in a short period of time. Yes 2302, 2304, 2308, 2312, 2314, 2316 9-3 2 3 and 4 8 and 9 10 9-4 2, 3 and 4 ...
View Full Document

Page1 / 4

HANDS ON PROJECT Ch. 9 - 9-1 4. a. 10.0.0.1 b. 10.0.0.68,...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online