Project 5 MiTM Attack with Ettercap
1. Download Ettercap from http:/ettercap.sourceforge.net
(If it doesnt run properly, you can start it from Kali)
2. After you install Ettercap, run it, and select Unified Sniffing from the Sniff menu option as
(All your answers should be validated with the screen shots that you take during this exercise)
1. For this lab youll need the Wireshark program installed, which can be obtained from
http:/www.wireshark.org. It is a free softwa
Sept 15th 2016
Web search shows different IP address, and public information for anything mercy.edu related.
This gives more indepth information about www.mercy.edu, server name
Dnsstuff.com gave the name and addr
Which command would you use to specify the particular subnet of your network?
TCP connect() Scan [-sT]
These scans are so called because UNIX sockets programming uses a system call
named connect() to begin a TCP co
Project 3 Questions and answers
1. Explain why in the Hierarchy, the first protocol is Ethernet?
Ethernet is set as the first preference to all other network connected devices.
2. What is the IP address and TCP port number used by th
This project is intended to show you how DoS attacks are initiated and how to tell you are under
attack. It should be confined to a controlled testing environment.
Before proceeding with this project, start Wireshark as root and save the
Project 4 - Windows Host Intrusion Detection
LAB SETUP GUIDE
Client Software to install:
This module requires each student to have one Personal Computer system configured as
The software packages are:
VMware virtual system running Windows
According to SMTP, an e-mail must have a point of origin. However, due to the very nature of
TCP/IP, that point of origin can be spoofed in several ways. Using the whois and nslookup
commands, discover all the fully qualified domain names of all
Part 1 - Installing Internet Information Services IIS
Part 2 Configuring Security for Internet Information Services IIS
Record your work with several screenshots.
Write a paragraph for each, IIS and Apache servers.
Project 2 Using nmap
nmap is one of the most powerful tools to perform the network analysis.
Please, refer to the following website about the installation and scanning with nmap.
By default, nmap will send an ICMP echo
1. Using the Web search method of Internet footprinting, discover all you can about your
schools domain and network.
2. Using the network enumeration method of Internet footprinting, discover all you can
about your schools doma
Citing data on the three current Windows desktops (Windows Server 2012, Windows 7 and Windows
10), research and describe what the potential default vulnerabilities of each version are and how a
Windows administrator can harden these operating sy
7 CVE-2013-3898 26
DoS 2013- 2013Non Local
Exec 11-12 12-19
Complet Complet Complet
Microsoft Windows 8 and Windows Server 2012, when Hyper-V is used, does not
CISC 120 HW chapter 6,7,8,9
a. How does CPU work?
The CPU is composed of two units: the control unit and the arithmetic logic unit (ALU). The control unit
coordinates the activities of all the other computer components. The ALU is responsible f
FINAL EXAM - MATH/CISC120
NOTE: THIS EXAM COUNTS 25% OF YOUR TERM GRADE. READ QUESTIONS CAREFULLY
AND DO YOUR BEST. GOOD LUCK!
-I. SHORT ANSWER QUESTIONS. (1-15: 1 POINT EACH; 16-20: 2 POINTS EACH)
1. What is access time? What is clock speed?
Making the Most of Your First Port
Get an early start!
Pike Market for breakfast and shopping
Olympic Sculpture Park and a stroll along the
The Seattle Aquarium
Seattle Underground T
Whether you want to trek on a glacier or spend your time in quiet solitude, Kodiak West Travel can make your
dream a reality. If you can dream it, we can help you get there.
Over 20 year
Question 1: Single Choice (20 points)
FILE PROCESSING SYSTEM AND DATABASE BASICS
Which of the following is NOT seen in a file processing system?
2. If I split up the address attribute in my file processing syst