Laboratory 2 The purpose of this lab is to practice examining traffic using a protocol analyzer and recognize a SYN attack. The SYN flood attack is one of the common Denial of Service (DoS) attacks in the Internet. In the SYN flood attack, an attacker sends a large number of SYN packets to the server, ignores SYN/ACK replies and never sends the expected ACK packet. Basically, the attacker overwhelms the server with many half-established connections and exhausts the server resources, and hence the attack is known as a DoS attack. The tool you will be using is known as Wireshark, a well-known open source packet analyzer. The exercise will demonstrate that recognizing an attack requires sophisticated tools (such as Wireshark) and knowledge of the domain (TCP/IP network). Assignment: 1. Obtain a trace file of the TCP handshake process. Download the attached files: “tcpshake.cap,” “tcpshake.prn” (TCP: Handshake Process) and “tcp-syn-attack.cap,” “tcp-syn-attack.prn,” (TCP: TCP SYN Attack). The .prn file is a text file, and you can read it with Notepad or Wordpad. It contains a formatted “report” with information on each packet. The .cap file is in the proprietary Sniffer format. Opening this file produces a graphic representation of the same information. You can read .cap files with Wireshark/Ethereal, a public domain analyzer. 2. Obtain Wireshark
If you use a packet driver, Wireshark can both capture packets and read trace files of packets that have already been captured. However, the packet driver must access parts of your operating system that some students may not have access to. That is the reason why this is not a packet capturing exercise. However, you should learn to capture packets yourself if you can. The packet driver you will need is winpcap. It is available at http://www.winpcap.org/install/. However, you do not need winpcap for the exercise you are going to do now. 3. Read the tcpshake.cap trace file. Become familiar with Wireshark’s interface.
4. Read the tcp-syn-attack.cap file and answer the following 10 questions:
Post your answer to the assignment folder under LAB2 (due date: 11/13).
|
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more