logo

COMP9046 Network Security and Forensics

   

Added on  2020-05-08

25 Pages528 Words129 Views
 | 
 | 
 | 
Network Security and Forensics
COMP9046 Network Security and Forensics_1

Sample Outputs and the outputs we got in our practical tasks are shown below.a)Use the command tcpdump –VCommand: Tcpdump –V 1
COMP9046 Network Security and Forensics_2

b)Use tcpdump -D to list all of your available interfaces.c)Ping 2130706433 and watch the traffic flow with tcpdump. user@Ubuntu1:~$ ping 2130706433PING 2130706433 (127.0.0.1) 56(84) bytes of data.64 bytes from 127.0.0.1: icmp_seq=1 ttl=64 time=0.018 ms64 bytes from 127.0.0.1: icmp_seq=2 ttl=64 time=0.027 ms64 bytes from 127.0.0.1: icmp_seq=3 ttl=64 time=0.033 ms64 bytes from 127.0.0.1: icmp_seq=4 ttl=64 time=0.034 ms64 bytes from 127.0.0.1: icmp_seq=5 ttl=64 time=0.034 ms64 bytes from 127.0.0.1: icmp_seq=6 ttl=64 time=0.031 ms64 bytes from 127.0.0.1: icmp_seq=7 ttl=64 time=0.029 ms64 bytes from 127.0.0.1: icmp_seq=8 ttl=64 time=0.031 ms64 bytes from 127.0.0.1: icmp_seq=9 ttl=64 time=0.032 ms64 bytes from 127.0.0.1: icmp_seq=10 ttl=64 time=0.031 ms64 bytes from 127.0.0.1: icmp_seq=11 ttl=64 time=0.032 ms64 bytes from 127.0.0.1: icmp_seq=12 ttl=64 time=0.032 ms64 bytes from 127.0.0.1: icmp_seq=13 ttl=64 time=0.031 ms64 bytes from 127.0.0.1: icmp_seq=14 ttl=64 time=0.032 ms2130706433 is nothing but the self IP / Loop back IP.user@Ubuntu1:~$ ping -c1 2130706433PING 2130706433 (127.0.0.1) 56(84) bytes of data.2
COMP9046 Network Security and Forensics_3

64 bytes from 127.0.0.1: icmp_seq=1 ttl=64 time=0.025 ms--- 2130706433 ping statistics ---1 packets transmitted, 1 received, 0% packet loss, time 0msrtt min/avg/max/mdev = 0.025/0.025/0.025/0.000 msTask 2:Already installed proftpdStarted the proftpd service3
COMP9046 Network Security and Forensics_4

4
COMP9046 Network Security and Forensics_5

Created one user account ftpuser using useradd commandChanged the password of the ftpuser to passwordTried to FTP the new installed FTPServer from another clientCaptured the pocket using tcpdumpStored the pcap file as Activity2.pcapGot the following screen which clearly shows the password of the ftpuser5
COMP9046 Network Security and Forensics_6

End of preview

Want to access all the pages? Upload your documents or become a member.