Lab 11

docx

School

Renton Technical College *

*We aren’t endorsed by this school

Course

436

Subject

Electrical Engineering

Date

Dec 6, 2023

Type

docx

Pages

7

Report

Uploaded by MagistratePencil8798

Lab 11
Used the invocation #sudo hping3—traceroute -V -1 172.24.26.130. As a result, Kali Linux in continuing to send packets over to my Windows 11 Education VM. Results on Wireshark; using my Windows Education VM as my filtered destination IP address, I can see the amount of ping requests being made.
In comparison, with the invocation #sudo hping3 –traceroute -V -1 192.168.36.12, the ping request was not continuous (as shown on the above screenshots). After entering the invocation #hping3 –flood -S 172.24.26.130, the VM began performing extremely slow.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Result of the invocation on Wireshark. Performance Monitor activity before DoS attack.
Performance Monitor activity during DoS attack. Average went down by almost 20 seconds. Attacked device is still able to ping and communicate to other devices on the network during the DoS attack.
After DoS attack, the performance monitors shows an increase in average of activity timing. Used the invocation #sudo hping3 -S -flood -V 172.24.26.130 and the following Wireshark screenshot is the result.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Ask yourself: what does a SYN attack attack and is it likely that in the current lab environment this type of attack could be effective? Why or why not? A syn attack targets a computer’s server. For this lab, a SYN attack would most likely be ineffective, as all students use their own network on their VM. Therefore, are not affected by any other students “attack.” Using spoof IP address with the invocation #sudo hping3 -1 –flood –spoof 172.24.27.236 192.168.36.122.