Concept explainers
We've received an alert about suspicious activity from the firewall. Based on the provided logs below, please answer the follow questions:
1. What is the source of this activity?
2. What is the destination of the activity?
3. What part of the client's environment is this affecting?
4. What is the port being targeted by the attacker?
5. Is this something the client should be informed about? Why or why not?
6. What do you think is going on here?
Oct 20 08:22:17 PA1.ACME.org 1,2020/10/20 08:22:16,013101004916,THREAT,vulnerability,2049,2020/10/20 08:22:16,192.241.217.192,88.66.59.62,192.241.217.192,10.6.200.239,owa.acme.org,,,web-browsing,vsys1,Untrust-L3,Trust-L3,ethernet1/11,ethernet1/9,Log Forwarding to ADCSyslog,2020/10/20 08:22:16,554581,1,38746,80,38746,80,0x412000,tcp,alert,"66.99.95.26/",ZGrab Application Layer Scanner Detection(57955),any,medium,client-to-server,6883821905258742491,0x2000000000000000,United States,United States,0,,0,,,1,,,,,,,,0,0,0,0,0,ADC-FW-A,PA1,,,,,0,,0,,N/A,info-leak,AppThreat-8332-6358,0x0,0,4294967295,
======
Oct 20 08:22:30 PA1.ACME.org 1,2020/10/20 08:22:30,013101004916,TRAFFIC,end,2049,2020/10/20 08:22:30,192.241.217.192,88.66.59.65,192.241.217.192,172.16.1.140,Direct Access - Inbound,,,web-browsing,vsys1,Untrust-L3,DMZ-L3,ethernet1/11,ethernet1/7,Log Forwarding to ADCSyslog,2020/10/20 08:22:30,389380,1,56902,80,56902,80,0x41001c,tcp,allow,1709,512,1197,10,2020/10/20 08:22:04,10,any,0,6883821905367363307,0x0,United States,United States,0,6,4,tcp-fin,0,0,0,0,ADC-FW-A,PA1,from-policy,,,0,,0,,N/A,0,0,0,0
======
Oct 20 08:22:32 PA1.ACME.org 1,2020/10/20 08:22:31,013101004916,TRAFFIC,end,2049,2020/10/20 08:22:31,192.241.217.192,88.66.59.52,192.241.217.192,10.6.200.238,owa.acme.org,,,web-browsing,vsys1,Untrust-L3,Trust-L3,ethernet1/11,ethernet1/9,Log Forwarding to ADCSyslog,2020/10/20 08:22:31,404737,1,33274,80,33274,80,0x41001c,tcp,allow,1053,512,541,9,2020/10/20 08:22:05,10,any,0,6883821905367363898,0x0,United States,United States,0,6,3,tcp-fin,0,0,0,0,ADC-FW-A,PA1,from-policy,,,0,,0,,N/A,0,0,0,0
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps
- Let's imagine the mail server for your employer sends you a message alerting you that the password for your account has been changed and that you need to confirm this. In this scenario, you would need to confirm the new password. To the best of your knowledge, the password has not been changed in any way. What may have caused the requirement for the password to be changed? What systems were infected with what sort of malware, and how did the hacker get access to the information they required to properly reset the password?arrow_forwardThink of a situation where managing logins is necessary, and make some informed assumptions. List all the methods you have so far been able to confirm your identity. Do you believe passwords will be outdated in the near future?arrow_forward
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY