Concept explainers
Using Nslookup to find a hostname
Analyze the sample email header given below. This includes only an IP address.
Return-Path: <mgs351@hotmail.com>
Received: from murder ([unix socket])
(authenticated user=djmurray bits=0)
by email1.acsu.buffalo.edu (Cyrus v2.2.12-UB_mail1_2005_03_01) with LMTPA;
Thu, 9 Feb 2006 23:21:45 -0500
Delivered-To: djmurray@mailspool08.dyn.acsu.buffalo.edu
Received: (qmail 14244 invoked from network); 10 Feb 2006 04:21:45 -0000
Received: from unknown (HELO mailscan5.acsu.buffalo.edu) (128.205.6.137)
by mail1 with SMTP; 10 Feb 2006 04:21:45 -0000
Received: (qmail 19652 invoked by uid 22493); 10 Feb 2006 04:21:45 -0000
Delivered-To: djmurray@buffalo.edu
Received: (qmail 19642 invoked from network); 10 Feb 2006 04:21:45 -0000
Received: from bay105-f39.bay105.hotmail.com (HELO hotmail.com) (65.54.224.49)
by front3.acsu.buffalo.edu with SMTP; 10 Feb 2006 04:21:45 -0000
Received: from mail pickup service by hotmail.com with Microsoft SMTPSVC;
Thu, 9 Feb 2006 20:21:44 -0800
Message-ID: <BAY105-F3985E65AD8211242644D0281FA0@phx.gbl>
Received: from 65.54.224.200 by by105fd.bay105.hotmail.msn.com with HTTP;
Fri, 10 Feb 2006 04:21:44 GMT
X-Originating-IP: [69.163.26.172]
X-Originating-Email: [mgs351@hotmail.com]
X-Sender: mgs351@hotmail.com
From: "Dave Murray" <mgs351@hotmail.com>
To: djmurray@buffalo.edu
Bcc:
Subject: Check the email header
Date: Thu, 9 Feb 2006 23:21:44 -0500
Mime-Version: 1.0
Content-Type: text/plain; format=flowed
X-OriginalArrivalTime: 10 Feb 2006 04:21:44.0284 (UTC) FILETIME=[53FB91C0:01C631E7]
X-UB-Relay: (bay105-f39.bay105.hotmail.com)
X-PM-Spam-Prob: : 7%
X-DCC-Buffalo.EDU-Metrics: email1.acsu.buffalo.edu 1028; Body=0
There is a DOS command called nslookup and a parallel command in UNIX called
host which will lookup a hostname based on an IP address and vice versa. Open a
DOS command prompt and run the nslookup command to determine the hostname of
the machine that sent the email message above. The syntax of the command is:
nslookup IPaddress (where IPaddress is the IP of the machine you want to lookup)
- Record the IP address of the sending computer: _______________________________
- Record the hostname of the sending computer: ________________________________
- Trace the path of the email and draw it here.
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps
- what valid host range is the ip address 192.168.112.173/28 a part of , Instead of using a standard dot-decimal format, the subnet mask, which is /28, of this IP is shown in CIDR representation (we'll talk about it later in class). The 28 after slash tells the first 28 bits of the given IP are network ID bits, which also implies the rest of 32-28 or 4 bits of the given IP are host ID bits. In other words, subnet mask /28 is equivalent to 255.255.255.240 in dot-decimal format. In the answer of this question, find the minimum IP of the host range, and find maximum IParrow_forwardPlease do not give solution in image formate thankuarrow_forwardplease look at my question !!!! for this nodejs router const http = require("http");const url = require('url'); var hostName = '127.0.0.1';var port = 3000; var server = http.createServer(function(req,res){res.setHeader('Content-Type','text/plain');const parsed = url.parse(req.url);const pathname = parsed['pathname'] const queryObject = url.parse(req.url,true).query;let queryValue = queryObject['name']if(queryValue==null){queryValue=""} if (pathname=="/"){res.end("SUCCESS!")}else if (pathname=="/echo"){res.end("SUCCESS! echo")}else if (pathname=="/foxtrot/:name"){queryValue = queryObject['name'].toString()res.end("SUCCESS! Received "+queryValue+" via foxtrot")}else{res.end("FAILED! Fix your URL.")} }) server.listen(port,hostName,()=>{console.log(`Server running at http://${hostName}:${port}/`);}); -------------- it runs like this picture i wnat to fix it ,when i run http://127.0.0.1:3000/foxtrot/kilo ,it should work and it shows "SUCCESS! Received kilo via foxtrot" how to…arrow_forward
- write a custom Snort rule to handle Inbound and Outbound HTTP traffic on the Private (Host-Only) network. Upload a screen shot of the Snort console displaying the alerts. In this exercise, we are going to create two Snort monitoring rules that will be used to alert on HTTPnetwork traffic for both Inbound and Outbound traffic. Remember, Inbound rules are those rules whosedestination is to your internal network (HOME_NET), outbound rules are directed out of your internalnetwork (!HOME_NET). When you use “any” there is no distinction on whether a rule is Inbound orOutbound. When using Inbound/Outbound to describe local traffic, traffic generated on the samenetwork (as in this lab on VMnet-1), the Inbound reference is to your client system that is running snortthe Outbound reference is to the HTTP server.You should now understand a little bit about custom rules, so given the following rule:alert tcp any any -> any 80 (msg:"TCP HTTP Testing Rule"; sid:1000004;)You should be able to…arrow_forwardLook at the Snort Rule shown below: alert tcp any any -> any 80 (msg:"LOCAL PHP error redirect"; content:"login.php?error="; sid:1000100; rev:1;) Which packets from the list given below would the above Snort rule trigger as intrusions? There are multiple answers, and select all that answers the question. O 64.312.1.2:4236 -> 204.126.133.9:80 POST /php2-1-10/login.php? error=http://15.2.4.6 O 64.312.1.2:4317 -> 204.126.133.22:80 GET /phpadmin/setup.php O 64.312.1.2:1437 -> 204.126.133.7:80 GET /phpadmin/setup.php? error=http://15.2.4.6 O 64.312.1.2:4315 -> 204.126.133.22:80 GET /phpadmin/login.php? error=http://15.2.4.6 O 64.312.1.2:4237 -> 204.126.133.19:80 GET /admin/errors/login.phparrow_forwarduse nodejs to create a server that URL with hostname, port, path foxtrot and route parameter value kilo Request message URL: 0.0.1:3000/foxtrot/kilo Response message: “SUCCESS! Received kilo via foxtrot” where the value kilo must be retrieved via the route parameter Invalid/unexpected URL Request message URL: 0.0.1:3000/<any other value> Response message: “FAILED! Fix your URL.”arrow_forward
- 2.2-7 A detailed Look at an HTTP GET (3). Again, suppose a client is sending an HTTP GET request message to a web server, gaia.cs.umass.edu. Suppose the client-to-server HTTP GET message is the following (same as in previous problem): GET /kurose_ross_sandbox/interactive/quotation2.htm HTTP/1.1 Host: gaia.cs.umass.edu Accept: text/plain, text/html, text/xml, image/jpeg, image/gif, audio/mpeg, audio/mp4, video/wmv, video/mp4, Accept-Language: en-us, en-gb;q=0.1, en;q=0.7, fr, fr-ch, da, de, fi If-Modified-Since: Wed, 09 Sep 2020 16:06:01 -0700 User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebkit/535.11 (KHTML, like Gecko) Chrome/17.0.963.56 Safari/535.11 Does the client have a cached copy of the object being requested? [Note: you can find additional questions similar to this here.] O Yes, because this is a conditional GET, as evidenced by the If-Modified-Since field. O No, because a client would not request an object if it had that object in its cache. O There's not enough…arrow_forwardwrite a Node/Express web server that supports routing via endpoint /cookie. Declare a variable named a and initialize it to 10 seconds.In the callback of route /cookie:Check to see if the browser sends a cookie named startIf cookie start received by the server, increment value in variable a by 2 seconds.Creates and sends a cookie that expires after the number of seconds specified in the variable a.The cookie is to be named startwith assigned value of 450.Import package cookie-parser for cookie handlingarrow_forwardSuppose a client sends an HTTP request message with the If-modified-since header. Sup- pose the object in a server has not changed since the last time a client retrieved the object. Then the server will send a response message with the status code: A. 200 OK B. 404 Not Found C. 304 Not Modified D. none of the abovearrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education