<p> EC312 Homework 29 Name: ______Read: (1) Lesson 29 Notes </p><p>1. What is the underlying assumption between routers in the routing algorithms they use which makes it possible to conduct a Man-In-The-Middle (MITM) attack?</p><p>2. What three things can an attacker do to your network traffic in a Man-In-The-Middle (MITM) attack and what pillar of Information Assurance is affected during each? (a) </p><p>(b)</p><p>(c) 3. Forouzan, P18-25. Circle the router interfaces below to indicate how the packet is routed to its destination.</p><p>140.24.7.0/26 Destination Address: 140.24.7.42 m0 m3 m0 m2 140.24.7.64/26 m1 R1 R2 m2 m1</p><p>140.24.7.128/26 140.24.7.192/26</p><p>4. Two small size companies are to be combined into one medium-sized organization. If the first small-size company uses the IP address block 54.120.16.0/21 and the second uses the IP address block 54.120.24.0/21, what is the aggregate address block that can be used by the new medium-sized company? ??.??.??.??/??</p><p>54.120.16.0/21 54.120.24.0/21</p><p>1 5. An attacker is located on the 5.6.7.0/24 network and wants to prevent midshipmen from reaching a website at 8.8.8.26. He turns his computer into a router using Loki to advertise a false network to Router C.</p><p>(a) Construct the routing table for Router C.</p><p>(b) Looking at Router C’s routing table, what network address and mask should the attacker choose? </p><p>(c) Complete the routing table entry below with your answer from (b) and draw a line into Router C’s routing table showing where the attacker’s false network would go. 2 (d) What is the first and last IP address of the false network you chose for the evil instructor?</p><p>First Address:</p><p>Last Address:</p><p>(e) Does the IP address of the webserver fall within your choice for the evil instructor’s false network?</p><p>(f) Given your answer to part (e), whenever a midshipman sends a packet destined for the webserver at 8.8.8.26 where will Router C forward their packet? Will the midshipman ever be able to reach the important website?</p><p>(g) List and briefly describe two technical solutions that could be implemented on Router C to prevent the evil instructor from injecting false routing information.</p><p>Solution #1 ______:</p><p>Solution #2 ______:</p><p>(h) Who is responsible for implementing these security measures in a network?</p><p>3</p>
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages3 Page
-
File Size-