Lab Experiment-7: Case Study 1: Ann's Bad Machine
Lab Experiment-7: Case Study 1: Ann's Bad Machine
1. sec558user1
2. Here’s the secret recipe… I just downloaded it from the file server.
Just copy to a thumb drive and you’re good to go >:-)
3. recipe.docx
8350582774e1d4dbe1d61d64c89e0ea1
5) What was the MAC address of the station executing the Layer 2
attacks?
A: 1c:4b:d6:69:cd:07
- ssh
- ICMP Tunnel
-8
- Ping Scan
- sU
- sS
Case Study 5: Malicious.pcap:
1. What was the complete URI of the original web request that
led to the client being compromised?
- http://10.20.0.111:8080/banking.html
2. What file type was requested in the final web request to the
malicious server?
- gif
-addf120b430021c36c232c99ef8d926aea2acd6b
4. What is the number of the first frame that indicates that the
client has been compromised?
- 4722
- windows executable
- 7afc1f67e627abb4786e5596843f9d790be81a34
7. What vulnerable software is exploited?
- ie6
- CVE-2005-1790
- shell
Submitted To:
Dr. Manoj Kumar, Department of Systemics (SoCS)
Submitted By:
Pulkit Mittal
B-tech CSE-CSF (B-3)
500068183
R134218125