Tutorial 13
Tutorial 13
I confirm that I understand my coursework needs to be submitted online via Google Classroom under the
relevant module page before the deadline for my assignment to be accepted and marked. I am fully
aware that late submissions will be treated as non-submission and a mark of zero will be awarded.
CC5004NI Security in Computing
Question 01. What makes post connection network attacks severe from an
organization’s view of their information security posture?
ANS: Connections can be intercepted between devices and victim remains unknown of
the compromised data, so its underlying weakness in the network protocols makes post
connection network attacks severe from an organization’s view of their information
security posture.
Question 02. Define what are eavesdropping attacks in computer networks. List and
elaborate a few plausible outcomes of this information threat.
ANS: When a hacker intercepts, deletes, or changes data sent between two devices, it
is called an eavesdropping attack. To access data in transit between machines,
eavesdropping, also known as sniffing or snooping, relies on unencrypted network
interactions. Theft of identity is a very real possibility. Identify threat is few plausible
outcomes of this information threat.
ANS: Man-in-the-middle (MITM) attacks are a sort of cybersecurity attack that allows
attackers to listen in on a conversation between two targets. The "man-in-the-middle"
assault takes place between two lawfully communicating hosts, allowing the attacker to
"listen" to a discussion they should not normally be able to listen to, hence the name.
MITM attacks are used to steal login credentials or personal information, as well as to spy
on victims, interrupt communications, and corrupt data.
Interception: To obtain access to a network, attackers often use open or poorly secured
Wi-Fi routers. They also have the power to change DNS servers. Their goal is to find
weak passwords, and they may accomplish it by using IP spoofing or cache poisoning.
They will employ data capture tools to get the victim's information once they have gained
access.
1
Nischita Paudel
CC5004NI Security in Computing
Decryption: This stage involves decoding the intercepted data and preparing it for use by
hackers for their malicious purposes, which can range from identity theft to outright
disruption of business operations.
Question 04. Describe the use case of the ARP network protocol and elaborate what
makes them vulnerable to getting their cache poisoned using false data.
Question 05. Which terminal command in Linux and windows can be used to view the
ARP cache of a computer system?
ANS: The terminal command in Linux and windows that can be used to view the ARP
cache of a computer system is “arp -a”.
Question 06. How can we initiate the process of verifying if a machine’s ARP cache
can be poisoned, using the arpspoof tool?
2
Nischita Paudel
CC5004NI Security in Computing
ANS: We can initiate the process of verifying a machine’s ARP cache to see if it can be
poisoned by using the command “arpspoof –i [interface] –t [clientIP] [gatewayIP]” using
arpspoof tool.
Question 07. What logical modifier are we looking for, when we are verifying if an ARP
cache has been compromised?
ANS: The Boolean value "True" in the logical modifier verifies that an ARP cache has
been compromised.
Question 08. How can we initiate the process of verifying if a machine’s ARP cache
can be poisoned using the bettercap framework?
ANS: Using the bettercap framework, we can start the process of testing a machine's
ARP cache to see if it can be poisoned by using the command "arp.spoof.fullduplex."
Question 09. When using bettercap for initiating network attacks, what does the
following commands do:
ANS: Caplets are text files containing a list of commands that the user wishes to
execute. Caplets in bettercap can be used to execute previously run commands
automatically.
ANS: DNS spoofing (also known as DNS cache poisoning) is a type of attack in which
modified DNS records are used to redirect online traffic to a fake website that looks like
the real one. Users are then prompted to log into (what they think is) their account,
allowing the culprit the opportunity to steal their login credentials and other sensitive
information. Furthermore, the malicious website is frequently used to infect a user's
3
Nischita Paudel
CC5004NI Security in Computing
computer with worms or viruses, granting the attacker long-term access to the computer
and the data it stores.
4
Nischita Paudel