0% found this document useful (0 votes)
23 views3 pages

Practical Lab - Data in Transit Attacks

The document instructs students to research and investigate data-in-transit attacks by selecting one of four types: spoofing/poisoning, man-in-the-middle, replay, or DoS/DDoS attacks. It asks students to create a diagram showing how the attack works, identify how to detect it using Wireshark, and explain any vulnerabilities exploited.

Uploaded by

divyagoyal891
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views3 pages

Practical Lab - Data in Transit Attacks

The document instructs students to research and investigate data-in-transit attacks by selecting one of four types: spoofing/poisoning, man-in-the-middle, replay, or DoS/DDoS attacks. It asks students to create a diagram showing how the attack works, identify how to detect it using Wireshark, and explain any vulnerabilities exploited.

Uploaded by

divyagoyal891
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

PRACTICAL LAB: ‘DATA-IN-

TRANSIT’ ATTACKS
GROUP RESEARCH TASK

JORDAN ALLISON
[email protected]
Practical Lab: ‘Data-in-Transit Attacks’ - JA

Table of Contents
1 Investigate Data-in-Transit Attacks: ...................................................................................... 2
2 Your Task .............................................................................................................................. 2

Page 1 of 2
Practical Lab: ‘Data-in-Transit Attacks’ - JA

1 Investigate Data-in-Transit Attacks:


In groups of 4 or 5, investigate a data-in-transit attack. Select one of the following
• Spoofing/Poisoning (e.g. ARP Poisoning)
• Man-in-the-middle
• Replay
• DoS/DDoS (e.g. SYN Flood or ICMP Flood)

2 Your Task
For your chosen attack, do the following:

1) Create a diagram detailing the attack on ‘Data-in-Transit’, and how it works.


2) Identify how you would identify this type of attack using Wireshark. For instance, what
filters may be beneficial, what are the key characteristics required.
3) If possible, identify the vulnerabilities that will be exploited to allow the attack to take
place.

After 25-30 minutes report your findings to the class.

Page 2 of 2

You might also like