0% found this document useful (0 votes)
5 views8 pages

Rasul Zeinulgabdunov Cs 2429

The document discusses network analysis using Wireshark, detailing source and destination MAC and IP addresses, ports, and their associations. It highlights the ability of a DNS server to perform recursive queries and compares results with nslookup. Additionally, it addresses SQL injection risks and prevention methods, including input validation and parameterized queries.

Uploaded by

zrasuld2006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views8 pages

Rasul Zeinulgabdunov Cs 2429

The document discusses network analysis using Wireshark, detailing source and destination MAC and IP addresses, ports, and their associations. It highlights the ability of a DNS server to perform recursive queries and compares results with nslookup. Additionally, it addresses SQL injection risks and prevention methods, including input validation and parameterized queries.

Uploaded by

zrasuld2006
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Rasul Zeinulgabdunov cs 2429

What are the source and destination MAC addresses? Which


network interfaces are these MAC addresses associated with?
74:4c:a1:5b:b3:c3 and 60:bd:2c:7f:31:60

What are the source and destination IP addresses? Which network


interfaces are these IP addresses associated with?
Source Address: fe80::2a:a891:25f2:55b
Destination Address: fe80::1

What are the source and destination ports? What is the default
DNS port number?
Source Port: 63414
Destination Port: 53

Compare the MAC and IP addresses in the Wireshark results to


the IP and MAC addresses. What is your observation?
Wifi adapter address and source address are similar. Also mac
addresses are similar

What are the source and destination MAC and IP addresses and
port numbers? How do they compare to the addresses in the DNS
query packets?
They all are destination addresses, destination addresses in the
query packet are source addresses

Can the DNS server do recursive queries?


Yes it can

How do the results compare to nslookup results?


They are similar

From the Wireshark results, what else can you learn about the
network when you remove the filter?
You can learn about other packets, rather than DNS

How can an attacker use Wireshark to compromise your network


security?
If your network is unencrypted, hackers can easily steal data from
the traffic, because its not encrypted
What are the two IP addresses involved in this SQL injection
attack based on the information displayed? 10.0.2.4 and
10.0.2.15

What is the version? 5.7.12-0ubuntu1.1


What would the modified command of (1' OR 1=1 UNION SELECT
null, column_name FROM INFORMATION_SCHEMA.columns WHERE
table_name='users')? Output of users will be shortened

Which user has the password hash of


8d3533d75ae2c3966d7e0d4fcc69216b? 1337

What is the plain-text password? charley

What is the risk of having platforms use the SQL langauge? SQL
injection attacks

Browse the internet and perform a search on “prevent SQL


injection attacks”. What are 2 methods or steps that can be taken
to prevent SQL injection attacks? Input Validation and Sanitization
Use Parameterized Queries

You might also like