Access Millions of academic & study documents

Mitnick Attack

Content type
User Generated
Subject
Computer Science
School
King Fahd University of Petroleum and Minerals
Type
Homework
Showing Page:
1/7
MITNICK ATTACK
Configurations
1. X-Terminal .rhost file contains the IP of server (i.e X-terminal trusts server and need no
password)
2. We test that by running the date command on X-Terminal using rsh from server to
confirm that server trusts X-Terminal

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/7
3. IPs relating to X-Terminal, server are as follows:
X-terminal
10.0.2.5
server
10.0.2.4
TASK 1:
Disconnecting the server after permanently adding server IP and MAC address in the arp cache
of X-terminal using arp to simulate syn flooding attack
Now disconnected the server from network
TASK 2.1:
Step 1:
After SYN flooding attack on the server we need to send first spoofed TCP requests to the X-
Terminal using the following python code and capturing it in wireshark
#mitnick_spoof.py

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/7

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 7 pages?
Access Now
Unformatted Attachment Preview
MITNICK ATTACK Configurations 1. X-Terminal .rhost file contains the IP of server (i.e X-terminal trusts server and need no password) 2. We test that by running the date command on X-Terminal using rsh from server to confirm that server trusts X-Terminal 3. IPs relating to X-Terminal, server are as follows: X-terminal 10.0.2.5 server 10.0.2.4 TASK 1: Disconnecting the server after permanently adding server IP and MAC address in the arp cache of X-terminal using arp to simulate syn flooding attack Now disconnected the server from network TASK 2.1: Step 1: After SYN flooding attack on the server we need to send first spoofed TCP requests to the XTerminal using the following python code and capturing it in wireshark #mitnick_spoof.py #this python code sends a TCP SYN packet with source ip address = 10.0.2.4(server IP) and #destination ip address = 10.0.2.5(X-Terminal IP) from the attacker’s system so that X-Terminal #thinks the request came from server’s IP from scappy.all import * ip = IP(src="10.0.2.4", dst="10.0.2.5") tcp = TCP(sport=1023, dport=514, flags="S", seq=778933536) pkt = ip/tcp send(pkt,verbose=0) SYN+ACK packet received from X-Terminal Captured in wireshark with sequence number = 2241571420 and acknowledgement = 778933537 (seq+1 of previous request) Step 2,3: Now we need to reply to X-terminal with ACK packet having acknowledgement number(ACK = seq+1) so the following python code will send a TCP ACK packet to the X-Terminal Sequence number recei ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4