1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Mkey [24]
3 years ago
7

The objective of this task is to use Scapy to estimate the distance, in terms of number of routers, between your VM and a select

ed destination. This is basically what is implemented by the traceroute tool. In this task, we will write our own tool. The idea is quite straightforward: just send a packet (any type) to the destination, with its Time-To-Live (TTL) field set to 1 first. This packet will be dropped by the first router, which will send us an ICMP error message, telling us that the time-to-live has exceeded. That is how we
This project is based on SEED labs by Wenliang Du, Syracuse University.
get the IP address of the first router. We then increase our TTL field to 2, send out another packet, and get the IP address of the second router. We will repeat this procedure until our packet finally reach the destination. It should be noted that this experiment only gets an estimated result, because in theory, not all these packets take the same route (but in practice, they may within a short period of time). The code in the following shows one round in the procedure
a = IP()
a.dst '1.2.3.4
a.ttl = 3
b = ICMP()
send (a/b)
If you are an experienced Python programmer, you can write your tool to perform the entire procedure automatically. If you are new to Python programming, you can do it by manually changing the TTL field in each round, and record the IP address based on your observation from Wireshark. Either way is acceptable, as long as you get the result
Task: Sniffing and-then Spoofing
In this task, you will combine the sniffing and spoofing techniques to implement the following sniff- and-then-spoof program. You need two VMs on the same LAN. From VM A, you ping an IP X. This will generate an ICMP echo request packet. If X is alive, the ping program will receive an echo reply, and print out the response. Your sniff-and-then-spoof program runs on VM B, which monitors the LAN through packet sniffing. Whenever it sees an ICMP echo request, regardless of what the target IP address is, your program should immediately send out an echo reply using the packet spoofing technique. Therefore, regard-less of whether machine X is alive or not, the ping program will always receive a reply, indicating that X is alive. You need to use Scapy to do this task. In your report, you need to provide evidence to demonstrate that your technique works.
Computers and Technology
2 answers:
Stolb23 [73]3 years ago
8 0

Answer:

is this even a legit question

vivado [14]3 years ago
4 0

Answer:

kad ;ikajlfhdakjsfhadskfadhkjfahdjkfadk a jk h

Explanation:

You might be interested in
Describe the differences between instant messaging and text messaging?
allsm [11]

Answer:

Text messaging, or simply "texting," is a cellular phone service typically limited to 160 characters, whereas instant messaging is usually a computer session with a longer message size. ... When an instant messaging session is started, it remains connected until the session is ended by one of the parties.

Explanation:

8 0
4 years ago
HELP URGENT
arsen [322]

Answer:

D. It is a program that checks for grammatical errors.

5 0
2 years ago
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes
rjkz [21]

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. The technician can<u> Issue the reload command without saving the running configuration.</u>

Explanation:

  • The technician does not want to make any mistakes trying to remove all the changes that were done to the running configuration file.
  • The solution is to reboot the router without saving the running configuration. The copy startup-config running-configcommand does not overwrite the running configuration file with the configuration file stored in NVRAM, but rather it just has an additive effect.
  • Configuration change control is a set of processes and approval stages required to change a configuration item's attributes and to re-baseline them.
  • Configuration status accounting is the ability to record and report on the configuration baselines associated with each configuration item at any moment of time.
  • The Manage System Configuration screen allows you to download, save, switch, revert and delete system configuration files.
  • Configuration Control is the activity of managing the product and related documents, throughout the lifecycle of the product.

6 0
3 years ago
____ refers to typing your entire e-mail message or discussion group post using only capital letters.
Over [174]
The answer to this question is: Shouting
7 0
3 years ago
Nonword passwords are vulnerable to a ________ attack in which the password cracker tries every possible combination of characte
Stels [109]
That would be your name and then you date of birth 
6 0
3 years ago
Read 2 more answers
Other questions:
  • Sarah is working on a project in which she needs to record all the extracurricular activities in her college. Her college teache
    13·2 answers
  • How have computers changed overtime
    13·2 answers
  • Who gave a demonstration of modern computer systems showing a mouse and when?
    8·1 answer
  • Formatting can be applied to
    10·2 answers
  • After class, Anita and Bev make plans to study for their psychology exam together but cannot decide on a time or location. In ad
    7·1 answer
  • Write a program to check if an input is a valid hashtag (starts with #, contains only letters, numbers, and underscore, no space
    6·1 answer
  • Gennie has just gotten her first smartphone with a touch screen. Mia is giving her a lesson on how to use the touch screen.
    12·1 answer
  • You are the administrator for a small network with several servers. There is only one printer, which is centrally located. Altho
    10·1 answer
  • C programming question
    6·1 answer
  • Hello guys please help me <br>list and identify the components of computer ​
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!