Performance Lab 2

docx

School

Lehigh Carbon Community College *

*We aren’t endorsed by this school

Course

527

Subject

Computer Science

Date

Feb 20, 2024

Type

docx

Pages

6

Uploaded by CommodoreField5003

Report
Performance Lab Report 2 Due in Week 6 Strayer University CIS502 Theories of Security Management Performance Lab Report 2 Submitted by: Tatiana Fleetwood-Mack November 12, 2023 1
Performance Lab Report 2 Due in Week 6 Instructions: Column 1 provides the lab number, title, and a brief description of the lab. In Column 2 you will summarize in three to five sentences the key lessons you learned from completing the lab. Lab Key Lessons Learned (No more than 3 to 5 sentences) Chapter 5 5.2.1 Using Ettercap for ARP Spoofing In this lab, you will use Ettercap for address resolution protocol (ARP) spoofing. Ettercap is an open source network security tool. It can be used for security audit and ARP spoofing. Completing lab 5.2.1 I learned that Ettercap, characterized as an open-source network security tool, was explored for its graphical interface. The focus of the lab included accessing Ettercap-graphical, with an emphasis on functions like sniffing, spoofing, and application manipulation. I was then guided to initiate and perform various tasks within the application. 5.3.1 Obtaining Hardware Information of a Network Adapter In this lab, you will obtain hardware information of a network adapter. A network adapter is the component of a computer's internal hardware that is used for communicating over a network with another computer. Completing lab 5.3.1 I learned that t he primary learning objective for this lab was to obtain hardware information about a network adapter. The process involved executing a single command within the Windows PowerShell. By simply pressing the enter key, the required hardware information would be displayed. 5.3.5 Getting the TCP Settings In this lab, you will get the transmission control protocol (TCP) settings. TCP settings are optimized for different network conditions, including latency and congestion. Completing lab 5.3.5 I learned for this lab was to examine and document the Transmission Control Protocol (TCP) settings. This involved using a single command in Windows PowerShell, which allowed PowerShell to generate a comprehensive list of the settings. The goal was to acquire insights into the TCP settings applicable to various network conditions. 2
Performance Lab Report 2 Due in Week 6 Lab Key Lessons Learned (No more than 3 to 5 sentences) 5.3 . 7 Getting the UDP Settings In this lab, you will get the user datagram protocol (UDP) settings. UDP communicates with the user by sending data over an IP network. Completing lab 5.3.7 I learned that the primary learning objective for this lab was to obtain the User Datagram Protocol (UDP) settings. This was achieved by executing a specific command in PowerShell, enabling the creation of settings that facilitate communication through UDP. UDP is used to transmit data over an IP network to individuals. 5.3.8 Getting Information about the Current Connection Statistics of TCP In this lab, you will get information about the current connection statistics of TCP. TCP enables two hosts to establish a connection and exchange streams of data. Completing lab 5.3.8 I learned that the main learning objective for this lab was to gather information about the current connection statistics of the Transmission Control Protocol (TCP). This was accomplished by executing a specific command within the Windows PowerShell, which facilitated the generation of TCP connection statistics. 5.3.10 Finding the Host Name of a Machine In this lab, you will find the host name of a machine. A host name is a label assigned to a device connected to a computer network. The hose name is also used to identify the device. Completing lab 5.3.10 I learned that the primary learning objective for this lab was to determine the machine's host name. This was achieved by executing a specific command within Windows PowerShell, enabling PowerShell to retrieve and display the machine's host name. 5.3.11 Finding the Physical Address of a LAN Adapter In this lab, you will find the physical address of a local area network (LAN) adapter. A LAN adapter connects a computer or computing device to a network. Completing lab 5.3.11 I learned that the primary learning objective for this lab was to identify a Local Area Network (LAN) adapter and its physical address. This was accomplished by executing a specific command in Windows PowerShell. The command, when executed, produced information detailing the LAN adapter and its associated physical address. 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Performance Lab Report 2 Due in Week 6 Lab Key Lessons Learned (No more than 3 to 5 sentences) 5.3.12 Finding the Logical Address of a LAN Adapter In this lab, you will find the logical address of a LAN adapter. A LAN adapter connects a computer or computing device to a network. Completing lab 5.3.12 I learned that the main learning objective for this lab was to obtain information about a Local Area Network (LAN) adapter and its logical address. This was accomplished by executing a specific command in Windows PowerShell. The command facilitated the creation of details regarding the LAN adapter and its corresponding logical address. 5.6.7 Performing a DoS Attack with the SYN Flood In this lab, you will perform a denial of service (DoS) attack with the SYN flood. A DoS attack is an attack meant for shutting down the network or a machine and making it inaccessible to its users. A SYN flood is an attack in which the attacker sends a succession of SYN requests to the target's system. Completing lab 5.6.7 I learned that the primary learning objective for this lab was to demonstrate and understand the process of conducting a denial-of-service attack using the SYN flood method. The lab utilized tools such as the Metasploit framework and Virtual Machine Manager to execute the attack. The specific aim was to overwhelm the target system, causing CPU lag. The CPU returned to its normal state once the attack was halted by issuing a specific command. Chapter 6 6.4.1 Creating ACL in Router In this lab, you will create access control lists (ACL) in router. Access control lists are ordered sets of rules that control the traffic that is permitted or denied the use of a path through the router. These rules can operate at Layer 3, making these decisions on the basis of IP addresses. They can also operate at Layer 4, when only certain types of traffic are allowed based on a TCP or UDP port number. When this is done, the ACL will typically reference a port number of the service or application that is allowed or denied. Completing lab 6.4.1 I learned that the main learning objective for this lab was to implement access control lists (ACLs) on a router. The process involved allowing users to ping a specific IP address and controlling traffic by specifying rules for denial and permission. The lab emphasized the use of PuTTY configuration, highlighting its simplicity in configuring the necessary steps for ACLs. 4
Performance Lab Report 2 Due in Week 6 Lab Key Lessons Learned (No more than 3 to 5 sentences) Chapter 7 7.2.1 Observing an MD5-Generated Hash Value In this lab, you will observe an MD5-generated hash value. An MD5 hashing algorithm produces a 128-bit hash value or digest value of an entire file. These hash values can be used to check the file’s data integrity. When a user downloads any file, an attacker can manipulate the file data during the process of sending the file between sites. MD5 gives authentication as to whether or not the file has been manipulated. Completing lab 7.2.1 I learned that the primary learning objective for this lab was to observe an MD5-generated hash value. Users were required to input specific commands in the terminal application, and the execution of these codes allowed them to observe the MD5- generated hash value. 7.2.2 Observe an SHA-Generated Hash Value In this lab, you will observe a SHA-generated hash value. The SHA-256 hashing algorithm produces 1-bit to 256-bit hash values of the entire file. These hash values can be used to check the file’s data integrity. When a user downloads any file, an attacker can manipulate the file data during the processing of sending the file between sites. SHA-256 generates an almost-unique 256-bit (32- byte) signature for a text. Completing lab 7.2.2 I learned that the main learning objective for this lab was to observe a SHA-generated hash value. Users were instructed to input specific commands in the terminal application, and the execution of these codes enabled them to observe the SHA- generated hash value. 7.4.1 Applying Symmetric Key Encryption In this lab, you will apply symmetric key encryption. This process encrypts and decrypts the information using the same secret key. You will encrypt a file using the AxCrypt open-source encryption algorithm, which uses the AES algorithm with 128-bit keys. Completing lab 7.4.1 I learned that the primary learning objective for this lab was to apply symmetric key encryption. The process involved executing various steps, including generating a text file in the file explorer. Subsequently, the AES algorithm was employed to both decrypt and encrypt the information using the same secret key. 5
Performance Lab Report 2 Due in Week 6 Lab Key Lessons Learned (No more than 3 to 5 sentences) 7.4.2 Using OpenSSL to Create a Public/Private Key Pair In this lab, you will use OpenSSL to create a public/private key pair. OpenSSL is used for secure communication over the network. It works on the exchange of public keys and authentication by a private key. Completing lab 7.4.2 I learned that the main learning objective for this lab was to utilize OpenSSL to generate a private and public key pair. The process involved executing specific commands in the terminal application, allowing OpenSSL to facilitate the exchange of private and public keys for secure communication. 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help