Lab 4 Q&A

docx

School

Santa Fe College *

*We aren’t endorsed by this school

Course

CET1600

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by BaronTurtleMaster3907

Report
1. Highlight which kind of pod the lab was done in NetLab: Network Security Security+ 2. Provide the lab # in NetLab. Lab #: 4 3. What is the name of the lab in NetLab you completed? Name of the Lab : Investigating ARP Poisoning Provide about 100-150 words as an answer for each question. Make sure to explain specific terminology from the lab and what protocols or configurations should be used to be more secure. Each question s answer should have new information (i.e. don t just restate the same thing in each). 4. Provide one screenshot from the lab. Explain with specific details how this screenshot captures the purpose of the lab. Make sure you reference the information in the screenshot specifically (may want to circle or highlight relevant information in it). In this laboratory assignment, our objective was to spoof the IP address of an Ubuntu system. To initiate the process, we began by opening our console on the secondary virtual machine, referencing the provided screenshot. Our first step involved pinging the address associated with the system we intended to reverse-spoof the MAC address. Subsequently, we opened another console linked to the system's computer and repeated the same process. Once these steps were completed, we utilized a tool named Wireshark to verify and conclude whether the MAC address appeared between both systems on the network.
5. What did you learn in completing the lab? If you don't feel you learned anything, explain how it would be useful to someone who hasn't done something similar. Make sure to provide specifics examples (i.e. if providing a Linux command, make sure to provide the command and explain what the command does). The lab was a practical dive into IP address spoofing on Ubuntu. Using the 'arpspoof' command, we manipulated ARP tables, tweaking MAC addresses and directly altering network configurations. This hands-on experience highlighted the nuances of potential vulnerabilities tied to IP and MAC address spoofing. It's not just theory; it's a tangible understanding of how these security threats work. This kind of insight is good for anyone looking to bolster their cybersecurity skills, offering a real-world perspective on dealing with network security challenges. Overall, it was a crucial exercise that brought a practical edge to understanding and navigating the complexities of network security. 6. What did you have to research to better understand the lab? Explain what you researched and what you learned from it (provide specifics such as providing the Linux command and explanation of what it does). If you didn’t have to research anything, research something related to the lab you are interested in and explain what you learned from it making sure to provide specifics. In order to better understand that lab, I went back and tried to refresh my knowledge of spoofing. Spoofing is the practice of tricking systems and networks by using a digital disguise in cybersecurity. It resembles a virtual role-playing game. I investigated all of its components, including DNS spoofing, email, and IP addresses. My attention was drawn to MAC address spoofing, an intriguing manipulation of network nametags through the use of the Address Resolution Protocol (ARP). Due to this research, spoofing is more than just a technological joke; it can be used to carry out unsavory tasks like phishing and evading security safeguards.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help