Lab 4 Q&A
docx
keyboard_arrow_up
School
Santa Fe College *
*We aren’t endorsed by this school
Course
CET1600
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
2
Uploaded by BaronTurtleMaster3907
1.
Highlight which kind of pod the lab was done in NetLab:
Network Security
Security+
2.
Provide the lab # in NetLab.
Lab #:
4
3.
What is the name of the lab in NetLab you completed?
Name of the Lab
:
Investigating ARP Poisoning
Provide about 100-150 words as an answer for each question.
Make sure to explain specific
terminology from the lab and what protocols or configurations should be used to be more secure.
Each question
’
s answer should have new information (i.e. don
’
t just restate the same thing in
each).
4.
Provide one screenshot from the lab. Explain with specific details how this
screenshot captures the purpose of the lab. Make sure you reference the
information in the screenshot specifically (may want to circle or highlight relevant
information in it).
In this laboratory assignment, our objective was to spoof the IP address of an Ubuntu system.
To initiate the process, we began by opening our console on the secondary virtual machine,
referencing the provided screenshot. Our first step involved pinging the address associated
with the system we intended to reverse-spoof the MAC address. Subsequently, we opened
another console linked to the system's computer and repeated the same process. Once these
steps were completed, we utilized a tool named Wireshark to verify and conclude whether the
MAC address appeared between both systems on the network.
5.
What did you learn in completing the lab? If you don't feel you learned anything,
explain how it would be useful to someone who hasn't done something similar. Make
sure to provide specifics examples (i.e. if providing a Linux command, make sure to
provide the command and explain what the command does).
The lab was a practical dive into IP address spoofing on Ubuntu. Using the 'arpspoof' command,
we manipulated ARP tables, tweaking MAC addresses and directly altering network
configurations. This hands-on experience highlighted the nuances of potential vulnerabilities tied
to IP and MAC address spoofing. It's not just theory; it's a tangible understanding of how these
security threats work. This kind of insight is good for anyone looking to bolster their
cybersecurity skills, offering a real-world perspective on dealing with network security
challenges. Overall, it was a crucial exercise that brought a practical edge to understanding and
navigating the complexities of network security.
6.
What did you have to research to better understand the lab?
Explain what you
researched and what you learned from it (provide specifics such as providing the
Linux command and explanation of what it does).
If you didn’t have to research
anything, research something related to the lab you are interested in and explain
what you learned from it making sure to provide specifics.
In order to better understand that lab, I went back and tried to refresh my knowledge of spoofing.
Spoofing is the practice of tricking systems and networks by using a digital disguise in
cybersecurity. It resembles a virtual role-playing game. I investigated all of its components,
including DNS spoofing, email, and IP addresses. My attention was drawn to MAC address
spoofing, an intriguing manipulation of network nametags through the use of the Address
Resolution Protocol (ARP). Due to this research, spoofing is more than just a technological joke;
it can be used to carry out unsavory tasks like phishing and evading security safeguards.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help