Attacking a Virtual Private Network (3e) - Fiona Mohammed
pdf
keyboard_arrow_up
School
University of Texas, San Antonio *
*We aren’t endorsed by this school
Course
MISC
Subject
Information Systems
Date
Apr 3, 2024
Type
Pages
8
Uploaded by BailiffGuanacoMaster519
Attacking a Virtual Private Network (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 04
Student:
Email:
Fiona Mohammed
fiona.mohammed@my.utsa.edu
Time on Task:
Progress:
13 hours, 14 minutes
100%
Report Generated:
Sunday, October 15, 2023 at 2:53 AM
Section 1: Hands-On Demonstration
Part 1: Observe a Social Engineering Attack
10.
Make a screen capture
showing the entire travel itinerary for Marina and Rita
.
Page 1 of 8
Attacking a Virtual Private Network (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 04
16.
Make a screen capture
showing Marina’s email
.
Part 2: Craft a Spear Phishing Email
4.
Describe
your favorite scam email or an example of a scam email that you have received in
the past.
I work for a Title Company, and I once received an email that looked from legitimate from one of the
banks we do business with. The sender was asking me to click on the link embedded in the email and
make payment for delinquent invoice. What alerted me that something was wrong was the urgency of
the email, and then the url of the embedded link did not match the official website of the bank. There
were also a few grammatical errors that caught my attention. Everything else, including the logo
looked legitimate. Page 2 of 8
Attacking a Virtual Private Network (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 04
33.
Make a screen capture
showing the Blocked by SPF
message in the email headers
.
43.
Make a screen capture
showing the transaction.php page in the browser
.
Page 3 of 8
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Attacking a Virtual Private Network (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 04
Section 2: Applied Learning
Part 1: Perform a Man-in-the-Middle Attack
5.
Make a screen capture
showing the RemoteWindows01 ARP table
.
Page 4 of 8
Attacking a Virtual Private Network (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 04
17.
Make a screen capture showing the RemoteWindows01 ARP table after the ARP
poisoning
.
Part 2: Crack a VPN Password using Captured Packets
Page 5 of 8
Attacking a Virtual Private Network (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 04
12.
Make a screen capture
showing the cracked VPN password
.
Page 6 of 8
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Attacking a Virtual Private Network (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 04
Section 3: Challenge and Analysis
Part 1: Recommend Additional Spam Filtering Mechanisms
Describe
the role of the DKIM and DMARC in a mailing infrastructure, and how these
implementations help to prevent email forgery. Use the Internet to perform your research on these
mechanisms.
DKIM ensures the authenticity and integrity of email messages, while DMARC helps in
enforcing authentication policies and provides valuable insights through reporting,
collectively enhancing the security and trustworthiness of email communications within
a mailing infrastructure. These implementations help prevent email forgery by
implementing digital signatures, public key verification, authentication, prevention
tampering, policy enforcement, reporting, and alignment checks. By employing DKIM and DMARC, email receivers can verify the sender's authenticity
and domain ownership, making it significantly harder for attackers to forge emails. If an
email fails DKIM or SPF checks and the sender domain has a DMARC policy in place,
the recipient's email server can take appropriate action as per the policy, such as
marking the email as spam, quarantining it, or rejecting it outright. This process helps
in preventing email forgery and protects recipients from phishing attacks and spoofed
emails. Part 2: Enable Punycode Translation in Firefox
Make a screen capture
showing the enabled Display Punycode setting in Firefox
.
Page 7 of 8
Attacking a Virtual Private Network (3e)
Network Security, Firewalls, and VPNs, Third Edition - Supplemental Lab 04
Part 3: Perform a Phishing Attempt to Test User Security Awareness
Make a screen capture
showing the email
message headers in Thunderbird.
Make a screen capture
showing the Punycode displayed
in the Firefox web browser.
Powered by TCPDF (www.tcpdf.org)
Page 8 of 8