What are the values of the source and destination port numbers, flags that are set, and window size in the TCP part of the Wireshark capture?
Learning Goal: I’m working on a networking multi-part question and need an explanation and answer to help me learn.Exercise 1 (Exploratory): In the lectures we discussed the importance of ethical hacking, that is, the moral
principles that guide ethical hackers. The lecture notes also list several resources on ethical hacking. Read these
and other online resources on this subject. In your own words and from your own perspective, make a list of 7
principles (we like listings in seven, don’t we, remember the seven security goals ! J) that you consider as
important in ethical hacking. For each principle, write a short description. Cite your references at the end of the
list.
As an example, here’s one principle from the resource: https://www.synopsys.com/glossary/what-is-ethicalh…
Principle #1: Ethical hackers work within a clearly defined scope and set of guidelines – ethical hackers must
perform the security assessment such that is within legal bounds and is conducted within an organization’s
network.
You make a list of seven similar principles. Don’t just copy – rephrase in your own words and cite your sources.Exercise 2 (Experimental): In this exercise, you will be using the hping3 utility on Kali Linux to simulate Denial
of Service (DoS) attacks using some of the techniques that we discussed in the lectures.
Important note: You will be launching the DoS attack inside your own laptop/desktop by creating virtual
machines. Further, you will be launching the attack on a loopback address 127.0.0.1. A packet with a loopback
address never leaves your machine.
While hping3 is a utility used by network administrators and security professionals for firewall rule testing, port
scanning, etc., the same tool can be used by hackers. Please be aware of this and never use this tool for DoSing
outside systems or networksExperiment No. 1: Simulation of a TCP SYN DoS attack
a. Craft a hping3 command line statement to do the following:
Send TCP SYN segments as fast as you can to port number 80 and segment size 65000, with 127.0.0.1 as
the destination ip address. Set window size to 32.
b. Run the above command that you crafted on the terminal window.
c. On another terminal window, run the top command (the top command shows the real-time view of the
processes running on your system).
d. Start the Wireshark capture of the terminal window.
e. Take a screenshot of the terminal window with the hping3 command, and the Wireshark capture.
f. Take two screenshots of the terminal window running the top command, one before the attack and
during the attack.
g. Answer the following questions:
a. What are the values of the source and destination IP addresses, protocol field, total length, and
header checksum in the IP part of the Wireshark capture?
b. What are the values of the source and destination port numbers, flags that are set, and window
size in the TCP part of the Wireshark capture?
c. What differences do you observe in the CPU and memory utilization from the top command
capture before and during the attack?
In your answer document, record the screen captures and your answers to question (g). Experiment No. 2: Simulation of a UDP Flood DoS attack
a. Craft a hping3 command line statement to do the following:
Send 20000 UDP segments, each of size 4000 bytes, at the rate of 100/second to a UDP port no. 69 and
destination address 127.0.0.1
(Note: UDP standard port 69 is reserved for TFTP (Trivial file transfer protocol) which is most likely not in
use on your machine. Again, remember that 127.0.0.1 is a loopback address – the packets don’t leave
your machine).
b. Run the above command that you crafted on the terminal window.
c. On another terminal window, run the top command (the top command shows the real-time view of the
processes running on your system).
d. Start the Wireshark capture of the terminal window.
e. Take a screenshot of the terminal window with the hping3 command, and the Wireshark capture.
f. Take two screenshots of the terminal window running the top command, one before the attack and
during the attack.
g. Answer the following questions:
a. What are the values of the source and destination IP addresses, protocol field, total length, and
header checksum in the IP part of the Wireshark capture?
b. What are the values of the source and destination port numbers, and header checksum in the
UDP part of the Wireshark capture?
c. What differences do you observe in the CPU and memory utilization from the top command
capture before and during the attack?
In your answer document, record the screen captures and your answers to question (g)..
Requirements: in word and screen shot