Lab 4 Nat

In: Computers and Technology

Submitted By johnsmith52
Words 932
Pages 4
Lab 4
NAT
Joel Garcia
Cgs 4285

Contents
Objective: 3
Procedures: 3
Experience: 3
Conclusion: 4
Data Table Error! Bookmark not defined.
Questions 5

Objective:

The objective of this lab is to configure DNS client settings, for Linux and Windows Stations, to observe DNS in action, and to observe NAT in action.
Procedures:

1. First, verify that workstation 1 and workstation 2 have the correct IP addresses and default route.

2. Configure DNS servers for workstation 1 and workstation 2. After, configure workstation 2 to use 131.94.131.43 as a DNS resolver by entering the command: echo “nameserver 131.94.133.43” > /etc/resolv.conf. Afterwards, configure workstation 1by going to TCP/IP Properties and adding 131.94.133.43 as the DNS server.

3. Next, find the public IP address of the eth0 interface on the monitor workstation by using the ifconfig command. As a root on the monitor, input:
tcpdump -i eth0 -n -s 0 -w /tmp/public.pcap host PUBLICIPADDRESS &
tcpdump -i eth1 -n -s 0 -w /tmp/private-net1.pcap &
tcpdump -i eth2 -n -s 0 -w /tmp/private-net2.pcap &
4. Then, connect to port 7 and source port 2000 on workstation 1 with the command:
nc -p 2000 cgs4285.cs.fiu.edu 7
Type in three or four lines of random data and repeat the same process for workstation 2. Enter “ctrl+c” afterwards to stop the process on workstation 1 and 2.


5. On the monitor station, enter this command to stop the ‘tcpdump’ process:
kill %1 %2 %3
6. Now remove the default route on the mon box and add a special route to copy off the data.
route del -net default
route add -net 131.94.0.0/16 gw 131.94.128.2

kill %1 %2

7. Lastly, copy off the two 'pcap' files to the JCCL linux account on ocelot.cs.fiu.edu. Use wireshark to analyze these offline. On…...

Similar Documents

Lab 4

...1. Define why change control management is relevant to security operations in an organization? It allows having the ability to manage what users have can and can’t do in the 2. What type of access control system uses security labels? LBAC Label-base access control 3. Describe two options you would enable in a Window’s Domain password policy? Uppercase letters along with lowercase and numbers 0-9 4. Where would patch management and software updates fall under in security operations and management? The SA or other authorized personnel are responsible for informing local administrators about patches that correspond to software packages included on the organizational software inventory. 5. Is there a setting in your GPO to specify how many login attempts will lockout an account? Name 2 parameters that you can set to enhance the access control to the system. You can augment the default access privileges for an access level. When you configure a user account, you can give the account one of three privilege levels: full access, port-configuration access, and read-only access. 6. What are some password policy parameter options you can define for the GPO’s that can enhance the C-I-A for system access? A good password policy should require passwords to be at least some specified number of characters long. It should also require that all passwords contain at least one letter and one number and a special character. One other rule to implement would be...

Words: 414 - Pages: 2

Nat Configuration

... information in this document is based on these software and hardware versions: • Cisco 2500 Series Routers • Cisco IOS® Software Release 12.2 (10b) The information in this document was created from the devices in a specific lab environment. All of the devices used in this document started with a cleared (default) configuration. If your network is live, make sure that you understand the potential impact of any command. Conventions Refer to Cisco Technical Tips Conventions for more information on document conventions. Quick Start Steps for Configuring and Deploying NAT When you configure NAT, it is sometimes difficult to know where to begin, especially if you are new to NAT. These steps guide you to define what you want NAT to do and how to configure it: 1. Define NAT inside and outside interfaces. ♦ Do users exist off multiple interfaces? ♦ Are there multiple interfaces going to the internet? 2. Define what you're trying to accomplish with NAT. ♦ Are you trying to allow internal users to access the internet? ♦ Are you trying to allow the internet to access internal devices (such as a mail server or web server)? ♦ Are you trying to redirect TCP traffic to another TCP port or address? ♦ Are you using NAT during a network transition (for example, you changed a server's IP address and until you can update all the clients you want the non−updated clients to be able to access the server using the original IP address as well as allow the updated clients to access the server......

Words: 3234 - Pages: 13

Nat Turner

...Nat Turner was a very intelligent man based upon his confession. He claimed to have been born with a special ability given to him by the Lord to know of events from before his birth. He also believed that he was being used by the Lord for a greater purpose in his life. When he could have escaped, he felt compelled by the Spirit to return to his master and continue his work there. Upon reading the first couple of pages in his confession, Nat Turner seemed like a very respectful and innocent man. What was surprising was the lack of remorse or fear in his confession about the things he had witnessed and participated in. It felt as though he was telling a made up horror story of men, women and children getting brutally murdered in their sleep. His report of killing his master and the family is told very nonchalantly but with great detail. In the beginning of the confession when he was explaining the meeting he had to come up with the plan, he had claimed that he had no real complaint against how his master treated him. He also said his master was kind and placed great trust (confidence) in him. Despite his seemingly positive feelings towards his master, he still plotted and carried out the murder of him and his entire family. Nat gave his master a blow to the head that was not strong enough to kill so Will killed him after he woke up from the violent blow. The master’s wife was then killed in the same bed. It was disturbing reading how they had forgotten the infant that was...

Words: 432 - Pages: 2

Lab 4

...In this lab, you explored all five phases of hacking using Zenmap GUI for Nmap, Nessus®, BackTrack4, and the Metasploit Framework application. Lab Assessment Questions & Answers 1. What are the five steps of a hacking attack? Footprinting- acquiring information about target Scanning - use acquired information from footprinting to gain more detailed information Enumeration- Extracting more-detailed and useful information System hacking- attack a system using a method that deems useful Covering Tracks – Covering tracks to avoid detection 2. During the reconnaissance step of the attack, describe what task Zenmap GUI performs to do passive OS fingerprinting. sends commands to the platform-specific nmap executable and pipes the output back 3. What step in the hacking attack process uses Zenmap GUI? System Hacking 4. What step in the hacking attack process identifies known vulnerabilities and exploits? enumeration 5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”? MS08-067: Vulnerability in Server service could allow remote code execution. 6. Which tool and application were used to exploit the identified vulnerability on the targeted Microsoft® Windows 2003 XP server? Microsoft Server Service Relative Path Stack Corruption and Metasploit 7. If...

Words: 357 - Pages: 2

Lab 4

...1. The five steps to a hacking attack is reconnaissance, scanning, gaining access, maintaining access and covering tracks. 2. During the reconnaissance step Zenmap GUI performs the task of fingerprinting and port scanning. It sends commands to the platform-specific nmap executable and pipes the output back. The process monitors and captures network traffic. The traffic is analyzed to determine which operating system is used. 3. Zenmap GUI is used during the scanning process. 4. Vulnerabilities and exploits are identified in the enumeration step of the hacking process. 5. The software vulnerability that was found was ms-08-067 and this vulnerability makes the remote host vulnerable to a buffer overrun in the Server service that may allow an attacker to execute arbitrary code on the remote host with the System privileges 6. The tools used to exploit the identified know software vulnerabilities on the targeted Windows XP professional workstation were the Microsoft Server Service Relative Path Stack Corruption and Metasploit. 7. When you are a member of a security penetration testing team. You should obtain written permission from an owner prior to compromising and exploiting the know vulnerabilities. 8. Ettercap is a free and open source network security tool for man-in-the-middle attacks on LAN. It can be used for computer network protocol analysis and security auditing. It is capable of intercepting traffic on a network segment, capturing......

Words: 281 - Pages: 2

Phase 2 Lab 4

...Assessment Worksheet 65 LAB #4 – ASSESSMENT WORKSHEET Configure Group Policy Objects and Microsoft® Baseline Security Analyzer (MBSA) Course Name and Number: CSS150-1402A-01 Student Name: Samuel French Instructor Name: Cheryl Garvin Lab Due Date: April 21, 2014 Overview In this lab, you used group policy objects to create a minimum password length password policy and link it to the newly created domain from the previous lab. You also ran the Microsoft® Baseline Security Analyzer (MBSA) and reviewed the results of the MBSA scan. Lab Assessment Questions & Answers 1. Describe two options you would enable in a Windows Domain password policy. password requirements lock out after x number of failed attempts 2. Is there a setting in your GPO to specify how many logon attempts will lock out an account? Name two parameters that you can set to enhance the access control to the system. Yes . Two parameters that one could use would be an account lockout duration and the threshold of what could be accessed. 4 3. What are some password policy parameter options you can define for GPOs that can enhance the CIA for Configure Group Policy Objects and Microsoft® Baseline Security Analyzer (MBSA) system access? Some policy parameter options that one could define are: setting a password minimum length 3 of the following: capitals, lowercase, numbers, special characters no reuse of the last 12 passwords 30-90 day password expiration 66 Lab...

Words: 419 - Pages: 2

Lab 4

...Willie Harris ------------------------------------------------- is3230 lab 4.2 Implement Organizational-Wide Network and WLAN Access Controls 1. Each time you open a port or allow a program to communicate through a firewall, your computer becomes a bit less secure. The more allowed programs or open ports your firewall has, the more opportunities there are for hackers or malicious software to use one of those openings to spread a worm, access your files, or use your computer to spread malicious software to othersEach time you open a port or allow a program to communicate through a firewall, your computer becomes a bit less secure. The more allowed programs or open ports your firewall has, the more opportunities there are for hackers or malicious software to use one of those openings to spread a worm, access your files, or use your computer to spread malicious software to others. 2. 2. By going to start -> control Panel -> Select firewall there it gives you the options that are on Windows Firewall. 3. First if you’re sitting in a coffee shop and decide you want to check your Facebook page and your email to kill some time. You scan the available networks and see one that’s open and unsecured. You connect and start surfing. Coffee and free WiFi, what could be better, right? Wrong! A hacker is also fond of coffee shops and he is located within range of the router you connected to. He’s waiting for one or more people to connect to the network so he can start...

Words: 628 - Pages: 3

Lab 4 Nat

...Lab 4 NAT Joel Garcia Cgs 4285 Contents Objective: 3 Procedures: 3 Experience: 3 Conclusion: 4 Data Table Error! Bookmark not defined. Questions 5 Objective: The objective of this lab is to configure DNS client settings, for Linux and Windows Stations, to observe DNS in action, and to observe NAT in action. Procedures: 1. First, verify that workstation 1 and workstation 2 have the correct IP addresses and default route. 2. Configure DNS servers for workstation 1 and workstation 2. After, configure workstation 2 to use 131.94.131.43 as a DNS resolver by entering the command: echo “nameserver 131.94.133.43” > /etc/resolv.conf. Afterwards, configure workstation 1by going to TCP/IP Properties and adding 131.94.133.43 as the DNS server. 3. Next, find the public IP address of the eth0 interface on the monitor workstation by using the ifconfig command. As a root on the monitor, input: tcpdump -i eth0 -n -s 0 -w /tmp/public.pcap host PUBLICIPADDRESS & tcpdump -i eth1 -n -s 0 -w /tmp/private-net1.pcap & tcpdump -i eth2 -n -s 0 -w /tmp/private-net2.pcap & 4. Then, connect to port 7 and source port 2000 on workstation 1 with the command: nc -p 2000 cgs4285.cs.fiu.edu 7 Type in three or four lines of random data and repeat the same process for workstation 2. Enter “ctrl+c” afterwards to stop the process on workstation 1 and 2. 5. On the monitor...

Words: 932 - Pages: 4

Digital Forensics Lab 4

...CCSI 410 Forensic Lab Report 1) Investigator’s Name: 2) Date of Investigation: August 2, 2014 3) Lab Number and Title: Lab 4 Keyword Searches 4) Summary of Findings: I did the steps required to fulfill my report. I found there is enough evidence to continue the investigation due to the search results. 5) Details of Investigation 1. 11.45 pm – Turned on suspect computer 2. 11: 47 pm – Entered lab environment 3. 11: 49 pm – Determined keyword list 4. 11:59 pm – Added the floppy image 5. Augest 3rd 12:05 am – Added keywords to the search utility 6. 12:09 am – Initial look at .emi files and addressbook.csv complete 7. 12:11 am – Search using keywords 8. 12:15 am – Completed report 6) Please type the answers to the questions found throughout the lab here. 1. Bid rigging is well rigging a bid so that a certain firm will win the bid. http://www.ftc.gov/tips-advice/competition-guidance/guide-antitrust-laws/dealings-competitors/bid-rigging Bid Rotation is when bidding is predetermined which firm is going to win and the other firms involved in the process get something out of it as well so basically a win-win situation for all involved parties. Bid suppression is where firms can enter the bid but choose to not do so in order to let another firm win. Bid cover is when the firms making the bid knows their bid will be rejected so that another firm will the bid. 2. There are many words and...

Words: 579 - Pages: 3

Matt&Nat

...Part4: Suggested marketing strategies based on four elements of marketing mix: product (and brand positioning), pricing, promotion and distribution strategies, in order to introduce this new product/service to consumers in the new market. 4.3 Interview with founder about the bag-throwing promotion that was successful in Canada. According to Vegan accessories maker has success in the bag, MATT&NAT is an eco-friendly, vegan line of hands and wallets designed in Montreal, Canada. Also, Inder Bedi, founder and creative director of MATT&NAT, making the company values clear in their mission statement. “The company used e-mail and social media to alert fans, then let them spread the word. Close to 1,000 people showed up for the freebie event, which was posted on YouTube”(Jermyn, 2011). The company has realized the benefits of using Internet and media to spread their products, in order to attract more and more consumers to buy it. In addition, Matt& Nat’s mid-priced lines of men’s and women’s vegan bags, belts and wallets, made mainly with recycled plastic bottles and free of any animal products, are popular with stars. The company, which gets celebrities to endorse their products because of the big influence of celebrities, can bring more benefits to improve firm’s profits. “If somebody sees a celebrity wearing your product, it has to be relatively easy for them to go out and get the same product, and it has to be accessible in terms of price points”(Jermyn, 2011...

Words: 740 - Pages: 3

Lab 4

.... Now you want see if the hacker has succeeded in penetrating your system. How would you view the results of this logon audit? View Disk Quota Log File You have created disk quotas for your employees. At the same time, you also created a log file to alert you if employees exceeded their limits. Where you would go to view this log file? View Log Files You suspect that a service failed to start when your system started. Where would you find the log files that describe this failure? Local Security Policy Account Lockout Policy - Duration The IT department is implementing an account lockout policy that will keep a user’s account locked for 15 minutes during a hacker’s attack. Your assignment is to create an account lockout policy that will release the user’s account after being locked for 15 minutes. Account Lockout Policy – Reset Counter Create an account lockout policy that will allow the counter to be reset after 15 minutes of inactivity. Account Lockout Policy - Threshold In order to prevent a hacker from gaining access to your network, you decide to implement an account lockout policy. Create an account lockout policy that will lock a user’s account after 4 failed logon attempts. Audit Policy You suspect that someone has been attempting to hack into your computer at night, so you decide to create an audit of all logon attempts. Without creating a group policy, set up an audit that will record both...

Words: 6123 - Pages: 25

Lab 4

...Sandra Guzman 01/22/2015 Lab 4 Deliverables Note: Screenshots will be provided at the end. Q: From your local computer, use your favorite Internet browser to research the threat identified on this screen and the possible remediation steps and document your findings in your Lab Report file. Viruses found: 1. Win32/DH{eR4UTxVzG3U} 2. Win32/DH{eR4UTxVzG3U} 3. Win32/DH{HhMXFE8Vcxt1} 4. Trojan horse Dropper.Generic4.BVMA 5. Trojan horse Hider.BNG 6. Trojan horse PSW.Generic11.NYJ 7. Potentially harmful program Logger.IAC 8. Potentially harmful program RemoteAdmin.IH 9. Potentially harmful program Tool.IT Assessment: 1. It seems that the first three are all the same type of virus. A “Win/DH is a malicious software that once it is executed has the capability of replicating itself and infect other files and programs”( Win/DH). They “can steal hard disk space and memory that slows down or completely halts your PC, corrupt or delete data, erase your hard drive, steal personal information, hijack your screen and spam your contacts to spread itself to other users” (Win/DH). To avoid the possibility of one, you should be careful of e-mail attachments especially if they are from an outside source, as well as download links on websites. Having a virus removing application such as AVG is essential to being able to remove these viruses before they spread. AVG is capable of detecting this virus while surfing the web...

Words: 1494 - Pages: 6

Lab 4

...NT1210 Lab 4.1 : Copper Cabling Exercise 4.1.1 Stability, consistency, and minimization of packet errors. Exercise 4.1.2 The power requirements to send data is much lower than the requirements to transfer electricity. Exercise 4.1.3 Protection from power frequency, radio frequency interference, reducing errors generated. Exercise 4.1.4 CategoryMaximum SpeedApplication 11MbpsVOICE ONLY( TELEPHONE WIRES) 24MbpsLOCAL TALK & TELEPHONE 316Mbps10 BASE T ETHERNET 420MbpsTOKEN RING 5100/1000100 BASE T ETHERNET/GIGABIT ETHERNET 5E1Gbps/1000mbpsGIGABIT ETHERNET 610GbpsGIGABIT ETHERNET/IP TELPHONY 6E10GbpsGAGBIT ETHERNET/HIG END WORK STATION Exercise 4.1.5 Exercise 4.1.6 Coaxial cable conducts electrical signal using an inner conductor (usually a solid copper, stranded copper or copper plated steel wire) surrounded by an insulating layer and all enclosed by a shield, typically one to four layers of woven metallic braid and metallic tape. The cable is protected by an outer insulating jacket. Normally, the shield is kept at ground potential and a voltage is applied to the center conductor to carry electrical signals. Exercise 4.1.7 The distance limit is 100m for UTP cabling.  It is very important that you know exactly how to wire UTP cables. Cabling is the base of a solid network, and doing it correctly the first time will help you avoid hours of frustration and troubleshooting. On the other hand, if you are dealing with a poorly cabled network...

Words: 611 - Pages: 3

Lab 4

...Leando Henderson Jr NT1210 Lab Exercise 4.1.1 On page 107 the book explains that standards exist for the NIC and the cabling so that all networks and equipment would match up if not then you might buy a computer and it not fit your cabling on your network or vice versa. These standards exist so that all equipment would match up and networks could be simplified. Exercise 4.1.3 Shielded copper cable is currently best known for POE equipment. Security systems, Microphones, and other high end audio cables would be my best examples for a clear visual. This super expensive cabling is used for these types of applications because the shielding help to prevent the Electro Magnetic Interference to be more specific on a security system this shielding and braiding eliminates the false alarms that would occur if not for the shielding. Exercise 4.1.10 Multimeter : The purpose of a multimeter is to measure how much voltage or electrical signal that is currently being transmitted thru a cable or medium. A basic tool for any electrician or IT personnel Tone Generator: This equipment generates audio pulses to components. In the case of audio equipment testing, frequency response and sound evaluation are recorded. Pair Scanner: A Pair Scanner is used to find faults on cabling in a network. Time domain reflector (TDR): Used to locate faults in metallic cables (for example, twisted pair wire or coaxial cable). It can also be used to locate discontinuities in a connector,......

Words: 320 - Pages: 2

Lab 4

...Lab 4 Daniel Torres NT1410 Mr. Kay 1/28/2016 Virtual Lab Tour The first difference I did take notice was the entirely different look that it brought up. With Windows 10, we have the start menu, which in my case, is a reason I love Windows and its OS. Ubuntu doesn’t have one, but it is still manageable. The office applications it comes with is pre-installed and works just as fine as it would with Windows. Spreadsheets to Word, it is all in there with no hassle. The office suite that really makes the difference in both configurations is the look and feel. With icons being changed and a different feel about it. The windows landscape of it changing the closing current window bugs me because it is on the left rather than the normal right I am used to. Although Ubuntu office software is limited and only most used applications for that suite would be used on everyday uses, it doesn’t compare to that of Windows 10. The dash home environment from Ubuntu brings up limited content that you would use immediately, but not the essentials in Windows 10. I would like to implement the Start Menu to Ubuntu as many users in the Windows 8 community did not like the fact that Microsoft took the number one feature out. The installation of Ubuntu differed on the fact that it took quite some time to install and the student next to me had a problem himself though. It sent him into terminal rather than the GUI interface of the desktop. I had no issues on my part, other than......

Words: 278 - Pages: 2