What is the MAC address of the web server?
What was the attacker trying to achieve with this action?
Explain what information the attacker derived at the end of the attempt.
Identify the IP address of the webserver
Identify the victim of ARP spoofing
What is the attacker’s IP address and MAC address?
Which IP address(es) of the ARP table was poisoned by the attacker? Justify your answer
Did the attacker modify some HTTP response, which packet is the modified HTTP response? Answer the packet number and the HTML strings contained in the packet.
What is the web server IP and domain name?
Identify the DNS cache server and DNS content server IP address.
Identify the attacker’s IP and MAC address.
Which TCP source port does the cache server use?
Discuss the type of attack and achievement of the attacker
The attacker is trying to exploit some web application. What is the name of the filename?
Which parameter is used for this exploitation and what is the purpose of the
Which TCP port number that the attacker trying to open for the back door?
Is this exploit successfully? Justify your answer
Besides analyzing packet capture files, what is another way of analyzing this attack?
Are You Searching Answer of this Question? Request Malaysian Writers to Write a plagiarism Free Copy for You.
The postappeared first on .