Premium Essay

Lab 4 Nat

In: Computers and Technology

Submitted By johnsmith52
Words 932
Pages 4
Lab 4
NAT
Joel Garcia
Cgs 4285

Contents Objective: 3 Procedures: 3 Experience: 3 Conclusion: 4 Data Table Error! Bookmark not defined. Questions 5

Objective:

The objective of this lab is to configure DNS client settings, for Linux and Windows Stations, to observe DNS in action, and to observe NAT in action.
Procedures:

1. First, verify that workstation 1 and workstation 2 have the correct IP addresses and default route.

2. Configure DNS servers for workstation 1 and workstation 2. After, configure workstation 2 to use 131.94.131.43 as a DNS resolver by entering the command: echo “nameserver 131.94.133.43” > /etc/resolv.conf. Afterwards, configure workstation 1by going to TCP/IP Properties and adding 131.94.133.43 as the DNS server.

3. Next, find the public IP address of the eth0 interface on the monitor workstation by using the ifconfig command. As a root on the monitor, input: tcpdump -i eth0 -n -s 0 -w /tmp/public.pcap host PUBLICIPADDRESS & tcpdump -i eth1 -n -s 0 -w /tmp/private-net1.pcap & tcpdump -i eth2 -n -s 0 -w /tmp/private-net2.pcap & 4. Then, connect to port 7 and source port 2000 on workstation 1 with the command: nc -p 2000 cgs4285.cs.fiu.edu 7
Type in three or four lines of random data and repeat the same process for workstation 2. Enter “ctrl+c” afterwards to stop the process on workstation 1 and 2.

5. On the monitor station, enter this command to stop the ‘tcpdump’ process: kill %1 %2 %3 6. Now remove the default route on the mon box and add a special route to copy off the data. route del -net default route add -net 131.94.0.0/16 gw 131.94.128.2

kill %1 %2

7. Lastly, copy off the two 'pcap' files to the JCCL linux account on ocelot.cs.fiu.edu. Use wireshark to analyze these offline. On…...

Similar Documents

Premium Essay

Lab 4 Doc.

...Lab #4 – Assessment Worksheet Configure Group Policy Objects and Microsoft Baseline Security Analyzer (MBSA) Course Name & Number: NT2580 Student Name: Bryan Villa Instructor Name: Mr. Kravitz Lab Due Date: May 17, 2013 Lab #3 Assessment Questions & Answers 1. Define why change control management is relevant to security operations in an organization? Allows for testing and documentation of changes before they sent to management for review and implementation. 2. What type of access control system uses security labels? Logical/MAC 3. Describe two options you would enable in a Window’s Domain password policy? -Password must meet requirements -30 minute lockout after 3 failed attempts to get login correct 4. Where would patch management and software updates fail under security operations management? They must ensure the patches and updates don’t affect other programs or even leave weak spots in a systems security. 5. Is there a setting in your GPO to specify how many login attempts will lockout an account? Name 2 parameters that you can set to enhance the access control to the system. Yes a. Password must meet the requirements b. Minimum password length 6. What are some Password Policy parameters that you can define for GPOs that can enhance the C-I-A for system access? c. Enforce password history d. Minimum password age e. Maximum password age f. Password must meet complexity requirements 7. What...

Words: 326 - Pages: 2

Premium Essay

Lab 4

...1. The five steps to a hacking attack is reconnaissance, scanning, gaining access, maintaining access and covering tracks. 2. During the reconnaissance step Zenmap GUI performs the task of fingerprinting and port scanning. It sends commands to the platform-specific nmap executable and pipes the output back. The process monitors and captures network traffic. The traffic is analyzed to determine which operating system is used. 3. Zenmap GUI is used during the scanning process. 4. Vulnerabilities and exploits are identified in the enumeration step of the hacking process. 5. The software vulnerability that was found was ms-08-067 and this vulnerability makes the remote host vulnerable to a buffer overrun in the Server service that may allow an attacker to execute arbitrary code on the remote host with the System privileges 6. The tools used to exploit the identified know software vulnerabilities on the targeted Windows XP professional workstation were the Microsoft Server Service Relative Path Stack Corruption and Metasploit. 7. When you are a member of a security penetration testing team. You should obtain written permission from an owner prior to compromising and exploiting the know vulnerabilities. 8. Ettercap is a free and open source network security tool for man-in-the-middle attacks on LAN. It can be used for computer network protocol analysis and security auditing. It is capable of intercepting traffic on a network segment, capturing passwords...

Words: 281 - Pages: 2

Free Essay

Lab 4

...Willie Harris ------------------------------------------------- is3230 lab 4.2 Implement Organizational-Wide Network and WLAN Access Controls 1. Each time you open a port or allow a program to communicate through a firewall, your computer becomes a bit less secure. The more allowed programs or open ports your firewall has, the more opportunities there are for hackers or malicious software to use one of those openings to spread a worm, access your files, or use your computer to spread malicious software to othersEach time you open a port or allow a program to communicate through a firewall, your computer becomes a bit less secure. The more allowed programs or open ports your firewall has, the more opportunities there are for hackers or malicious software to use one of those openings to spread a worm, access your files, or use your computer to spread malicious software to others. 2. 2. By going to start -> control Panel -> Select firewall there it gives you the options that are on Windows Firewall. 3. First if you’re sitting in a coffee shop and decide you want to check your Facebook page and your email to kill some time. You scan the available networks and see one that’s open and unsecured. You connect and start surfing. Coffee and free WiFi, what could be better, right? Wrong! A hacker is also fond of coffee shops and he is located within range of the router you connected to. He’s waiting for one or more people to connect to the network so he can start......

Words: 628 - Pages: 3

Premium Essay

Lab Nat 4 Applied Networking

...Lab 4 NAT Joel Garcia Cgs 4285 Contents Objective: 3 Procedures: 3 Experience: 3 Conclusion: 4 Data Table Error! Bookmark not defined. Questions 5 Objective: The objective of this lab is to configure DNS client settings, for Linux and Windows Stations, to observe DNS in action, and to observe NAT in action. Procedures: 1. First, verify that workstation 1 and workstation 2 have the correct IP addresses and default route. 2. Configure DNS servers for workstation 1 and workstation 2. After, configure workstation 2 to use 131.94.131.43 as a DNS resolver by entering the command: echo “nameserver 131.94.133.43” > /etc/resolv.conf. Afterwards, configure workstation 1by going to TCP/IP Properties and adding 131.94.133.43 as the DNS server. 3. Next, find the public IP address of the eth0 interface on the monitor workstation by using the ifconfig command. As a root on the monitor, input: tcpdump -i eth0 -n -s 0 -w /tmp/public.pcap host PUBLICIPADDRESS & tcpdump -i eth1 -n -s 0 -w /tmp/private-net1.pcap & tcpdump -i eth2 -n -s 0 -w /tmp/private-net2.pcap & 4. Then, connect to port 7 and source port 2000 on workstation 1 with the command: nc -p 2000 cgs4285.cs.fiu.edu 7 Type in three or four lines of random data and repeat the same process for workstation 2. Enter “ctrl+c” afterwards to stop the process on workstation 1 and 2. 5. On the monitor......

Words: 932 - Pages: 4

Premium Essay

Lab 4

...that describe this failure? Local Security Policy Account Lockout Policy - Duration The IT department is implementing an account lockout policy that will keep a user’s account locked for 15 minutes during a hacker’s attack. Your assignment is to create an account lockout policy that will release the user’s account after being locked for 15 minutes. Account Lockout Policy – Reset Counter Create an account lockout policy that will allow the counter to be reset after 15 minutes of inactivity. Account Lockout Policy - Threshold In order to prevent a hacker from gaining access to your network, you decide to implement an account lockout policy. Create an account lockout policy that will lock a user’s account after 4 failed logon attempts. Audit Policy You suspect that someone has been attempting to hack into your computer at night, so you decide to create an audit of all logon attempts. Without creating a group policy, set up an audit that will record both successful and unsuccessful logon attempts. Password Policy - Complexity Create a password policy that forces users to use upper case letters, lower case letters, numbers, and/or symbols in their passwords. Password Policy - History Create a password policy that does not allow a user to reuse his/her last 3 passwords. Password Policy – Maximum Age Create a password policy that requires a user to change his/her password every 60 days. Password Policy –......

Words: 6123 - Pages: 25

Premium Essay

Lab 4

...Sandra Guzman 01/22/2015 Lab 4 Deliverables Note: Screenshots will be provided at the end. Q: From your local computer, use your favorite Internet browser to research the threat identified on this screen and the possible remediation steps and document your findings in your Lab Report file. Viruses found: 1. Win32/DH{eR4UTxVzG3U} 2. Win32/DH{eR4UTxVzG3U} 3. Win32/DH{HhMXFE8Vcxt1} 4. Trojan horse Dropper.Generic4.BVMA 5. Trojan horse Hider.BNG 6. Trojan horse PSW.Generic11.NYJ 7. Potentially harmful program Logger.IAC 8. Potentially harmful program RemoteAdmin.IH 9. Potentially harmful program Tool.IT Assessment: 1. It seems that the first three are all the same type of virus. A “Win/DH is a malicious software that once it is executed has the capability of replicating itself and infect other files and programs”( Win/DH). They “can steal hard disk space and memory that slows down or completely halts your PC, corrupt or delete data, erase your hard drive, steal personal information, hijack your screen and spam your contacts to spread itself to other users” (Win/DH). To avoid the possibility of one, you should be careful of e-mail attachments especially if they are from an outside source, as well as download links on websites. Having a virus removing application such as AVG is essential to being able to remove these viruses before they spread. AVG is capable of detecting this virus while surfing the web and...

Words: 1494 - Pages: 6

Premium Essay

Lab 4: Enzymes

...INSTRUCTIONS: • On your own and without assistance, complete this Lab 4 Answer Sheet electronically and submit it via the Assignments Folder by the date listed in the Course Schedule (under Syllabus). • To conduct your laboratory exercises, use the Laboratory Manual located under Course Content. Read the introduction and the directions for each exercise/experiment carefully before completing the exercises/experiments and answering the questions. • Save your Lab 4 Answer Sheet in the following format: LastName_Lab4 (e.g., Smith_Lab4). • You should submit your document as a Word (.doc or .docx) or Rich Text Format (.rtf) file for best compatibility. Pre-Lab Questions 1. How could you test to see if an enzyme was completely saturated during an experiment? 2. List three conditions that would alter the activity of an enzyme. Be specific with your explanation. 3. Take a look around your house and identify household products that work by means of an enzyme. Name the products, and indicate how you know they work with an enzyme. Experiment 1: Enzymes in Food This experiment tests for the presence of amylase in food by using Iodine-Potassium Iodide, IKI. IKI is a color indicator used to detect starch. This indicator turns dark purple or black in color when in the presence of starch. Therefore, if the IKI solution turns to a dark purple or black color during the experiment, one can determine that amylase is not present (because presence of amylase would break......

Words: 1945 - Pages: 8

Free Essay

Week 4 Lab

...Lab 4 – Energy Sources and Alternative Energy Experiment 1: The Effects of Coal Mining |Table 1: pH of Water Samples | |Water Sample |Initial pH |Final pH (after 48 hours) | |Pyrite |6 |7 | |Activated Carbon |6 |6 | |Water |6 |6 | POST LAB QUESTIONS 1. Develop hypotheses predicting the effect of pyrite and coal (activated carbon) on the acidity of water? a. Pyrite hypothesis = If pyrite is in the water source, then it will make the specimen more acidic b. Coal (activated carbon) hypothesis = If coal is in the water source, then it will make the specimen less acidic 2. Based on the results of your experiment, would you reject or accept each hypothesis that you produced in question 1? Explain how you determined this. a. Pyrite hypothesis accept/reject = Rejected, The hypothesis “If pyrite is in the water source, then it will make...

Words: 1163 - Pages: 5

Free Essay

Lab 4

...NT1210 Lab 4.1 : Copper Cabling Exercise 4.1.1 Stability, consistency, and minimization of packet errors. Exercise 4.1.2 The power requirements to send data is much lower than the requirements to transfer electricity. Exercise 4.1.3 Protection from power frequency, radio frequency interference, reducing errors generated. Exercise 4.1.4 CategoryMaximum SpeedApplication 11MbpsVOICE ONLY( TELEPHONE WIRES) 24MbpsLOCAL TALK & TELEPHONE 316Mbps10 BASE T ETHERNET 420MbpsTOKEN RING 5100/1000100 BASE T ETHERNET/GIGABIT ETHERNET 5E1Gbps/1000mbpsGIGABIT ETHERNET 610GbpsGIGABIT ETHERNET/IP TELPHONY 6E10GbpsGAGBIT ETHERNET/HIG END WORK STATION Exercise 4.1.5 Exercise 4.1.6 Coaxial cable conducts electrical signal using an inner conductor (usually a solid copper, stranded copper or copper plated steel wire) surrounded by an insulating layer and all enclosed by a shield, typically one to four layers of woven metallic braid and metallic tape. The cable is protected by an outer insulating jacket. Normally, the shield is kept at ground potential and a voltage is applied to the center conductor to carry electrical signals. Exercise 4.1.7 The distance limit is 100m for UTP cabling.  It is very important that you know exactly how to wire UTP cables. Cabling is the base of a solid network, and doing it correctly the first time will help you avoid hours of frustration and troubleshooting. On the other hand, if you are dealing with a poorly cabled network,......

Words: 611 - Pages: 3

Free Essay

Lab 4

...Leando Henderson Jr NT1210 Lab Exercise 4.1.1 On page 107 the book explains that standards exist for the NIC and the cabling so that all networks and equipment would match up if not then you might buy a computer and it not fit your cabling on your network or vice versa. These standards exist so that all equipment would match up and networks could be simplified. Exercise 4.1.3 Shielded copper cable is currently best known for POE equipment. Security systems, Microphones, and other high end audio cables would be my best examples for a clear visual. This super expensive cabling is used for these types of applications because the shielding help to prevent the Electro Magnetic Interference to be more specific on a security system this shielding and braiding eliminates the false alarms that would occur if not for the shielding. Exercise 4.1.10 Multimeter : The purpose of a multimeter is to measure how much voltage or electrical signal that is currently being transmitted thru a cable or medium. A basic tool for any electrician or IT personnel Tone Generator: This equipment generates audio pulses to components. In the case of audio equipment testing, frequency response and sound evaluation are recorded. Pair Scanner: A Pair Scanner is used to find faults on cabling in a network. Time domain reflector (TDR): Used to locate faults in metallic cables (for example, twisted pair wire or coaxial cable). It can also be used to locate discontinuities in a connector,......

Words: 320 - Pages: 2

Premium Essay

Biology Lab 4 Umuc

...Your Full Name: UMUC Biology 102/103 Lab 4: Enzymes INSTRUCTIONS: * On your own and without assistance, complete this Lab 4 Answer Sheet electronically and submit it via the Assignments Folder by the date listed in the Course Schedule (under Syllabus). * To conduct your laboratory exercises, use the Laboratory Manual located under Course Content. Read the introduction and the directions for each exercise/experiment carefully before completing the exercises/experiments and answering the questions. * Save your Lab 4 Answer Sheet in the following format: LastName_Lab4 (e.g., Smith_Lab4). * You should submit your document as a Word (.doc or .docx) or Rich Text Format (.rtf) file for best compatibility. Pre-Lab Questions 1. How could you test to see if an enzyme was completely saturated during an experiment? - Add more substrate and record the rate. If the rate of the reaction is constant, all the enzymes are saturated. 2. List three conditions that would alter the activity of an enzyme. Be specific with your explanation. * Temperature – Cold temperature will cause the enzyme to work slow, hot temperature will cause the enzyme to increase the movement making it less stable. * PH – Difference in range in the PH scale can alter the shape of the enzyme’s active site * Concentration Of Substrate – Less or more of enzymes to substrates ratio will affect the rate of collisions between the two affecting the number of reactions. ...

Words: 1006 - Pages: 5

Premium Essay

Jbl Lab #4

...Lab #4 – Assessment Worksheet Using Group Policy Objects and Microsoft Baseline Security Analyzer for Change Control Course Name and Number: _____CIST 20700_________________________________________ Student Name: ____________Karen Dudley ________________________________________ Overview There are many tools and suites designed to aid the security practitioner and the organization in implementing and managing change management. In this lab, you explored two such tools for the Windows platform: Group Policy Objects (built into the Windows operating systems) and the Microsoft Security Baseline Analyzer (provided free of charge). You used Group Policy Objects to strengthen the organization’s password policy by adding complexity and minimum password length requirements. You scanned the Windows server with the Microsoft Baseline Security Analyzer (MBSA) to assess its security state, and you examined the results of the Microsoft Baseline Security Analyzer in detail. Lab Assessment Questions & Answers 1. Name six (6) policies you could enable in a Windows Domain. Enforce password history Maximum password age Minimum password age Minimum password length Store password using reversible encryption Password must meet complexity requirements 2. What is the minimum password length enforced by the “Password must meet complexity requirements” policy? 8 characters 3. What sources could you use as a source to perform the MBSA security scan? Computer by Name or......

Words: 298 - Pages: 2

Premium Essay

Lab 4

...Lab 4 Daniel Torres NT1410 Mr. Kay 1/28/2016 Virtual Lab Tour The first difference I did take notice was the entirely different look that it brought up. With Windows 10, we have the start menu, which in my case, is a reason I love Windows and its OS. Ubuntu doesn’t have one, but it is still manageable. The office applications it comes with is pre-installed and works just as fine as it would with Windows. Spreadsheets to Word, it is all in there with no hassle. The office suite that really makes the difference in both configurations is the look and feel. With icons being changed and a different feel about it. The windows landscape of it changing the closing current window bugs me because it is on the left rather than the normal right I am used to. Although Ubuntu office software is limited and only most used applications for that suite would be used on everyday uses, it doesn’t compare to that of Windows 10. The dash home environment from Ubuntu brings up limited content that you would use immediately, but not the essentials in Windows 10. I would like to implement the Start Menu to Ubuntu as many users in the Windows 8 community did not like the fact that Microsoft took the number one feature out. The installation of Ubuntu differed on the fact that it took quite some time to install and the student next to me had a problem himself though. It sent him into terminal rather than the GUI interface of the desktop. I had no issues on my part, other than......

Words: 278 - Pages: 2

Premium Essay

Sql Lab 4

...MET CS 669 Database Design and Implementation for Business SQL Lab 4 Instructions: Procedural......

Words: 6758 - Pages: 28

Premium Essay

Lab 4

...Lab 1 – Introduction to Science Exercise 1: The Scientific Method Dissolved oxygen is oxygen that is trapped in a fluid, such as water. Since many living organisms require oxygen to survive, it is a necessary component of water systems such as streams, lakes, and rivers in order to support aquatic life. The dissolved oxygen is measured in units of parts per million (ppm). Examine the data in Table 4 showing the amount of dissolved oxygen present and the number of fish observed in the body of water the sample was taken from and then answer the questions below. QUESTIONS 1. Make an observation – Based on the data in Table 4, describe the relationship between dissolved oxygen content and fish populations in the body of water. Discuss the pattern observed in the data set. Answer = as the Dissolved Oxygen goes up the greater the survival rate is for the fishes. The pattern for the Dissolved Oxygen goes up by two’s and the number of fish has a unique pattern when matched with the dissolved oxygen. Pattern (2, 4 ppm)…..the fishes decrease by one. (6, 8 ppm)……the fishes increase by 4 (10, 12 ppm)…the fishes increase by 3 (14, 16 ppm)….the fishes decreases by 4 18 ppm…..the fishes decreases by 5 2. Do background research – Utilizing at least one scholarly source, describe how variations in dissolved oxygen content in a body of water can affect fish populations. Answer = According to research the dissolved...

Words: 888 - Pages: 4

1x800 First Dates | Nasze matki, nasi ojc.. | Goosebumps 2: Haunted Halloween