Reference no: EM133188101
SIT379 Ethical Hacking - Deakin University
ARP/MAC attacks
Subtask 1
Use arpspoof to target your pfsense router. Use urlsnarf to determine when the attack has been successful. You should submit the following
1.A screenshot showing urlsnarf is picking up intercepted traffic
2.A screenshot showing the before and after ARP tables on your pfsense VM. Use the arp command to obtain this information.
Subtask 2
Use macof to launch a CAM table flooding attack. You should submit the following.
1.A screenshot showing macof in action.
Setup Virtual Environment.
Subtask 3
Setup your virtual machines. You should have the following, connected as in the figure below. Add a network rule that blocks all traffic from internal network 1 to internal network 2 except for one port. Use traceroute to show this port is open and that there are no other hosts between your target and pfsense. You should submit the following.
1.A screen shot showing what happens when you use traceroute to the target when the port is open vs when it is closed.
Subtask 4
Place your two Kali Machines on the same virtual network. Perform the following scans with nmap, while performing a packet capture between the two. Submit the following.
short explanation of each of the following scans, explaining the differences, when you would use them, and referencing the packet capture to illustrate your point.
(a) Full Connect (b)Syn Scan (c)Xmas Scan
Hijack DNS
Subtask 5
Hijack a DNS query from your XP VM to pfsense. Capture the packets between your Kali attacker and your victim. You should submit the following.
1.A screenshot showing your victim receiving the wrong website when they attempt to navigate to bing.com.
2.A screenshot of where in the packet capture the DNS hijacking is taking place.
Attachment:- TaskSheet.rar