How attack can be foiled by checking source port numbers

Assignment Help Computer Network Security
Reference no: EM132325281

Assignment -

Answer the following questions based on the packet-filtering rules below. These rules are intended to allow only HTTP (using server port number 80) services between the internal and external machines.

Topic 1. Explain how an external attacker (using port number 7000) can have access to an internal machine (using port number 8000) based on the above rules. **Hint: The attacker needs only a couple of rules that allow his outgoing and incoming packets.

Service Direction

Packet Direction

Source Address

Dest. Address

protocol

Dest. Port

Action

Inbound

Incoming

External

Internal

TCP

80

Permit (Rule A)

Outgoing

Internal

External

TCP

> 1023

Permit (Rule B)

Outbound

Outgoing

Internal

External

TCP

80

Permit (Rule C)

Incoming

External

Internal

TCP

> 1023

Permit (Rule D)

Topic 2. Explain how the attack (described in Topic 1) can be foiled by checking the source port numbers. Please describe the enforced rule(s).

Topic 3. Explain how an external attacker (using port number 80) can have access to an internal machine (using port number 8000) based on the above rules (described in Topic 2). Hint: The attacker has control over his machine, including the port number change.

Topic 4. Explain how the above attack (described in Topic 3) can be foiled by checking the connection initiator. Please describe the enforced rule(s).

Deliverables: Your answers for the topics above with clear and sufficient description (up to 100 words for each topic). Need assistance with packet-filtering rules.

Verified Expert

In this assignment we have shown that how an external attacker (using port number 7000) can have access to an internal machine (using port number 8000) based on the above rules. and the The attacker needs only a couple of rules that allow his outgoing and incoming packets and trace them.

Reference no: EM132325281

Questions Cloud

Ability to forecast the upcoming needs is important : The ability to forecast the upcoming needs is important - but probably the most important, yet often overlooked need is that of cash.
Describe the methods and tools in selected structure : For this assignment, you will present organizational structure recommendations for your employer or for a different organization with which you are familiar.
Explain vertical marketing systems : Based on your own research (i.e., Google search) explain (a) Vertical Marketing Systems; and (b) Horizontal Marketing Systems
Did you compare the relevant costs and benefits : People may make bad decisions because they fail to compare the relevant costs and benefits. Do you agree? Provide an example of when you made a bad decision.
How attack can be foiled by checking source port numbers : Explain how the attack (described in Topic 1) can be foiled by checking the source port numbers. Please describe the enforced rule(s)
Writing a critical evaluation of your learning outcome : Write a critical evaluation of your learning outcome. In your response, consider: Consider the content of this class as they relate to information management.
Pet sales and pet supplies outlet and to hire quimby-ruth : Carla plans to open Carla's Pets Store, a pet sales and pet supplies outlet, and to hire Quimby and Ruth. Carla will invest only her own money.
Sole motivation of a company : In the following statement "...the sole purpose of a business is to make a profit"
Explain what employment contracts is in australia : Employment Contracts in Australia and With Headings and sub-Headings and Graphs Related to the topic - No Use of Table of content and no Use of executive

Reviews

inf2325281

8/10/2019 1:33:13 AM

No doubt writer have good subject knowledge which can be seen in his work. Properly formatted work followed all steps properly. Great Thanks to team.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd