Reference no: EM131299433
Network Forensic
You are notified of a phishing email attempting to lure victims to a fictitious Federal Bank Online website. The Federal Bank Online is a division of Bank of Atlas which provides financial services to members of the U.S. federal government. The phishing email contains a link to a website purporting to be run by the Federal Bank Online. Bank of Atlas has confirmed that the site, hosted at IP address 12.184.79.86, is not an authorized site (all IP addresses and site names in this scenario are fictitious and do not represent any actual persons or organizations).
You contact the owner of the web server using IP address 12.184.79.86. The administrator states that he was unaware of the Federal Bank Online site being on his server and provides the following logs from the server. Analyze the logs and determine the following, citing specific log entries to support all of your answers:
1. How did the attacker gain access to the system? Provide as much detail as possible about the attack, the tool used, etc.
2. What IP address or addresses did the attacker use?
3. How did the attacker create the fictitious Federal Bank Online site on the server?
4. Was the attacker successful at his first attempt at creating the fictitious Federal Bank ?Online site?
5. Did the attacker create any other fictitious sites on the server?
6. Can you provide any other information about the attack that you feel is relevant?
Write a recursive method writeblock
: Write a recursive method writeBlock (char, int, int) that uses the recursive method writeLine (char, int) to write m lines of n characters each. For example, writeBlock (‘ *' , 5, 6) produces the following output:
|
Aligning education outcome with market needs
: Prepare a seminar presentation on the use of qualitative approaches in their research area - What qualitative approaches would work in their area and What are the strengths of these approaches?
|
Write a pseudocode for deleting a node from a bst
: Write a pseudocode for deleting a node from a BST. Simulate your algorithm with a BST of 10 nodes and show the deletion process. Especially show the deletion of the interior nodes and not just leaf nodes.
|
Design a welding jig
: MFG 343 Manufacturing Tool Design Project. For the part show in the following drawing you are to design a welding jig sufficient to locate and clamp the part for the necessary welding operations
|
How did the attacker gain access to the system
: How did the attacker gain access to the system? Provide as much detail as possible about the attack, the tool used, etc. What IP address or addresses did the attacker use?
|
What are strategies behind implementing cloud computing
: What are some of the major strategies and risks behind implementing cloud computing programs in today's technology filled world?
|
Create an analogy or metaphor
: Create an analogy or metaphor that explains how banks create and destroy money-one that would be understood by someone with absolutely no background in economics.
|
Rename and organize the worksheets within the workbook
: Worksheet & Workbook Management- Rename and organize the worksheets within the workbook and re-save the workbook itself by following the instructions below: Access and open 1010excel.xlsx.
|
What role do banks play in process
: Explain how the Fed can increase the money supply by engaging in open-market operations. What role do banks play in this process?
|