Reference no: EM133776503
Cyber Defence
Part 1: Crafting Packets using Scapy Library
Task 01: networking basics command
• Use Ifconfig to obtain the following info.
o Kali Linux IP address___________________
o Kali default gateway __________________
o Kali MAC address______________________
o Metasploitable IP address________________
o Metasploitable default gateway____________
o Metasploitable MAC address _________________
• Display the arp tables for Kali and Metasploitable
Kali ARP table screenshot
Metasploitable ARP table screenshot
Task 02: Scapy using install and basics
Scapy is a Python library to build, and craft packets a packet. It is platform independent. To download and install the library follow the instruction in the link below
you can start Scapy from the command line or terminal as shown below
Create your first packet as shown bel in the screenshot
Where dst is the IP address of Metasploitable VM
Use the method ls(p) to answer the questions below
Sending the packet, after we create the packet p we will send it using method srp as shown below
Where iface represent the used interface (could be acquired from ifconfig command)
Note: you may have a permission error, in that case you need to start Scapy using Sudo
Now use the show method to answer the questions below
What is the type of ICMP message sent________________?
Now we use using Scapy to launch a simple spoofing attack on Metasplotable VM
To validate the attack take we need to conduct arp -a command on Metasploitable Vms as shown below
The table shows the IPs, and MAC addresses for the devices contacted by the targeted VM
The crafted packet below could be used to spoof the IP of the sender and poison the ARP table.
If the psrc is equal to the gateway IP, this means all the communications from the target to the gateway would be sent to the attacker's MAC
That could be shown in the updated arp table as shown below.
Task 02- Spoofing
• Create and send ICMP packet from the Kali machine to Metasploitable , using the following parameters
o IP src= "default gatway", you can get it using Ifconfig
o IP dst="Metasploitable IP"
• Write down the Scapy command to create the packet
• Write down the command to send the packet
• Use show() to display the results if exist
• Explain the results above
Answer the following questions
Question 1. Discuss how terrorist groups like ISIS used cyberspace in their operations?
Question 2. How Russia-affiliated groups used social media to intervene in the US 2016 election?
Question 3. What are the possible mitigations for misinformation on social media?
Question 4. How Russia used Cyberwarfare in the current conflict with Ukraine? And how have Ukraine and its allies responded to that?