What ip address or addresses did the attacker use

Assignment Help Computer Networking
Reference no: EM131291783

Network Forensic

You are notified of a phishing email attempting to lure victims to a fictitious Federal Bank Online website. The Federal Bank Online is a division of Bank of Atlas which provides financial services to members of the U.S. federal government. The phishing email contains a link to a website purporting to be run by the Federal Bank Online. Bank of Atlas has confirmed that the site, hosted at IP address 12.184.79.86, is not an authorized site (all IP addresses and site names in this scenario are fictitious and do not represent any actual persons or organizations).

You contact the owner of the web server using IP address 12.184.79.86. The administrator states that he was unaware of the Federal Bank Online site being on his server and provides the following logs from the server. Analyze the logs and determine the following, citing specific log entries to support all of your answers:

1. How did the attacker gain access to the system? Provide as much detail as possible about the attack, the tool used, etc.

2. What IP address or addresses did the attacker use?

3. How did the attacker create the fictitious Federal Bank Online site on the server?

4. Was the attacker successful at his first attempt at creating the fictitious Federal Bank ?Online site?

5. Did the attacker create any other fictitious sites on the server?

6. Can you provide any other information about the attack that you feel is relevant?

Reference no: EM131291783

Questions Cloud

Would organizations have tried to drive ethical behavior : Think about the impact of the U.S. Sentencing Guidelines. Would organizations have tried to drive ethical behavior among employees without government encouragement?
Analyze the ethical culture at tap : Analyze the ethical culture at TAP. Does the culture appear to be in alignment? Misalignment?- Why did his culture change effort fail? What would it take for it to succeed?
What extent do mental disorders such as adhd : what extent do mental disorders such as Attention Deficit Hyperactivity Disorder (ADHD) and Post-Traumatic Stress Disorder (PTSD) affect learning among school going, children?How does such school going children behave when learning, especially, in ..
What types of physical security measures are in place why : What types of physical security measures are in place? Why? What specific tools or hardware are used for physical security? Why? How effective is the process to administer physical security?
What ip address or addresses did the attacker use : What IP address or addresses did the attacker use? How did the attacker create the fictitious Federal Bank Online site on the server? Was the attacker successful at his first attempt at creating the fictitious Federal Bank ?Online site?
How cloud technology could align with the companys business : Create a workflow diagram to illustrate how analytics and cloud technology could align with the company's business processes. Note: The graphically depicted solution is not included in the required page length.
What is the maximum rate of change of the elevation : If you are at the point (60,100) in what direction is the elevation changing fastest? What is the maximum rate of change of the elevation at this point?
Active directory replication topology for your company : How do you choose the appropriate Active Directory replication topology for your company? What kinds of problems do you want to prevent? Give examples. Please explain in approximately in two paragraphs.
Discuss about the diversity issues in career counseling : Discuss about the Diversity Issues in Career Counseling.A discussion of each of the following and discuss why is it important that all forensic psychologists need to be well-versed in them:Specific Amendments to the U.S. Constitution and why they ar..

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd