TCP Server – Analysis of Protocols with Wireshark – Engineering Assignment Help

Responsive Centered Red Button

Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.

Assignment Task :

Question 1. Analysis of Protocols with Wireshark 

For this question you must use virtnet (as used in the workshops) to study Internet applications with Wireshark. This assumes you have already setup and are familiar with virtnet. See Moodle and workshop instructions for information on setting up and using virtnet, deploying the website, and performing the attack.

Your task is to:

Create topology 5 in virtnet where:

node1 will be referred to as the client

node2 will be the router

node3 will be the server

Start capturing packets using tcpdump on the router (node2)

While capturing, perform the following operations in order:

1. Start netcat TCP server using assigned port on the server (node3)

2. Start netcat TCP client on the client (node1)

3. On the client (node1) type:

 

Question 2. Web Application Attacks [12 marks]

Use virtnet, perform an SQL injection attack on the demo grading website www.myuni.edu. The general steps for performing an SQL injection attack with virtnet are described at:

 

However you must follow these specific steps when performing the attack:

1. Before performing the attack, add two new student users to the database with the following details:

a. New student 1: username is your ID, password is your ID

b. New student 2: username is 12037777, password is hacker

2. For both of the new students add the following courses and grades:

a. New student 1: coit20262, D

b. New student 1: coit20263, C

c. New student 2: coit20262, HD

d. New student 2: coit20263, F

3. Perform the SQL injection attack as new student 2, i.e. logged in as 12037777

4. Take a screenshot of the attacker web browser showing the form the attacker uses to perform the attack. Make sure the screenshot clearly shows the fields/data entered by the attacker. Save the screenshot as screenshot-attack.png.

5. Take a screenshot of the attacker web browser showing a successful attack, i.e. the grades of other students.  

 

This Engineering Assignment has been solved by our Engineering Experts at TVAssignmentHelp. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.

Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

How to create Testimonial Carousel using Bootstrap5

Clients' Reviews about Our Services