Question

In: Computer Science

Activity 1 – Using Netcat to Run Commands on Another Box Fire up a virtual box...

Activity 1 – Using Netcat to Run Commands on Another Box

  1. Fire up a virtual box guest OS. Install netcat if necessary (or if in Windows, check out netcat for windows or ncat from the maker of nmap). Start netcat in listener mode tying it to a command shell (see CHR chapter 8). Some versions of netcat can’t run commands, in which case you might need to install netcat-traditional
  2. From another box (your host machine or another VM), initiate a netcat connection to you’re the box you set up in Step 1.
  3. You should now have command prompt access (i.e. shell access). Type in a few commands (e.g. “dir” in Windows or “ls” in Linux) and document that what you type in one box affects the other box (i.e. that those commands are executed on the other box).
  4. Take a screenshot of BOTH windows side-by-side or ask Dr. V to validate your setup.

Activity 2 – Intro to Putty SSH

  1. Use instructions on next page to activate your Krypton account & set a new password.
  2. Log in (in Putty or SSH client) on the Krypton (Unix) system.
  3. Use Putty to create an encrypted tunnel (MAC users, use command-line SSH client) to mnsu.edu using source port 5555.
  4. Edit your connection in your internet browser so that when you connect to 127.0.0.1:5555 you are sent to mnsu.edu through the tunnel.
  5. Start Wireshark and sniff the packets that belong to your machine.
  6. Open the newly configured browser and go to 127.0.0.1.
  7. Document (i.e. PROVE) with Wireshark that the traffic is NOT being sent in plaintext directly to mnsu.edu but is instead being sent via the encrypted tunnel.

Note: you may still see some plaintext traffic (between your browser & your SSH client), but you should not be able to see any plaintext traffic going directly to mnsu.edu.

(hint: look for (i.e. filter) traffic going to the IP address of the mnsu.edu webserver)

      7.   Take appropriate screenshots to support your argument or have Dr. V verify it.

Solutions

Expert Solution

Answer 1
***********

Answer 2
************

do not have krypton account with me but with ssh connection the connection between that source and destination communication will be encrypted.

if you have any doubt then please ask me without any hesitation in the comment section below , if you like my answer then please thumbs up for the answer , before giving thumbs down please discuss the question it may possible that we may understand the question different way and we can edit and change the answers if you argue, thanks :)


Related Solutions

Using your Virtual machine, do the following tasks. Put the commands you executed in this document....
Using your Virtual machine, do the following tasks. Put the commands you executed in this document. PART1:             You will be required to add 3 users to your system. For the sake of simplicity, use the following information for your user accounts: USER1 Full Name / Comment: George Jetson Username: jetsong Password: jetsong USER2             Full Name / Comment: Fred Flintstone             Username: flintstonef             Password: flintstonef USER3             Full Name / Comment: Johnny Bravo             Username: bravoj             Password:...
We decide to speed up the virtual memory system of question 1 by using a translation...
We decide to speed up the virtual memory system of question 1 by using a translation lookaside buffer (TLB). Suppose your memory system has the characteristics shown in the following table. The TLB and cache miss rates indicate how often the requested entry is not found. The main memory miss rate indicates how often page faults occur.                                                                            Memory Characteristics Memory Unit Access Time (Cycles) Miss Rate TLB 1 0.05% Cache 1 2% Main memory 100 0.0003% Hard drive...
Problem 1 A box A contains 5 white and 4 black balls; another box B contains...
Problem 1 A box A contains 5 white and 4 black balls; another box B contains 3 white balls and 5 black ones. 3 balls are transferred from box A to box B and one ball is taken from box B. What is the probability that it is white?
An activity-based costing system is generally easier to set up and run than a traditional cost...
An activity-based costing system is generally easier to set up and run than a traditional cost system. True False
1. The "business cycle" refers to short-run fluctuations in macroeconomic activity. a long-run increase in GDP....
1. The "business cycle" refers to short-run fluctuations in macroeconomic activity. a long-run increase in GDP. changes in the economy between winter and summer. 2. Which of these would be counted as part of official GDP measures? earnings made by Uber and Lyft drivers casual jobs that are paid in cash "under the table" measures of happiness among a country's citizens the damage to an environment measured in terms of deforestation 3.The U.S. gross domestic product is equal to the...
After you run the Regression, answer these questions (type responses in this box): 1. What is...
After you run the Regression, answer these questions (type responses in this box): 1. What is the p-value (the significance)? 2. Is the relationship between Hours in Therapy and Depression Inventory Score statistically significant? 3. Do Depressions Scores increase or decrease as a result of having more Hours in Therapy? REGRESSION Hours in Therapy Depression Inventory Score 9 20 9 28 9 20 9 26 11 19 11 15 13 12 13 11 15 10 15 11 16 10 16...
QUESTION 1 User can interact with a PC using a command-line interface by issuing commands to...
QUESTION 1 User can interact with a PC using a command-line interface by issuing commands to the program in the form of successive lines of text. True False 1 points    QUESTION 2 A machine code (object code) is generated by an executor for process. True False 1 points    QUESTION 3 In case of all the resources are being used, the new process with a low priority might not get its resource forever. True False 1 points    QUESTION...
Question 1 A 242 g box slides up a 16.1° ramp at a speed of 4.05...
Question 1 A 242 g box slides up a 16.1° ramp at a speed of 4.05 m/s. Using conservation of energy and assuming the ramp is frictionless, how far along the ramp does the box slide before stopping? 0.745 m 3.02 m 29.6 m 0.871 m Question 2 A 10800 kg jet is preparing to land on a military aircraft carrier. In order to do so, the pilot manoeuvres the jet's tail to hook and snag a cable that is...
1. Using git commands and terminology, briefly explain how changes to files go from a working...
1. Using git commands and terminology, briefly explain how changes to files go from a working directory to a remote repository and from remote repository to the working directory. Answers that properly use git commands to explain how changes to files go from the working directory to the remote repository and vice versa. 2. In your own words, briefly explain the different git "places"
USING R STUDIO- Write the r commands for the following. 1. Non-Linear Models 1.1 Load the...
USING R STUDIO- Write the r commands for the following. 1. Non-Linear Models 1.1 Load the {ISLR} and {GGally} libraries. Load and attach the College{ISLR} data set. [For you only]: Open the College data set and its help file and familiarize yourself with the data set and its fields. 1.2 Inspect the data with the ggpairs(){GGally} function, but do not run the ggpairs plots on all variables because it will take a very long time. Only include these variables in...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT