Need a explanation answer

Description

How to broadcast a message on the Internet? Two questions need to be answered: What address should be used as the broadcast address. How to send data to the broadcast address? A broadcast address is the subnet’s network number with all onebits set for the host portion of the address. For instance, if a network IP address is 192.168.1.0, and the netmask is 255.255.255.0, the last byte of the address is the host number (because the first three bytes, according to the netmask, correspond to the network number). So the broadcast address is 192.168.1.255. Under Unix, the ifconfig command will actually give you all this information.Determine the broadcast address of your local machine; (5 point)(My PC ip address data IPv4 Address. . . . . . . . . . . : 10.0.0.51 Subnet Mask . . . . . . . . . . . : 255.255.255.0 Default Gateway . . . . . . . . . : fe80::d66c:6dff:fe99:fb75%16 10.0.0.1)b. Send a broadcast packet to your broadcast address. Write a code to implement this task.(15 point)NOT: The assgnment qustions requires the followingSearch the internet for resources about IP address, Subnet mask and Internet protocol. Then explain your understanding.From your search and understanding answer a, and b to the best of your knowledgeReference your answer from your internet resources.Make sure you Do not Use Wikipedia it’s not an Academic Resource.

Don't use plagiarized sources. Get Your Custom Assignment on
Need a explanation answer
From as Little as $13/Page

Unformatted Attachment Preview

Identifying and Exploiting Vulnerabilities (3e)
Managing Risk in Information Systems, Third Edition – Lab 01
Student:
Email:
Prashanthi Akuthota
[email protected]
Time on Task:
Progress:
4 hours, 44 minutes
100%
Report Generated: Saturday, March 2, 2024 at 12:44 PM
Guided Exercises
Part 1: Identify the Version and Build of a Windows System
3. Make a screen capture showing the About Windows dialog box and the Windows version
number.
Part 2: Research and Identify Vulnerabilities and Exploits
Page 1 of 7
Identifying and Exploiting Vulnerabilities (3e)
Managing Risk in Information Systems, Third Edition – Lab 01
13. Make a screen capture showing the NVD page for CVE-2017-0143, including the Base
Score.
21. Make a screen capture showing the MS17-010
EternalRomance/EternalSynergy/EternalChampion SMB Remote Windows Code
Execution module in the Rapid7 Vulnerability and Exploit Database.
Part 3: Use the Metasploit Framework to Exploit a Vulnerability
Page 2 of 7
Identifying and Exploiting Vulnerabilities (3e)
Managing Risk in Information Systems, Third Edition – Lab 01
14. Make a screen capture showing the current user on the TargetWindows01 server.
18. Make a screen capture showing the TargetWindows01 Desktop and the
yourname_was_here folder.
Part 4: Retrieve Sensitive Files
Page 3 of 7
Identifying and Exploiting Vulnerabilities (3e)
Managing Risk in Information Systems, Third Edition – Lab 01
6. Make a screen capture showing the contents of the password.txt file.
Page 4 of 7
Identifying and Exploiting Vulnerabilities (3e)
Managing Risk in Information Systems, Third Edition – Lab 01
12. Make a screen capture showing the contents of the file containing sensitive information.
Page 5 of 7
Identifying and Exploiting Vulnerabilities (3e)
Managing Risk in Information Systems, Third Edition – Lab 01
Challenge Exercises
Part 1: Use FTP to Extract Sensitive Information
Make a screen capture showing the contents of the file containing sensitive information.
Part 2: Identify Root Causes
What are some root causes of storing personal information in clear text files?
Lack of Awareness on (Encryption) Encrypting data.Unauthorized access due to vulnerabilities may
lead to data theft.
What are some root causes of using an FTP service on the internal network?
Using FTP is simple and easy so many companies having(limited resources) use FTP even though
they are not secure but they are not aware of new technologies like SFTP(lack of awareness).
Page 6 of 7
Powered by TCPDF (www.tcpdf.org)
Identifying and Exploiting Vulnerabilities (3e)
Managing Risk in Information Systems, Third Edition – Lab 01
What are some root causes of having anonymous login enabled on FTP service?
Anonymous login can lead to data theft of sensitive data/information. anonymous login leads to
injection of malware in files that will be transferred using FTP to others, by this the attackers can gain
access to others for whom that file is shared.
Page 7 of 7

Purchase answer to see full
attachment