Welcome to OStack Knowledge Sharing Community for programmer and developer-Open, Learning and Share
Welcome To Ask or Share your Answers For Others

Categories

0 votes
226 views
in Technique[技术] by (71.8m points)

networking - An attacker has the ability to successfully spoof DHCP packets directed at the victim

You are given the following network topology in the figure: The network is configured as follows: ? Hosts A and B are located on a subnet with IP addresses 148.45.170.30/25 and 148.45.170.59/25. ? Host C is located on a subnet with IP Address 148.45.170.145/25. ? R is the gateway router and is located on a subnet 148.45.170.129/25. ? Hosts D and E are on separate networks managed by different ISPs. Assumptions for this problem are as follows: ? There are no firewalls installed. ? An update TCP implementation has been installed in the hosts. ? A “successful” attack requires that the attack will work without requiring more than a half dozen packets.

For each of the following attacks, mark with an X every host that can successfully carry out that attack against each specified victim. ? An attacker has the ability to successfully spoof DHCP packets directed at the victim, such that the victim will accept the DHCP service as genuine. Identify and explain which hosts will be affected? ? Attacker can successfully spoof the IP source address of traffic sent to the victim to appear as though it comes from E?

enter image description here

question from:https://stackoverflow.com/questions/65919830/an-attacker-has-the-ability-to-successfully-spoof-dhcp-packets-directed-at-the-v

与恶龙缠斗过久,自身亦成为恶龙;凝视深渊过久,深渊将回以凝视…
Welcome To Ask or Share your Answers For Others

1 Answer

0 votes
by (71.8m points)
Waitting for answers

与恶龙缠斗过久,自身亦成为恶龙;凝视深渊过久,深渊将回以凝视…
Welcome to OStack Knowledge Sharing Community for programmer and developer-Open, Learning and Share
Click Here to Ask a Question

2.1m questions

2.1m answers

60 comments

57.0k users

...