You are given the following network topology in the figure:
The network is configured as follows:
? Hosts A and B are located on a subnet with IP addresses 148.45.170.30/25 and 148.45.170.59/25.
? Host C is located on a subnet with IP Address 148.45.170.145/25.
? R is the gateway router and is located on a subnet 148.45.170.129/25.
? Hosts D and E are on separate networks managed by different ISPs.
Assumptions for this problem are as follows:
? There are no firewalls installed.
? An update TCP implementation has been installed in the hosts.
? A “successful” attack requires that the attack will work without requiring more than a half dozen packets.
For each of the following attacks, mark with an X every host that can successfully carry out that attack against each specified victim.
? An attacker has the ability to successfully spoof DHCP packets directed at the victim, such that the victim will accept the DHCP service as genuine. Identify and explain which hosts will be affected?
? Attacker can successfully spoof the IP source address of traffic sent to the victim to appear as though it comes from E?
question from:
https://stackoverflow.com/questions/65919830/an-attacker-has-the-ability-to-successfully-spoof-dhcp-packets-directed-at-the-v 与恶龙缠斗过久,自身亦成为恶龙;凝视深渊过久,深渊将回以凝视…