This document summarizes a networking course project completed by Joshua Brown. The project covered six areas of networking including using Linux distributions as virtual machines, creating subnets and VLANs, vulnerability assessment, password management, network performance monitoring, and IP routing. Each module demonstrated skills learned and answered questions to assess understanding. The project provided experience with networking tools and a foundation for a career in network engineering.
Question 1 Which of the following statements is true regarding Wir.docxJUST36
Question 1
Which of the following statements is true regarding Wireshark?
[removed]
Wireshark is probably the most widely used packet capture and analysis software in the world.
[removed]
The expense of Wireshark makes it cost-prohibitive for most organizations.
[removed]
Compared to similar commercial products, Wireshark has the most sophisticated diagnostic tools.
[removed]
Wireshark saves frame details in a format that is incompatible and unusable by other software tools.
5 points
Question 2
The main screen of Wireshark includes several shortcuts. Which shortcut category displays a list of the network interfaces, or machines, that Wireshark has identified, and from which packets can be captured and analyzed?
[removed]
Capture Help
[removed]
Capture
[removed]
Files
[removed]
Online
5 points
Question 3
Which of the following enables Wireshark to capture packets destined to any host on the same subnet or virtual LAN (VLAN)?
[removed]
Capture Help
[removed]
Host mode
[removed]
Subnet mode
[removed]
Promiscuous mode
5 points
Question 4
The top pane of the Wireshark window, referred to as the __________, contains all of the packets that Wireshark has captured, in time order, and provides a summary of the contents of the packet in a format close to English.
[removed]
byte summary
[removed]
byte data
[removed]
frame detail
[removed]
frame summary
5 points
Question 5
The middle pane of the Wireshark window, referred to as the __________, is used to display the packet structure and contents of fields within the packet.
[removed]
byte summary
[removed]
byte data
[removed]
frame detail
[removed]
frame summary
5 points
Question 6
The bottom pane of the Wireshark window, referred to as the __________, displays all of the information in the packet in hexadecimal and in decimalwhen possible.
[removed]
byte summary
[removed]
byte data
[removed]
frame detail
[removed]
frame summary
5 points
Question 7
Wireshark can be used in a variety of ways, however the most common configuration for Wireshark, and the configuration that you ran in the lab, has the software running:
[removed]
in a peer-to-peer configuration.
[removed]
from a probe or hub.
[removed]
on a local area network.
[removed]
on a local host.
5 points
Question 8
In the simplest terms, Wireshark is used to capture all packets:
[removed]
from a computer workstation to the Wireshark application window.
[removed]
to and from a computer workstation and the Wireshark application window.
[removed]
to and from a computer workstation and the server.
[removed]
to and from the Wireshark Network Analyzer and the Capture section of the Wireshark application window.
5 points
Question 9
Which of the following statements is true regarding how Wireshark works?
[removed]
Where packets are captured and how they are captured does not have any impact on how the packets are analyzed.
[removed]
By running the Wireshark software on the same computer that g ...
Question 1 Which of the following statements is true regarding Wir.docxJUST36
Question 1
Which of the following statements is true regarding Wireshark?
[removed]
Wireshark is probably the most widely used packet capture and analysis software in the world.
[removed]
The expense of Wireshark makes it cost-prohibitive for most organizations.
[removed]
Compared to similar commercial products, Wireshark has the most sophisticated diagnostic tools.
[removed]
Wireshark saves frame details in a format that is incompatible and unusable by other software tools.
5 points
Question 2
The main screen of Wireshark includes several shortcuts. Which shortcut category displays a list of the network interfaces, or machines, that Wireshark has identified, and from which packets can be captured and analyzed?
[removed]
Capture Help
[removed]
Capture
[removed]
Files
[removed]
Online
5 points
Question 3
Which of the following enables Wireshark to capture packets destined to any host on the same subnet or virtual LAN (VLAN)?
[removed]
Capture Help
[removed]
Host mode
[removed]
Subnet mode
[removed]
Promiscuous mode
5 points
Question 4
The top pane of the Wireshark window, referred to as the __________, contains all of the packets that Wireshark has captured, in time order, and provides a summary of the contents of the packet in a format close to English.
[removed]
byte summary
[removed]
byte data
[removed]
frame detail
[removed]
frame summary
5 points
Question 5
The middle pane of the Wireshark window, referred to as the __________, is used to display the packet structure and contents of fields within the packet.
[removed]
byte summary
[removed]
byte data
[removed]
frame detail
[removed]
frame summary
5 points
Question 6
The bottom pane of the Wireshark window, referred to as the __________, displays all of the information in the packet in hexadecimal and in decimalwhen possible.
[removed]
byte summary
[removed]
byte data
[removed]
frame detail
[removed]
frame summary
5 points
Question 7
Wireshark can be used in a variety of ways, however the most common configuration for Wireshark, and the configuration that you ran in the lab, has the software running:
[removed]
in a peer-to-peer configuration.
[removed]
from a probe or hub.
[removed]
on a local area network.
[removed]
on a local host.
5 points
Question 8
In the simplest terms, Wireshark is used to capture all packets:
[removed]
from a computer workstation to the Wireshark application window.
[removed]
to and from a computer workstation and the Wireshark application window.
[removed]
to and from a computer workstation and the server.
[removed]
to and from the Wireshark Network Analyzer and the Capture section of the Wireshark application window.
5 points
Question 9
Which of the following statements is true regarding how Wireshark works?
[removed]
Where packets are captured and how they are captured does not have any impact on how the packets are analyzed.
[removed]
By running the Wireshark software on the same computer that g ...
. (TCO 2) _____ is the layer in hierarchical network design that is concerned with switching packets as fast as possible.
2. (TCO 2) The point at which the customer turns over control to the WAN service provider refers to the _____.
3. (TCO 2) _____ is an industry-standard, switched data-link-layer protocol that handles multiple virtual circuits using HDLC encapsulation between connected devices
4. (TCO 6) Asymmetric encryption is utilized in VPNs to
Final ProjectFinal Project Details Description Given a spec.docxAKHIL969626
Final Project
Final Project Details:
Description: Given a specific scenario, create an appropriate IP addressing scheme, document a given network by creating a logical network diagram and create the appropriate access lists for use on the routers. Deliverables:
· Demonstrate the theory and practice of Cisco networking, routing, and switching strategies as outlined in the Cisco CCENT Certification exam
Prior to implementing any design we need to first write-up our proposed network design on paper. With that in mind, we begin by performing a network discovery. Once we have identified all the network devices and the needs of the organization, we can document the TCP/IP information that is needed for our design. In this exercise you will determine the subnet information for each department and assign IP addresses for the network devices.
You have been assigned as a networking tech for a new client, AAA Fabricating. The network is configured with a Class C network and the current allocation of IP addresses has been depleted. You have been tasked to reconfigure the network with a Class B address and assign a subnet to each of the 10 departments and the three routers.
Your network audit consists of the following information:
AAA Fabrication consists of 10 departments spread across three buildings.
Each building is connected using three Cisco 2800 Series routers. The three routers are located in the MIS wiring closet in Building 2.
Each department has its own Cisco 2950 switch.
There are at least two workstations in each department.
The company plans to use a class B address range starting at 172.16.0.0.
Each department must be assigned a subnet. Subnets should be designed to allow for the maximum number of hosts on each department subnet using classful subnetting.
The company also wants the three routers to communicate on the minimum quantity of IP addresses using three subnets.
Building 1
Subnet
Department
Subnet ID
Host ID Range
Broadcast Address
0
Warehouse
1
Receiving
2
shipping
3
Maintenance
Building 2
Subnet
Department
Subnet ID
Host ID Range
Broadcast Address
4
Accounting
5
Human Resources
6
Payroll
7
MIS
8
Employee Training
Building 3
Subnet
Department
Subnet ID
Host ID Range
Broadcast Address
9
R&D
10
Marketing
Routers
Building 1
Ethernet and Serial Interfaces
IP Address
Subnet Mask
Router
Fast Ethernet 0/0
Building 1
Serial 0/0
To Building 2
Serial 0/1
To Building 3
Building 2
Ethernet and Serial Interfaces
IP Address
Subnet Mask
Router
Fast Ethernet 0/0
Building 2
Serial 0/0
To Building 1
Serial 0/1
To building 3
Building 3
Ethernet and Serial Interfaces
IP Address
Subnet Mask
Router
Fast Ethernet 0/0
Building 3
Serial 0/0
To Building 1
Serial 0/1
To Building 2
Part 2
Create a logical Network Diagram
Logical Network topology represents a high level overview of the signal topology of the network. Every LAN has two different topologies, or the way that the devices on a networ ...
1. (TCO A) A ___ defines the format and the order of messages exchanged between 2 or more communicating entities.
2. (TCO A) While the job of the link layer is to move entire frames from one network element to another, The job of the physical layer is to do what?
3. (TCO A) Which of the following is not true about ISO:
4. (TCO A) What are the two fundamental approaches to moving data through a network of links and
Mis 589 Massive Success / snaptutorial.comStephenson185
. (TCO A) A ___ defines the format and the order of messages exchanged between 2 or more communicating entities.
2. (TCO A) While the job of the link layer is to move entire frames from one network element to another, The job of the physical layer is to do what?
3. (TCO A) Which of the following is not true about ISO:
4. (TCO A) What are the two fundamental approaches to moving data through a network of links and switches?
5. (TCO A) The IP protocol works at which layer of the OSI model?
This document provides a complete report on a penetration test using Kali Linux with a vulnerable machine available on Vulnhub.com. The Game of Thrones CTF: 1 (Capture The Flag) contains 11 flags in total (7 kingdom flags, 3 secret flags and one battle flag). The first chapter introduces a short description about cyber-risks and general IT security nowadays. The second chapter contains the setting for the laboratory in Oracle Virtual Box software to virtualize the attacker machine and the target machine. Furthermore, the subchapters are about the attack narrative, each one according to a specific
step-by-step location. Please notice that this walkthrough might contain spoilers to the actual TV series.
Ultimately, a comment about the vulnerabilities found in this challenge, some recommendations and the major consulted resources and used tools.
20 questions , multiple choiceQuestion 11.Which of the fol.docxvickeryr87
20 questions , multiple choice
Question 1
1.
Which of the following statements is true?
[removed]
The Wireshark protocol analyzer has limited capabilities and is not considered multi-faceted.
[removed]
Wireshark is used to find anomalies in network traffic as well as to troubleshoot application performance issues.
[removed]
Both Wireshark and NetWitness Investigator are expensive tools that are cost-prohibitive for most organizations.
[removed]
NetWitness Investigator is available at no charge while Wireshark is a commercial product.
5 points
Question 2
1.
Wireshark capture files, like the DemoCapturepcap file found in this lab, have a __________ extension, which stands for packet capture, next generation.
[removed]
.packcng
[removed]
.paccapnextg
[removed]
.pcnextgen
[removed]
.pcapng
5 points
Question 3
1.
The Wireless Toolbar (View > Wireless Toolbar) is used only:
[removed]
when using a pre-captured file.
[removed]
when capturing live traffic.
[removed]
when reviewing wireless traffic.
[removed]
in a virtual lab environment.
5 points
Question 4
1.
In the frame detail pane, which of the following was a field unique to wireless traffic, confirming that it is a wireless packet?
[removed]
The Encapsulation type: Per-Packet Information header
[removed]
The Arrival time: May 11, 2007 15:30:37 041165000 Pacific Daylight Time
[removed]
The Capture Length: 181 bytes
[removed]
The Epoch Time: 1178922637.041165000 seconds
5 points
Question 5
1.
Which of the following tools provides information about the antennae signal strengths, noise ratios, and other antennae information during a captured transmission?
[removed]
Windows Explorer
[removed]
DemoCapture
[removed]
Wireshark
[removed]
NetWitness
5 points
Question 6
1.
Which of the following can be used to map who is able to communicate with whom, the measured strength of signals, and what frequencies are used, as well as be used for jamming certain frequencies and for determining which devices were likely used to set off remote bombs and Improvised Explosive Devices (IEDs)?
[removed]
MAC+PHY (MAC and Physical Layer)
[removed]
IEEE Layer
[removed]
Flags fields
[removed]
Quality of Service information
5 points
Question 7
1.
In the IEEE 802.11 Quality of Service information and Flags fields, Wireshark displays information about the __________, which enables the network administrator to determine which Media Access Control (MAC) addresses match each of them.
[removed]
antennae and signal strength
[removed]
transmitters and receivers of the data
[removed]
payload and frame information
[removed]
Domain System and Internet Protocol version
5 points
Question 8
1.
In the lab, Wireshark displayed the transmitter/receiver address in both full hexadecimal (00:14:a5:cd:74:7b) and a kind of shorthand, which was:
[removed]
IEEE 802.11.
[removed]
GemtekTe_IEEE.
[removed]
GemtekTe_00:14:a5.
[removed]
GemtekTe_cd:74:7b.
5 points
Question 9
1.
Matching th.
3.7.10 Lab Use Wireshark to View Network TrafficRio Ap
Skenario soal latihan lengkap Lab 3.7.10 dari materi Cisco CCNA 1 v7. Untuk mengetahui kegunaan wireshark dalam mengcapture dan menganalisa traffic jaringan. Di skenario ini menggunakan protocol ICMP yang dipakai pada saat melakukan perintah Ping dari command line interface windows 10.
NetBrain Consultant Edition (CE) is designed to make a Consultant’s job easier by providing instant network discovery, document automation, and visual troubleshooting. NetBrain enables consultants to:
1. Carry out deep discovery of the customer network
2. Automate documentation for network assessments
3. Analyze network design visually
4. Automatically troubleshoot and collect data without custom scripts
In short, NetBrain’s visual workbench allows consultants to complete network assessment tasks much faster and with much more accuracy.
01-01-2017 This section will lay out the implementation plan o.docxhoney725342
01-01-2017
This section will lay out the implementation plan of the entire Authentic Assessment Project (AAP) design, which include configuration of key networking devices, detailing milestones, activities, resources, and budgets, as well as providing a deliverables schedule.
Project Implementation Plan
In this lecture I will discuss implementation plan through an example of an enterprise network.
The figure presents a fictitious enterprise factious network. The company would like to implement a scalable solution with a routing protocol that provides fast convergence. For optimal routing and packet forwarding, hierarchical addressing with summarization is required. Users require high-speed access to the server farm with redundant connectivity for protection. The company has many remote offices; a redundant connection to the Internet is required to provide the remote offices with nonstop access to its server farm. For remote offices, a secure connection must be implemented to prevent unauthorized persons from accessing data.
The first step before creating an implementation plan is to gather existing information about the networks and all the requirements.
The existing topology provides redundant connectivity among all the network devices. Internet connectivity is dual homed, which provides redundant access to the remote sites as well as World Wide Web resources. The equipment can provide all the functionalities that are required, but the software version of the operation system must be upgraded.
The networking equipment has existing IP addressing that needs to be changed to ensure optimal routing and forwarding of packets as well as summarization. Requirements for server farm access and remote office connectivity do not include changes in QoS configuration. The server farm hosts the critical applications of the company including VoIP, and these require preferred treatment. OSPF is configured in the network. This configuration must be changed, because a faster convergence time is required. EIGRP is better choice than OSPF.
Security configuration is required to provide secure access to terminal resources. In this case existing security is sufficient, therefor no changes are needed.
For this scenario implementation plan would be
· Project contact list
· Location information and means of accessing the premises
· Tools and resources
· Assumption
· Task and detailed description
· Network staging plan
Project Contact List
Consultant Project Team
Customer Project Team
Project Manager
Telephone
E-Mail
Project Manager
Telephone
E-Mail
Configuration Engineer
Telephone
E-mail
Configuration Engineer
Telephone
E-mail
Project Coordinator
Telephone
E-mail
Project Coordinator
Telephone
E-mail
Equipment installation Plan
Location
Details
Floor
Room
Rack Number
Tools Required
Item Number
Item
1
PC with a VT 100 emulator, 10Base-T interface, FTP Server, TFTP client application
2
Console port cable DB9-RJ45/DB25
3
10Base-T Ethernet cable
The implementa ...
A presentation on how applying Cloud Architecture Patterns using Docker Swarm as orchestrator is possible to create reliable, resilient and scalable FIWARE platforms.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Macroeconomics- Movie Location
This will be used as part of your Personal Professional Portfolio once graded.
Objective:
Prepare a presentation or a paper using research, basic comparative analysis, data organization and application of economic information. You will make an informed assessment of an economic climate outside of the United States to accomplish an entertainment industry objective.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2. COURSE PROJECT
OVERVIEW
This course project covered six fundamental areas of networking including:
• The use of different Linux Distributions such as Ubuntu and Kali as Virtual Machines
• Creating subnets and VLANS
• Vulnerability Assessment
• Password Management
• Network Performance Monitoring
• IP Routing
3. MODULE 1
• The next six slides demonstrate the importation and use of
multiple Linux distributions running off of the same host.
• The first two slides show the two different distributions and
show that they are both installed.
• The next three are ping tests showing that the virtual
machines are connected to each other through the host.
• The final slide of the six are the questions posed in the
project.
4. A screenshot of
the VMware
Player
environment
before you import
the Kali VM.
VMware
Player
Environment
Prior to Kali
Import
5. A screenshot of
the VMware
Player
environment with
both the Ubuntu
and Kali VMs.
VMware
Player
Environment
with Ubuntu
and Kali VMs
6. A screenshot of
the Ubuntu
Terminal with
correct IPv4
assignment from
the Travel Router.
Correct IPv4
Assignment
in Ubuntu
VM
7. A screenshot of
the Kali Terminal
with correct IPv4
assignment from
the Travel Router.
Correct IPv4
Assignment
in Kali VM
8. A screenshot of
the Ubuntu
Terminal sending
an ICMP message
(PING) to the Kali
VM.
Successful
ICMP Ping
between Kali
and Ubuntu
VMs
9. How did you know that the two VMs can communicate with
each other?
Because both VM’s are hosted on the same hypervisor. Each
with a unique IP address.
What was the purpose of bridging the Kali Linux Network
Adapter?
To give each VM a unique IP address.
Complete and
correct answers to
the two questions
in the module.
Answers to
the two
questions
10. MODULE 2
• The next five slides are about creating subnets and vlans.
• The first three slides demonstrate some of the subnets that can be created, given an IP address.
• The next slide demonstrates vlans on the school provided project router.
• The final slide answers questions posed in the project.
11. List of four /24
networks,
including network
address, first
usable address,
last usable
address, and
broadcast address.
Subnetting
Table from
Step 1
Reference Subnet ID Network Addr. First Usable Last Usable Broadcast Addr.
First 0 192.168.64.0 …1 …254 …255
Second 1 192.168.64.256 …257 …511 …512
Third 2 192.168.64.513 …514 …767 …768
Fourth 3 192.168.64.769 …770 …1023 …1024
12. List of four /26
networks,
including network
address, first
usable address,
last usable
address, and
broadcast address.
Subnetting
Table from
Step 2
Reference Subnet ID Network Addr. First Usable Last Usable Broadcast Addr.
First 0 192.168.64.0 …1 …62 …63
Second 1 192.168.64.64 …65 …126 …127
Third 2 192.168.64.128 …129 …190 …191
Fourth 3 192.168.64.192 …193 …254 …255
13. List of two /27
networks,
including network
address, first
usable address,
last usable
address, and
broadcast address.
Subnetting
Table from
Step 3 Reference Subnet ID Network Addr. First Usable Last Usable Broadcast Addr.
First 0 192.168.64.64 …65 …94 …95
Second 1 192.168.64.96 …97 …126 …127
15. QUESTION
What is the significance of the keyword tagged and untagged in the previous screen
capture? When would you use the tagged option on a Local Area Network (LAN)?
Answer here: a tagged port is used to indicate that this port passes data through to
multiple vlans on a hypervisor where an untagged port supplies traffic to a single vlan (the
host computer)
16. MODULE 3
• The next four slides are all about vulnerability assessment.
• The first three show a High, Medium, and Low threat as assessed by the Greenbone Security assistant.
• The final slide answers questions posed in the project.
17. The solution
would be to not
use this particular
distro as any real
world solution.
A Sample of
High Severity
Rating
18. I do not think
there is a way for
me to update the
ssl cert as this is
not my creation.
Please correct me
if I am wrong
though.
A Sample of
Medium
Severity
Rating
19. The solution
would be to
disable TCP
timestamps on the
distro.
A Sample of
Low Severity
Rating
20. Question 1: Explain each host identified by the NMAP result. Did NMAP
identify the operating system or type of device in use in the
network?
NMAP identified the host/guest name and the host/guest IP
address. It is possible to determine what operating system the
host/guest is using by the name of the host. This is of course by no
means guaranteed. NMAP did recognize the operating system that it
was running from as well as recognizing that the whole thing was
running on a hypervisor.
Question 2: What is the significance of ranking the vulnerabilities by
severity level?
So to assess which threats need to mitigated first.
Complete and
correct answers to
the two questions
in the module.
Answers to
the two
questions
21. MODULE 4
• The next four slides cover password management.
• The first slide shows the password hash file for the last five user accounts on this installation of Kali
Linux.
• The second shows a malicious program known as John the Ripper cracking the user password on the
distro.
• The third slide shows the distro auth.log folder which gives information about user accounts such as
when the last password change occurred.
• The final slide answers questions posed in the project.
22. A screenshot of
the /etc/shadow
file, including
password hashes
of the last five
user accounts.
Last five user
password
hashes
23. A screenshot of
the cracked user
passwords by
using John the
Ripper security
tool.
John the
Ripper
security tool
in action
24. A screenshot of the
/var/log/auth.log
file with
information on
account
modification.
Account
modification
in the
Auth.log File
25. QUESTIONS
Even though jdoe and jrock have the same password (hacker), the two password hashes are
different. Why is that? Is this good or bad in term of security?
• Answer here: Because if an unauthorized user gains access to these password hashes
they would not be able to identify that two of the passwords are the same.
Why did John the Ripper only crack six passwords in your exercise? Aren't there more than
six accounts in the /etc/shadow file?
• Answer here: Because the rest of the items identified as having passwords (or the ability)
did not contain login information.
How can security administrators use the /var/log/auth.log file to audit security violations?
• Answer here: Because it allows the admin to see when a user has changed their
password. Likewise it allows the admin to see if changes have been made without a user
being aware.
26. MODULE 5
• The next five slides are to do with network performance monitoring.
• The first slide is of a graphical interface illustrating the packet flow on my LAN.
• The next slide is of a graphical interface illustrating network traffic on my LAN.
• The third slide is of a graphical interface illustrating the network performance between two different
virtual appliances on the same hypervisor.
• The fourth slide answers questions posed in the project.
27. A screenshot of
the Etherape
graphical screen.
Etherape
Graphical
Packet Flows
30. A screenshot of
Wireshark screen
that shows
performance of the
HTTP traffic between
the Kali VM and the
Linux Server VM.
Wireshark
Performance
Analysis
31. What do you think all these connections mean given that you did not
start any applications yet and your VM appliances are not
connected to the Internet?
----This chart shows all of the devices that are on the network with
your Kali appliance. So if you have two appliances open-like the
server and kali-more connections will be shown.
How can network engineers and administrators use the information
collected to better manage their networks?
----Network engineers can visualize which devices use the most
bandwidth, and for what reasons, helping them spot suspicious
activity.
What is the significance of setting up the filter in Wireshark?
----To only show devices on the network capable of communicating
with HTTP servers.
Complete and
correct answers to
the three
questions in the
module.
Answers to
the three
questions
32. MODULE 6
• The next five slides are about IP routing.
• The fist slide shows that two loopback interfaces have been created. One named Lo6 and the other
named Lo5.
• The second slide shows the results of a ping test between the host machine and the two loopback
devices.
• The third slide shows the results of a ping test between the Kali VM and the two loopback devices.
• The fourth slide shows the modification of a wireless router into a WiFi range extender.
• The fifth slide answers the questions posed in the module.
33. A screenshot of
Loopback 5 and
Loopback 6
interfaces on the
GL-MT300N-V2
Router.
IP configurations
of Lo5 and Lo6
interfaces
34. A screenshot of the
ICMP Ping Test from
the Host Computer
and the two
Loopback interfaces.
Ping results from
the Host
Computer and
two loopback
interfaces
35. A screenshot of the
ICMP Ping Test from
the Kali VM and two
Loopback interfaces.
Ping results from
the Kali VM and
two loopback
interfaces
36. A screenshot of your
WLAN SSID shown in
the extender
configuration
window on the AR-
750 router.
Your WLAN
SSID
37. QUESTIONS
1. What is the difference between a physical interface and a loopback interface?
Answer here: A loopback interface is a VLAN whereas a physical interface is a physical
LAN.
2. How is it possible to successfully conduct an ICMP Ping test from Host Computer to the
Loopback interfaces without the need for dynamic or static routing?
Answer here: Because you are pinging a virtual device sitting on top of a hypervisor.
38. CAREER SKILLS OBTAINED
• This course has provided me with a greater knowledge and understanding of the underlying mechanics
of network engineering and maintenance.
• I have gained a foundation in the various penetration testing tools used to help secure a modern
network.
• Gained a better understanding of the various functions and roles various network equipment play in the
existence of the internet.
39. PROJECT CHALLENGES
• The biggest challenge that I faced during the course of this project was at the subnetting stage.
Grasping how subnets work and how to create them baffled me at first. Throughout the course,
however, I feel that I have gained a better understanding of subnetting.
40. CONCLUSION
• This course has helped prepare me for real world scenarios in networking as well as helped me further
my knowledge, getting me one step closer to Network + Certification.