Professional Documents
Culture Documents
Questions
Questions
2022
Questions
Lab6 – Q17
Create a script that gets two files as $1 and $2 and prints the different lines; download the text files and
find the number missing in file1.
-l listen
-v verbose
-p port
1. Chat
2. Transfer files
Server:
Client:
3. Get control
Server:
Client:
Lab7: Q4,5,8,11,13
tcp.port==
ip.addr==
ip.src==
ip.dst==
a. Straight
b. Proxy
c. VPN (Virtual Private Network) [pureVPN, NordVPN]
1. Proxy saves logs for longer time | VPN usually saves the logs up to 48 hours.
2. With Proxy you connect to a device | VPN you connect to a network.
3. The “big brother” can still see everything when using proxy, but not when using VPN.
1. Why is it that we can connect to CNN from anywhere in the network, but no one can connect
from the outside to inside the network??
Outside connections don’t know where to go once they reach the router.. but when internal
connections go out, the router knows to send the response back.
2. How can someone OUTSIDE a network connect to a specific computer inside the network?
Port Forwarding
Shodan:
daveshif
12345677
Trojans
Bind – once executed, the trojan opens a vulnerable port so the attackers can connect.
Attacker(2) won’t be able to connect to the NEW port A created (while running BIND type connection).
it allows external connection – attackers don’t have any need for port forwarding.
Steps:
Bind – Netstat
Reverse - Wireshark
• Different Payloads
LLMNR Attacks