On the attacker machine, set up a netcat listener (needed in part (b) # nc -l -p 2222

| April 14, 2018


On the attacker machine, set up a netcat listener (needed in part (b) # nc -l -p 2222 Also capture packets using tcpdump and save them to a file.
Victim machine Send a large ping to the attacker # ping   -c  2  -s 8000 <ip-of-attacker>
Look at the packets on the attacker Notice the fragmentation. Explain how the packet is fragmented.
Task 6 :   fragroute tool for IDS/firewall evasion
Next, use fragroute (not fragrouter)  (and maybe fragtest – not necessary)  on the client.
# fragroute    <ip-of-attacker>
Then, on another tab # nc  <ip-of-attacker> 2222 Then type  many lines of text.
Capture the packets and comment on your observations.
Question: Do you need to allow fragmented packets into your network?

Order your essay today and save 30% with the discount code: ESSAYHELP
Order your essay today and save 30% with the discount code: ESSAYHELPOrder Now