• Home
  • Blog
  • Unit 1 Lab: Performing a Denial of Service Attack from the WAN. (I AM WORKING O

Unit 1 Lab: Performing a Denial of Service Attack from the WAN. (I AM WORKING O

0 comments

ORDER YOUR PAPER AND GET QUALITY FOR YOUR MONEY

Unit 1 Lab: Performing a Denial of Service Attack from the WAN. (I AM WORKING ON LABS JUST NEED HELP WITH THE WRITE UP)Outcomes addressed in this activity:Unit Outcomes:Discuss the concept of ethical hacking.Describe the TCP/IP protocol and numbering systems.Document an attack and penetration test plan.Select appropriate cryptographic algorithms to achieve data protection in different contexts.Course Outcome:Analyze the methods ethical hackers use to perform reconnaissance and social engineering.PurposeIn this lab, you will perform a denial of service attack on a Wide Area Network. You will be using Low Orbit Ion Cannon, an open source application, to conduct a TCP, UDP, and HTTP flood attack against a pfSense firewall in a virtual environment.Lab InstructionsPart 1:Complete the lab “Performing a Denial of Service Attack from the WAN.” In the lab environment, you will find step-by-step instructions. As you work through the lab, there will be capture-the-flag challenges. To provide proof you captured the flags, you will need to take screenshots of the flags you capture.Part 2:After completing the lab answer the following questions. Conduct research and cite supporting sources in APA format where appropriate.1. Describe the different capabilities of Low Orbit Ion Cannon. Search and identify at least one other product that allows you to conduct denial of service attacks, and identify two differences between the products. Provide appropriate citations.2. In this lab you performed TCP, UDP, and HTTP flood attacks. Research and describe three different ways that an organization can prepare against denial of service attacks. Describe how the defense strategies against denial of service attacks differ based on the types of attacks. Provide appropriate citations.3. While using tcpdump in step 9 of the lab, search and identify what –nntttt, -s 0 and –w options are supposed to do.4. What steps should an organization take when it is actively under a DDOS attack? Provide appropriate citations.Lab RequirementsPlace your work from Part 1 and Part 2 into a Microsoft® Word® document. Support any assertions made with credible sources using APA style formatting.For more information on APA style formatting, go to Academic Writer in the Academic Tools area of this course.***** Only need the 3 pages nothing more********

About the Author

Follow me


{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}