Testout pc pro certification exam answers quizlet
![testout pc pro certification exam answers quizlet testout pc pro certification exam answers quizlet](https://d20ohkaloyme4g.cloudfront.net/img/document_thumbnails/97b06c9132fdcc3865e1f39442976dd5/thumb_1200_1697.png)
Initiate a man-in-the-middle attack as follows:Select Mitm > ARP poisoning.Select Sniff remote connections.Click OK. Use Ettercap to sniff traffic between Office1 and the gateway as follows:From the Favorites bar, open Ettercap.Maximize the window for easier viewing.Select Sniff > Unified sniffing.From the Network Interface drop-down list, select enp2s0.Click OK.Select Hosts > Scan for hosts.Select Hosts > Host list.We want to target information between Office1 (192.168.0.33) and the gateway (192.168.0.5).Under IP Address, select 192.168.0.5.Select Add to Target 1.Select 192.168.0.33.Select Add to Target 2. Type route and press Enter to get the gateway address. At the prompt, type host office1 and press Enter to get the IP address of Office1. Select Score Lab.Ĭomplete this lab as follows: On IT-Laptop, open Terminal from the sidebar.
![testout pc pro certification exam answers quizlet testout pc pro certification exam answers quizlet](https://i3.ytimg.com/vi/L5CGxrceE8U/hqdefault.jpg)
In the middle pane, expand Ethernet II.Notice the source MAC address of the computer sending the SYN flood. In the top right, select Answer Questions. Notice that only SYN packets were captured. In Wireshark, select the red box to stop the Wireshark capture.Notice the time between each packet sent to host 192.168.1.10. In Metasploit, type exploit and press Enter to start a SYN flood.
![testout pc pro certification exam answers quizlet testout pc pro certification exam answers quizlet](http://www.newpages2u.com/uimg/arcnettraining.com148894156027fdd03073fbec352da50b6561d33423.jpg)
Capture SYN flood attacks on the CorpServer machine as follows:From the Favorites bar, open Wireshark.Under Capture, select enp2s0.In the Apply a display filter field, type host 192.168.0.10 and =1Press Enter.Select the blue fin to begin a Wireshark capture.Notice that no packets are being captured. Use Metasploit to send a SYN flood as follows:From the Favorites bar, open Metasploit Framework.At the prompt, type search synflood and press Enter to find a SYN flood Metasploit module.Type use auxiliary/dos/tcp/synflood and press Enter to select the SYN flood module.Type show options and press Enter to view the current options for the SYN flood module.Notice that RHOST and SHOST are unassigned and RPORT is set to port 80.Type set rhost 192.168.0.10 and press Enter to set the RHOST address.Type set shost 192.168.0.33 and press Enter to set the SHOST address.Type set rport 21 and press Enter to set the FTP port.Type show options and press Enter to view the new options for the SYN flood module.Notice that RHOST and SHOST have IP addresses assigned and RPORT is set to port 21 matching CorpServer. Complete this lab as follows: From Zenmap, use nmap to find the FTP port used on CorpServer as follows:From the Favorites bar, open Zenmap.In the Command field, type nmap -p 0-100 192.168.0.10Select Scan.CorpServer is using port 21 for FTP.Close Zenmap.