You are investigating Network & Application layer attacks: Give three attack types in which hackers can leverage ICMP protocol? By crafting the IP header, and manipulating the ICMP message types,...



You are investigating Network & Application layer attacks:



  1. Give three attack types in which hackers can leverage ICMP protocol?

  2. By crafting the IP header, and manipulating the ICMP message types, explain how hackers can use ICMP to conduct a DDoS attack (Amplification & Reflection).

  3. You work as a security analyst for a company having
    com.lb
    as domain name. You have inspected your firewall logs and found out that an infected PC was communicating with the below domain:
    u83ccf36d9f02e9ea79a9d16c0336677e4.to
    What type of DNS attack technique do you suspect the Malware is using?

  4. You have inspected your DNS entries and found out that the below DNS entry was added to your authoritative DNS server, without your permission:
    6tR430-11Z.retail.com.lb


What type of DNS attack technique is used in this security incident?




Jun 03, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions ยป

Submit New Assignment

Copy and Paste Your Assignment Here