Exam CSCI369
Exam CSCI369
3. Timeframe
5. Deliverables
Question 9
Assume that the initial
vector IV is reused in WEP.
Show how the attacker can an hacker has C1 = RC4(IV||KEY) XOR M1 and C2 =
exploit the reused IV to RC4(IV||KEY) XOR M2, where Mi’s are plaintexts and
decrypt all the ciphertexts Ci’s are ciphertexts (Note here that the same IV is used.)
C1 XOR C2 = M1 XOR M2 It violates the principle of
in the current WiFi session.
(any) secure encryption that there must not be any
relationship between plaintexts and ciphertexts. Assume
that an hacker inject M to get C = RC4(IV||KEY) XOR M
The attacker can definitely get RC4(IV||KEY) = C XOR
M RC4(IV||KEY) can be used to decrypt other
ciphertexts.
Question 11
Suppose that there are two
client machines, C1 and C2 By using ping, it does an ICMP scan and based on
in the NAT network whose RFC 1122, every host that receives an ICMP echo
CIDR identification is given request will respond back as there are only a
as 10.0.2.0/24. Assume minority networks and hosts that blocks the
that C1 and C2 are not request. Then, using C1 IP address that is being
servers, so they do not responded back, the hacker is able to reach C2
have their public IP since both C1 and C2 are in the same NAT
addresses. Describe in network.
detail how a hacker
outside of the NAT network
(10.0.2.0/24) can use C1 as
a pivot to reach C2 through <my answer; wzx>
“ping”. When the hacker first compromised the C1, the hacker
make use C1 to reach C2. This can be done when a
reverse shell is created. Whereby the hacker will
create a reverse shell between C1 and C2. The
attacker can access C2 that reside in the C1 private
network. This is capable due C1 and C2 in the NAT
network. Reverse shell is done with the help of
backdoor Trojan, so the C2 machine must have the
backdoor Trojan to allows the reverse shell attack to
take place from C1 machine. Once trojan injected
successful the attacker can "ping" to C2 from C1. In
order to do so, C1 and C2 will be connected to the
same port.
Q12 ifconfig_output=subprocess.check_output(["ifconfig",
Write a Python code that interface])
invokes the Unix command ==========================================
ifconfig and extracts the ==
IPv6 address of the current
system. import subprocess
interface = raw_input("Enter interface name> ")
subprocess.call("ifconfig " + interface, shell = True)
Question 13
Suppose that the target
(victim) is a server on
which netcat is installed.
Describe how a hacker can
create a bind shell of the A bind shell is a shell that the victim provides to the
target machine using attacker when the attacker connects to the target.
netcat. The target (victim) will first have to be baited using
social engineering to run the command : $ nc -v -l -p
Ron <port number> -e /bin/bash
The attacker on his end will run the command:
$ nc <target IP> <port number> to connect to the victim
Question 14
Q14 Convert 14 byte to bits = 14 * 8 = 112
According to some
company's password 2^(112)/ (3*10^9) = 1.7307656e+24
policy, the length of a = 1 year
password should be 14
8760 hours
characters. Assume that a
hacker uses a CPU whose
4.8076822222222223e+20 hours
speed is 3*109 clock
cycles per second to
480,768,227,642,113,669,308,379.2897426
brute-forcing this type of
password. Also, assume
4.80768228 × 10^12 hours
that one character is one
byte. If searching one
password of a given
(bit-)entropy takes one
clock cycle, how long does
it take in hours for the
hacker to find a random
password (i.e. a password
generated by selecting
each character randomly)?
Ron
Ron
Question 16
arp -a
Q16
Display the IP and MAC
addresses of all cached
network neighbours (which
share the same internal
network).
Ron
Q17
Find the emails addresses
of 20 people related to the
domain uow.edu.au using
the source from yahoo.
Ron
Ron
Ron
???????????????????????