Attacker: 10.0.2.4; Victim: 10.0.2.7; and no other machine i…
Attacker: 10.0.2.4; Victim: 10.0.2.7; and no other machine is up in this 10.0.2.X network. 8.8.8.8 is an existing outside IP, and 1.2.3.4 is a non-existing outside IP. We are using Wireshark to monitor this network.1. If the attacker sends a spoofed echo request with srcIP: 10.0.2.7 dstIP: 8.8.8.8, can we see an echo reply?2. If the attacker sends a spoofed echo request with srcIP: 10.0.2.7 dstIP: 1.2.3.4, can we see an echo reply?3. If the attacker sends a spoofed echo request with srcIP: 10.0.2.7 dstIP: 10.0.2.9, can we see an echo reply?4. If the attacker sends a spoofed echo request with srcIP: 8.8.8.8 dstIP: 10.0.2.7, can we see an echo reply?5. If the attacker sends a spoofed echo request with srcIP: 1.2.3.4 dstIP: 10.0.2.7, can we see an echo reply?6. Can we see a spoofed echo request with srcIP: 10.0.2.9 and dstIP: 10.0.2.7? Bonus: why or why not?
Read DetailsNoah is 10 months old. It takes him some time to accept nove…
Noah is 10 months old. It takes him some time to accept novelty, and when he becomes distressed it is typically a little hard to soothe him. Noah’s mother also reports he has generally low activity levels. Noah is most likely to fit into which temperament category?
Read Details