Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Is there a way the person who did order # 105535 , can do this one as well? Your task is to write a final Forensic Report that summarizes network forensics and the digital forensic tools and...

1 answer below »

Is there a way the person who did order #105535, can do this one as well?


Your task is to write a final Forensic Report that summarizes network forensics and the digital forensic tools and techniques for analyzing network incidents. This report will include your lab report from the previous step and should also be composed of network attack techniques, network attack vectors, and a comprehensive comparison of at least five tools used for analyzing network intrusions. This report will conclude with a recommendation for network administrators to meet the goals of hardening the infrastructure and protecting private data on the network.

Answered 2 days After May 13, 2022

Solution

Amit answered on May 16 2022
94 Votes
Title of the assignment:
Student’s name:
Student ID:
Professor’s name:
Course title:
Date: 5/16/2022
Table of Contents
1.    Summary of forensic analysis    3
2.    Network attack techniques and attack vectors    3
3.    Tools for network analysis    4
4.    Recommendations to network administrator    5
5.    References:    6
1. Summary of forensic analysis
The analysis report of previous step was developed with Wireshark tool. The complete row network traffic is being analyzed for verification of checksum. The checksum is verified for valid traffic and its status is being measured. The checksum is also verified for invalid network traffic and its status is being measured and it shows overload of TCP checksum. After verification of checksum, the host discovery attack is verified for the web server and it is observed that any such attack is not conducted on the web server. This analysis is done with ping sweeps and scanning the complete network. The scanning of IP is also done for detection of any possible attack. The ICMP, TCP and UDP ping sweeps are also analyzed for finding possible network attacks. Any successful attack on the web server is not detected with the conducted analysis. The recommendations for TCP SYN scan are also made in the report. The response code of HTTP and requesting computer are also analyzed. This complete report is based on the analysis of possible attacks on the web server and conducting the analysis with help of Wireshark tool.
2. Network attack techniques and attack vectors
For conducting the network attacks, network attackers makes use of different techniques. Some attackers follows active and some follows passive techniques for attacking the network. When attackers have authorized access to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here