1. Most modern TCP implementations use pseudo-random number generators(PRNG) to
ID: 3630937 • Letter: 1
Question
1. Most modern TCP implementations use pseudo-random number generators(PRNG) to determine starting sequence numbers for TCP sessions. With such generators, it is difficult to compute the ith number generated, given only the ( i - 1 )th number generated. Explain what network security risks are created if an attacker is able to break such as PRNG so that he can in fact easily compute the ith number generated, given only the ( i - 1 )th number generated.2. A hacker just set up a TCP connection with a web server in Chicago, Illinois, claiming he is coming in with a source IP address that clearly belongs to a network in Copenhagen, Denmark. In examining the session logs, you notice that he was able to complete the three- way handshake for this connection in 10 milliseconds. How can you use this information to prove he is lying?
3. Explain how it would give potential intruder an additional advantage if he can spend a week stealthily watching the behaviors of the users on the computer he plans to attack.
Explanation / Answer
Dear User, 3) By watching the behaviors of the users, the intruder can get various clues to hack the system. The advantages that an intruder can get are: Thus by watching the behaviors, an intruder gets an ease to access a system.Hope this wil help you. Note: One question is to be posted as per the Cramster rule. Please post the remaining in other posts so that we can help you.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.