Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

2. [15 marks] Let\'s see what we can find by using some network tools a. [3 mark

ID: 3740774 • Letter: 2

Question

2. [15 marks] Let's see what we can find by using some network tools a. [3 marks] Let's see what we can find using whois. Go to http:ping.eu select WHOIS and enter www.bestbuy.ca. Be sure to click on the Full Info box and enter the captcha to access the details. What do you see? How could good guys and bad guys make use of this information? b. [3 marks] Let's see what Ping does. Go to http:ping.eu, select Ping and enter google.com. What do you see? How could good guys and bad guys make use of this information? c. [3 marks] Now let's see what traceroute does. Go to the website http://www.monitis.com/traceroutel and enter the URL for the Zurich City Government Website (in Switzerland)-www.stadt-zuerich.ch. This will give you a path that the data travels from starting locations in North America Europe, and Asia to the Zurich City Government servers. Click the tabs for the three starting points and look at the corresponding map to observe some of the hops that the data made in its journey. Be sure to scroll down to see the list of the hops (do not just rely on just the maps). Comment on what you see. ls there anything surprising in the results? d. [3 marks] For each of the three paths, find the LAST IP address given in the list of hops (not from the maps). To find the IP address, let your cursor hover over the name of the hop. Then go to http://whatismyipaddress.com/ and in the grey box at the top right of the page, enter the IP address. Look at the result to find the geographical location (scroll down to see a map). For each of the three IP addresses, which city does the path end in for each route?

Explanation / Answer

A) we see the info about the site when created, its expiry and last modified, its origin and its contacts while in making and the servers used. Good guys can use it to inform to the contacts about technicalities while bad guy can server as a spam to attack the contacts and also to hack on the servers.

B) I can see whether the site is functional or not and the time taken to recieve back the packets. Good guys can work on network efficiency while the bad guys can use the data to predict the way to hack on the packet sent.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at drjack9650@gmail.com
Chat Now And Get Quote