Select Page

Scenario: Wilde, pleased with your performance on the malware case, has decided to give you another incident.

Scenario:Ms. Wilde, pleased with your performance on the malware case, has decided to give you another incident. The overworked, underpaid, and understaffed IT administrator of a small business has contacted Palindrome to analyze some network traffic around the time of an abnormal spike in traffic. Your mission, should you choose to accept it – and Ms. Wilde has decided that you do – is to analyze the provided packet capture and report on the activity found therein which may.To aid in your goals, the administrator has provided a few details about the network from which the capture originated. There are four computers on the network. The IT administrator admin box is an Ubuntu server. They control the DHCP and web servers and is the only individual within the company with authorization for access to that server. There are two other employees, Bob Smith, a new hire and recent college graduate, who uses a workstation with network access running Windows XP, and Sarah, a developer who uses a workstation with a standard installation of Ubuntu also with network access. Both Bob and Sarah are authorized to have access to their own workstation and no others.Deliverables:A professional-quality report in two sections.First, a management summary, written with no technical language, which provides a summary of what was found. The summary should be roughly a paragraph in length. This will require some thinking on your part to digest all that you’ve seen and turn that into something a manager can read quickly, but also come away with, and comprehend, the relevant information you gathered.The second part will be the technical section where you will answer the following questions. Include the question and the answer.1. What is the network address and subnet mask?2. For each computer:              a. What is the IP of the computer?              b. What OS is it running?              c. What is the MAC address?3. What computer (refer by OS name and last octet of the IP address, e.g., Win7.128) is serving as a DHCP server? How do you know?              a. What other services is the DHCP server running? How do you know?4. What computer (refer by OS name and last octet of the IP address) is running a web server?              a. Which computer(s) accessed this web server?              b. How do you know a web page was accessed? What was the file name of the web page accessed?              c. What web browser was the user running?              d. At what time did the access occur?              e. What web server application was running? (include version number)5. What computer (refer by OS name and last octet of the IP address) is running the telnet service?              a. Which computer(s) accessed the telnet server?              b. At what time(s)/date did this access occur?6. What usernames/passwords were used to access the telnet server?              a. What did the attacker do, if anything, from the telnet server? Explain why the attacker might have done this.7. What is a buffer overflow? What is an SQL Injection? Identify the packet series that contains what appears to be a buffer overflow followed by an SQL Injection. Describe how the attacker attempts to effect the buffer overflow. You may need additional material from the Web. Use your own words; 8. What is a port scan?              a. How many port scans were run?              b. What computer initiated the port scan(s)? What were the target computers?              c. What type of port scan(s) did the attacker use (refer to the man page for nmap)?9. What did the ‘attacker’ do once on the FTP server?              a. How many commands were run on the ftp server?              b. What username/password was used to access the FTP server?              c. From what computer was the FTP server accessed?              d. Date and time?              e. What file was downloaded from the ftp server?              f. To which computer was this file downloaded?10. What is the IP address of the attacker? In your opinion, how technically sophisticated is the attacker? Provide evidence to support your claims.

Give us your instructions.
Select the type of service you need: writing, calculations, or programming. We’ve created an intuitive order form that tells you what information to enter and where, so make sure to fill out each required field. Also, make your requirements as specific as possible. Don’t rush! Take your time and explain everything in detail how it works.

Proceed to checkout and enter your credit card details or PayPal login, how to pay. Follow the payment provider’s instructions to confirm the transaction.
Now your order is in our system! We’ll start processing it right away.

Place Your Order

Contact Us

Frequently asked questions
Is your service confidential?

When you place an order with our company, we ask you to provide us with such personal information as your name, phone number, and email address. We need this data to keep you updated on the important things related to your order or account.

Is there a possibility of plagiarism in my completed order?

We complete each paper from scratch and in order to make you feel safe regarding its authenticity, we check it for plagiarism before its delivery. To do that, we use our in-house software, which can find not only copy-pasted fragments but even paraphrased pieces of text. Unlike popular plagiarism detection systems that are used by most universities (e.g., we do not report to any public databases—therefore, such checking is safe.

We provide a plagiarism-free guarantee that ensures your paper is always checked for its uniqueness.

Is there a money-back guarantee? If yes, how can I receive a refund?

You can certainly get your money back in several cases. You can receive a full refund if you have paid for your order twice or if you have placed two identical orders. In case your paper was late or the quality of the paper does not correspond to your expectations, you will get compensation for these issues.

Do you keep a database of pre-written essays?

No, we do not have such a database. All papers you order from us are written from scratch. This means your paper is unique and has never been published before—neither will it be published after we deliver it to you.


When will my custom paper be done?

While placing an order with WritersHub, you can choose a period of time within which a paper should be delivered to you. The countdown until the specified deadline starts automatically from the moment we receive your payment in our system. For example, if you pay for your order at 6pm on Monday and choose a 3-day delivery option, you will receive your custom paper by 6pm on Thursday.

Remember that a writer needs a sufficient amount of time in order to conduct thorough research. Therefore, please choose the most suitable deadline when you place an order. Moreover, the later you need your paper to be delivered to you, the cheaper it will be. Thus, you will be able to save your money while your writer will have enough time to work on your order and ensure its quality.

Make sure you upload all the additional materials at the very beginning. If you fail to do that, the deadline for your order will be postponed as well.

I haven’t received my custom paper by the deadline. What should I do?

Let us know immediately about that. You can do it by writing a message on Facebook or email us. Our support manager will carefully examine your order and will assist you with it right away. The reasons for late delivery may vary from time to time. It can happen that you have entered a wrong email address or your spam filter does not allow you to receive emails from us. It is also possible that the writer is waiting for your reply and can not continue working without your assistance, or we are checking the work for plagiarism. Whatever the case may be, contact us if you have any problems with getting your order on time.