Hartbleed attack. This sample question is to check if you could do the hartbleed attack.If you’re able to do that I’ll create a question with the price that you ask. Thank you.
Overview
The Heartbleed bug (CVE-2014-0160) is a severe implementation flaw in the OpenSSL library, which enables attackers to steal data from the memory of the victim server. The contents of the stolen data depend on what is there in the memory of the server. It could potentially contain private keys, TLS session keys, usernames, passwords, credit cards, etc. The vulnerability is in the implementation of the Heartbeat protocol, which is used by SSL/TLS to keep the connection alive. The objective of this lab is for students to understand how serious this vulnerability is, how the attack works, and how to fix the problem. The affected OpenSSL version range is from 1.0.1 to 1.0.1f. The version in the SEEDUbuntu 12.04 VM is 1.0.1.
Part 1
You need to submit a detailed lab report, with screenshots, to describe what you have done and what you have observed. You also need to provide explanation to the observations that are interesting or surprising. Please also list the important code snippets followed by explanation. Simply attaching code or screen shots without any explanation will not receive credits. Make sure you explain all your work even the sudo and Unix commands. Make sure you have detailed understandable explanation.
You can download the lab file from:
Part 2
Answer the following questions based on your assignment 5 submission and understanding and relate your answers:
1.What is the purpose of the Heartbeat protocol based on your part 1 report?
2.Describe what the mistake is in the Heartbleed vulnerability.
3.What lesson do you learn from this vulnerability?
4.The figure shows where a malicious Heartbeat request packet is stored in the memory after it is received. The payload length field contains 0x700. Please in detailed explanation describe which credit card numbers will be stolen by the attacker.
5.Assume that the Heartbeat implementation uses the actual payload length when allocating memory for the response packet (i.e., the memory for the response packet will the same size as that for the request packet). However, during the memory copy, the claimed payload length is used. What kind of security problems does it have?
Important Note: You need to show the full screenshot of the terminal window with detailed explanation of code and commands failing to do so you will not be graded and lose 75% of the grade.
Category: Networking
You must submit two separate copies (one Word file and one PDF file) using the A
You must submit two separate copies (one Word file and one PDF file) using the Assignment Template on Blackboard via the allocated folder. These files must not be in compressed format.
It is your responsibility to check and make sure that you have uploaded both the correct files.
Zero mark will be given if you try to bypass the SafeAssign (e.g. misspell words, remove spaces between words, hide characters, use different character sets, convert text into image or languages other than English or any kind of manipulation).
Email submission will not be accepted.
You are advised to make your work clear and well-presented. This includes filling your information on the cover page.
You must use this template, failing which will result in zero mark.
You MUST show all your work, and text must not be converted into an image, unless specified otherwise by the question.
Late submission will result in ZERO mark.
The work should be your own, copying from students or other resources will result in ZERO mark.
Use Times New Roman font for all your answers.
Grading Criteria
Calculate the throughput of communication medium
2.5
Propagation Delay Diagram of this Communication Channel
2.5
Create a communications Link Layer Switch Model
4
Presentation
5
Total
14
Description and Instructions
The objective of this project is to understand communications methods in OSI Model.
The project is a Group work with a minimum of 3 People and a maximum of 4 People.
Each group must submit/upload 3 files:
project report in word document
PDF file of the project report
Presentation in PPT/PPTX format.
One of the group members (group leader) should submit all the files on the blackboard. Marks will be given based on your submission and the quality of the content.
Your project must be original work. The project will be checked using a plagiarism tool. Any matching with an online project or another/previous student project will be given ZERO.
Project Total Marks = 14
Due date: 5th December 2023 @11:59 PM
Learning Outcome(s):
CLO 2:
Develop the ability to outline layered approach for networking and the physical layer & associated hardware and software integration.
CLO 4:
Demonstrate protocol configuration, network-addressing schemes and analyze packet transmission for the Local and Wide Area Networks.
Description and Instructions
You are a Network Engineer and you want to analyze the communications methods and techniques of the signals in OSI Model. Suppose a signal travels through a transmission medium then in this transmission Medium, calculate and solve the given below problems:
1.A transmission medium with 50 Mbps bandwidth can communicate average of 10,000 frames per day. If the capacity of each frame is 250 bits then Calculate the throughput of this communication medium.
2.Sender(Ahmad) and Receiver(Mohammad) are connected through a communication Link, if Bandwidth of this channel is 3 Mbps and Propagation delay is 10 Second then draw Propagation Delay Diagram of this Communication Channel?
3.Create a communications Link Layer Switch Model for port numbers associated with following IP addresses:
Port No.
IP Address
8
86:4A:34:76:84:76
7
86:4A:34:76:84:67
5
86:4A:34:76:84:86
6
85:4A:34:76:84:68
3
85:4A:34:76:84:90
4
86:4A:34:76:84:96
1
98:4A:34:76:84:89
2
98:4A:34:76:84:92
pages 381-388 starting with Using Autopsy to Validate Data and ending with figur
pages 381-388 starting with Using Autopsy to Validate Data and ending with figure 9-9
2nd part
Hands on project 9-1 page 408-409.
Everything must be done in APA format.
link to book; https://cenexp.com/biblioteca/librerias/FOR/Bforen…
My Lesson IBM Technical Support Professional Certificate The IBM Technical Suppo
My Lesson
IBM Technical Support Professional Certificate
The IBM Technical Support Professional Certificate provides several engaging and informative courses that introduce the fundamentals of technical support and information technology. This beginner-level certificate is open to anyone, regardless of prior experience or education. All you need to get started is a willingness to learn and basic computer literacy, as the courses are available online through your web browser or mobile app.
The courses in this certificate will introduce you to the essential parts of IT, and help you prepare for the CompTIA IT Fundamentals certification exam. The average salary for US computer support professionals is $57,910 annually, with an hourly pay of almost $28. The certificate includes practice assessments to help gauge your knowledge and skills, and graded assessments to measure your progress.
Courses and Schedule
The IBM Technical Support Professional Certificate includes courses on technical support, hardware and software, programming, and databases. The courses have flexible schedules, so you can complete them at your own pace, even if you have only a few hours a week.
Financial aid is available for those who qualify, and you can try a free seven-day trial or audit the courses if you are unsure if the program is right for you.
Course Content
The courses cover support essentials, roles and responsibilities of technical support professionals, cloud computing, and more. You will learn to develop a customer support mindset, recognize common security threats and risks, examine the characteristics of cyber attacks, and explore methods for securing and managing confidential information. The course also includes an instructor and an insider perspective on what you will hear from IT insiders.
The final course includes technical support case studies and a capstone to apply your knowledge and skills. The certificate is available online and ready to start when you are.
Computer support jobs in the US are projected to increase by nine percent through 2030. Technical support jobs are also a great way to start on your path to a high-paying career in information technology.
Comp TIA IT Fundamentals Certification Exam Preparation
This course can help you prepare for the Comp TIA IT Fundamentals certification exam. Throughout the course, you will learn with guided instructional videos that walk you through key concepts with essential need-to-know facts. Upon completion, you will earn a shareable badge and certificate that you can show to prospective employers. If you have any questions for the course staff or want to connect with your peers in the course, please feel free to post on the course discussion forums.
Becoming a Technical Support Professional
Welcome to becoming a technical support professional! After watching this video, you will be able to define technical support, discuss the importance of technical support, and list reasons for choosing technical support as a career.
Technical support is a good profession for people who like problem-solving and enjoy helping to resolve technology issues. It allows companies to provide helpful solutions to their customers. When companies provide support to their customers, they are viewed more positively and can see an increase in business. Technical support also helps companies to track and troubleshoot their technology, which can lead to product improvement and help companies develop more desirable products.
A career in technical support can help you learn more about technology, develop your professional skills and open the door to many other opportunities and paths in technology-related careers. In this video, you learned that technical support is working with clients and customers to solve technology-related issues. Different kinds of companies from large to small use technical support to assist their customers, and use technology like phones, email, live chat, social media and online community forums to do so. Technical support also allows companies to log and track problems and the actions taken to resolve them.
Skills Needed for Technical Support
To get started in technical support, you need to have a natural curiosity for how things work. It’s a great career choice, whether you have any prior degree or IT experience in the field. Essentially, you require two sets of skills: information technology skills, as well as customer support skills. Employers prefer applicants to have IT-related qualifications. However, a technical support executive must do certifications in the domain they are in.
You can develop these skills by taking courses, getting certifications, completing diplomas, and gaining experience.
CompTIA is an excellent starting point to learn about information technology skills. You can learn about the basics via the web or books. It’s a great way to understand the basics of learning.
Task 6 – Week One Discussion – IPv6 Duplicate Address Detection Task 6 – Week On
Task 6 – Week One Discussion – IPv6 Duplicate Address Detection
Task 6 – Week One Discussion – IPv6 Duplicate Address DetectionHosts on a network use Duplicate Address Detection (DAD) to ensure that no other hosts have the same IPv6 address on the network. This happens no matter how the host received it’s IPv6 address whether it was statically, through DHCPv6 or through SLAAC. In no less than 350 words, describe the process a PC takes to perform a DAD check on the network. Be sure to understand this process as it is a key topic for the CCNA exam.
================================================
Task 2 – Week Two Discussion – Autonomous vs. Lightweight Access Points
Task 2 – Week Two Discussion – Autonomous vs. Lightweight Access PointsDepending on the needs of a company, different wireless architectures can be deployed. One of the desicisons that would have to be made is whether Autonomous Access Points (APs) would be used or if Leightweight APs would be used. In no less than 350 words, describe the differences between these two types of APs and why each would be used depending on the needs of a company.
===========================================
Task 4: Week Two Lab
Attached Files:
Lab 2 – Cisco WIreless LANs.docx Lab 2 – Cisco WIreless LANs.docx – Alternative Formats (328.295 KB)
TASK 6 – WEEK ONE DISCUSSION – IPV6 DUPLICATE ADDRESS DETECTION Task 6 – Week On
TASK 6 – WEEK ONE DISCUSSION – IPV6 DUPLICATE ADDRESS DETECTION
Task 6 – Week One Discussion – IPv6 Duplicate Address DetectionHosts on a network use Duplicate Address Detection (DAD) to ensure that no other hosts have the same IPv6 address on the network. This happens no matter how the host received it’s IPv6 address whether it was statically, through DHCPv6 or through SLAAC. In no less than 350 words, describe the process a PC takes to perform a DAD check on the network. Be sure to understand this process as it is a key topic for the CCNA exam.
================================================
TASK 2 – WEEK TWO DISCUSSION – AUTONOMOUS VS. LIGHTWEIGHT ACCESS POINTS
Task 2 – Week Two Discussion – Autonomous vs. Lightweight Access PointsDepending on the needs of a company, different wireless architectures can be deployed. One of the desicisons that would have to be made is whether Autonomous Access Points (APs) would be used or if Leightweight APs would be used. In no less than 350 words, describe the differences between these two types of APs and why each would be used depending on the needs of a company.
===========================================
TASK 4: WEEK TWO LAB
Attached Files:
Lab 2 – Cisco WIreless LANs.docx Lab 2 – Cisco WIreless LANs.docx – Alternative Formats (328.295 KB)
Cut-Off Date: Based on the Published Deadline. Total Marks: 60 marks turned to 1
Cut-Off Date: Based on the Published Deadline.
Total Marks: 60 marks turned to 15 marks
Contents.
Warnings and Declaration………………………………………………………………………….1
Task 1 ………………………………………………….. ………………………………………….2
Task 2 ………………………………………………………………………………………………..2
Task 3 ………………………………………………………………………………………………..3
Task 4 ………………………………………………………………………………………………..3
Marking Criteria ……………………………………………………………………………………..3
Plagiarism Warning:
As per AOU rules and regulations, all students are required to submit their own TMA
work and avoid plagiarism. The AOU has implemented sophisticated techniques for
plagiarism detection. You must provide all references in case you use and quote another
person’s work in your TMA. You will be penalized for any act of plagiarism as per the
AOU’s rules and regulations.
Declaration of No Plagiarism by Student (to be signed and submitted by student
with TMA work):
I hereby declare that this submitted TMA work is a result of my own efforts and I have
not plagiarized any other person’s work. I have provided references of all information that
I have used and quoted in my TMA work.
Name of Student:……………………………..
Signature:……………………………………………
Date:…………………………………………………
T316 / TMA Page 1 of 4 2023/2024 Fall
Overview:
For this TMA (Tutor Marked Assignment), your task involves conducting research on a
particular subject within advanced networking, carrying out experiments using a simulation
tool of your preference, and evaluating the outcomes. The ultimate submission will consist
of a technical report that comprehensively documents your research, experiments, and the
conclusions drawn from them.
Task 1: Selection topics and Literature Review (10 marks)
Choose a topic within advanced networking that interests you and has a significant
amount of research available among the following:
Wireless and Cellular Networks (5G/6G):Simulation of 5G/6G cellular network protocols and architecturesModeling of network slicing in 5G networks
Handover strategies and performance evaluation in cellular networks
Vehicular Ad Hoc Networks (VANETs):
Simulation of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communicationsModeling of routing protocols and strategies in VANETs
Performance evaluation of safety and non-safety applications in vehicular networks
Internet of Things (IoT):
Simulation of various IoT communication protocols (e.g., MQTT, CoAP)Evaluating the performance of IoT networks with different topologies and scalesEnergy consumption and optimization in IoT networks
Optical Networks:
Simulation of Wavelength Division Multiplexing (WDM) in optical networksOptical burst switching and optical packet switching simulations.
Fault tolerance and reliability analysis in optical networks
Ad Hoc and Sensor Networks:
Simulation of routing protocols in ad hoc networks (e.g., AODV, DSR)Modeling of energy harvesting and consumption in wireless sensor networksMobility models and their impact on network performance in ad hoc networks
Perform a comprehensive review of the literature to acquire an in-depth comprehension of
the selected subject and acquaint yourself with the current research conducted in that field.
Utilize reputable journals, research databases, and conference proceedings to locate
pertinent articles. Assess the fundamental ideas, approaches, and discoveries presented
in the literature.
Task 2: Experiment Design and Simulations (20 marks)
Devise a series of experiments that tackle a particular research question or hypothesis
pertaining to your selected topic. Ensure that the experiments are meticulously planned,
with explicit goals and a well-defined methodology. Select a networking simulation tool,
such as:
NS-3 (Network Simulator 3)
T316 / TMA Page 2 of 4 2023/2024 Fall
OMNet++
Mininet
GNS3 (Graphical Network Simulator 3)
OPNET Modeler
Hint: Please note that if you use Packet Tracer, 2 marks will be deduced
Task 3: Data collection and analysis (20 marks)
Execute your experiments and gather the data produced by your simulations. Scrutinize the
data to derive significant insights that address your research question or validate/contradict
your hypothesis. Employ suitable statistical methodologies and data visualization
techniques to effectively communicate your findings.
Task 4: Technical Report (10 marks)
Compose a comprehensive technical report that outlines your research process,
experiments, and outcomes. Ensure that the report is well-organized and encompasses the
following sections:
Introduction: Provide an overview of the selected topic, its importance, state your
research question/hypothesis, and provide a brief outline of the report’s structure.
LiteratureReview:Conductathoroughexaminationofexistingresearchinyourchosen
field, identifying essential concepts and methodologies.
Experiment Design and Simulation: Describe the design of your experiments, the
simulation tool chosen, and explain the rationale behind your selections.
Results and Analysis: Present and analyze the data obtained from your experiments,
utilizing appropriate statistical techniques and data visualization methods.
Discussion: Interpret your results, discussing their implications and how they relate to
your research question or hypothesis. Address any limitations of your study and propose
potential avenues for future research.
Conclusion:Summarizeyourfindingsandtheirsignificance.
References: Compile a list of all the cited sources, adhering to a recognized citation
style.
Hints:
Ensure that each section is well-structured and contributes to a thorough
understanding of your research process, experiments, and findings.
The question 2&3 marks will be deducted if the screenshots and the information
inside it is not clear.
The sources should be referenced as per the Harvard referencing system. Finally,
your report should not exceed 5000 words.
T316 / TMA Page 3 of 4 2023/2024 Fall
Evaluation Criteria
The evaluation of your TMA will be based on the following criteria:
• The literature review’s relevance and depth.
• The clarity and excellence of the experimental design.
• The suitability of the chosen simulation tool and the rationale behind it.
• The quality of data analysis and presentation.
The strength and coherence of your conclusions and discussion.
The overall organization, clarity, and quality of the technical report.
Hello friend could you please help on my assignment. All the information needed
Hello friend could you please help on my assignment. All the information needed is in the file attached
Hi friend could you please help on my assignment? All the information needed is
Hi friend could you please help on my assignment? All the information needed is in the file attached
you can use different IP configuration while doing the Tasks but make sure to ex
you can use different IP configuration while doing the Tasks but make sure to explain why you’re using this IP configuration for your network and explain all the commands that you are using in the GNS3 as much as possible.
make sure to explain your GNS3 appliances selection(router/switch/hub/PC)
make sure to cite your references and screenshot should have date and timestamps if not your assignment will not be accepted