Practical Lab - Data in Transit Attacks

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

PRACTICAL LAB: ‘DATA-IN-

TRANSIT’ ATTACKS
GROUP RESEARCH TASK

JORDAN ALLISON
jallison1@glos.ac.uk
Practical Lab: ‘Data-in-Transit Attacks’ - JA

Table of Contents
1 Investigate Data-in-Transit Attacks: ...................................................................................... 2
2 Your Task .............................................................................................................................. 2

Page 1 of 2
Practical Lab: ‘Data-in-Transit Attacks’ - JA

1 Investigate Data-in-Transit Attacks:


In groups of 4 or 5, investigate a data-in-transit attack. Select one of the following
• Spoofing/Poisoning (e.g. ARP Poisoning)
• Man-in-the-middle
• Replay
• DoS/DDoS (e.g. SYN Flood or ICMP Flood)

2 Your Task
For your chosen attack, do the following:

1) Create a diagram detailing the attack on ‘Data-in-Transit’, and how it works.


2) Identify how you would identify this type of attack using Wireshark. For instance, what
filters may be beneficial, what are the key characteristics required.
3) If possible, identify the vulnerabilities that will be exploited to allow the attack to take
place.

After 25-30 minutes report your findings to the class.

Page 2 of 2

You might also like