Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
9 views3 pages

Untitled Document

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views3 pages

Untitled Document

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Name: Mohit Vaishnav​ ​ ​ ​ ​ ​ En.

No: 2403031550010

PART-A
MITM Attack

Setup

●​ Attacker: Kali Linux: 192.168.100.7


●​ Victim (Target1): Ubuntu: 192.168.100.8
●​ Gateway (Target2): 192.168.100.1

Process​
Ettercap was used in ARP poisoning mode with victim and gateway as targets. When the
victim logged into http://testphp.vulnweb.com/login, the attacker intercepted the
credentials.

Observation​
Unencrypted HTTP traffic allowed the attacker to capture sensitive data.

Prevention

●​ Avoid public/unsafe Wi-Fi


●​ Use HTTPS or VPN
●​ Enable WPA2/WPA3 on routers
●​ Use strong passwords and trusted networks
●​ Monitor traffic for suspicious activity by using traceroute.



Name: Mohit Vaishnav​ ​ ​ ​ ​ ​ En. No: 2403031550010


PART-B
DoS Attack​

Resources Usage: Before executing DoS attack.

Method Used:​
Name: Mohit Vaishnav​ ​ ​ ​ ​ ​ En. No: 2403031550010

Resources Usage: After executing DoS attack.

Mitigation of DoS Attacks

●​ Block suspicious traffic patterns and detect flooding attempts.


●​ Limit the number of requests from a single IP or client.
●​ Distribute traffic across multiple servers to reduce overload.
●​ Keep software updated and close unnecessary ports.
●​ Keep backup servers and failover mechanisms for critical services.​

You might also like