Name: Mohit Vaishnav En.
No: 2403031550010
PART-A
MITM Attack
Setup
● Attacker: Kali Linux: 192.168.100.7
● Victim (Target1): Ubuntu: 192.168.100.8
● Gateway (Target2): 192.168.100.1
Process
Ettercap was used in ARP poisoning mode with victim and gateway as targets. When the
victim logged into http://testphp.vulnweb.com/login, the attacker intercepted the
credentials.
Observation
Unencrypted HTTP traffic allowed the attacker to capture sensitive data.
Prevention
● Avoid public/unsafe Wi-Fi
● Use HTTPS or VPN
● Enable WPA2/WPA3 on routers
● Use strong passwords and trusted networks
● Monitor traffic for suspicious activity by using traceroute.
Name: Mohit Vaishnav En. No: 2403031550010
PART-B
DoS Attack
Resources Usage: Before executing DoS attack.
Method Used:
Name: Mohit Vaishnav En. No: 2403031550010
Resources Usage: After executing DoS attack.
Mitigation of DoS Attacks
● Block suspicious traffic patterns and detect flooding attempts.
● Limit the number of requests from a single IP or client.
● Distribute traffic across multiple servers to reduce overload.
● Keep software updated and close unnecessary ports.
● Keep backup servers and failover mechanisms for critical services.