We are here with you hands in hands to facilitate your learning & don't appreciate the idea of copying or replicating solutions. Read More>>

Looking For Something at vustudents.ning.com? Click Here to Search


+ Link For Assignments, GDBs & Online Quizzes Solution


+ Link For Past Papers, Solved MCQs, Short Notes & More

Dear Students! Share your Assignments / GDBs / Quizzes files as you receive in your LMS, So it can be discussed/solved timely. Add Discussion

How to Add New Discussion in Study Group ? Step By Step Guide Click Here.



Let us assume that you are hired as a Network analyzer in an IT solution provider company. Your job responsibility is to monitor the data traffic within and from out of company. Your company has threat of stealing data and other data attacks.


Identify the following attack types and also give the solution for each.


1-    Identify the attacking technique and its solution in which Say that the hacker gain access to the restricted communication channel by using session that another user has already established




2-    Identify the attacking technique and its solution in which an attacker outside your network pretends to be a trusted user either by using an IP address that is within the range of IP addresses for your network or by using an authorized external IP address that you trust and to which you want to provide access to specified resources on your network


3-    Identify the attack in which the attacker uses a fake identity, such as a network identity, to gain unauthorized access to personal computer information through legitimate access identification 

+ How to Follow the New Added Discussions at Your Mail Address?

+ How to Join Subject Study Groups & Get Helping Material?

+ How to become Top Reputation, Angels, Intellectual, Featured Members & Moderators?

+ VU Students Reserves The Right to Delete Your Profile, If?

See Your Saved Posts Timeline

Views: 3005


+ http://bit.ly/vucodes (Link for Assignments, GDBs & Online Quizzes Solution)

+ http://bit.ly/papersvu (Link for Past Papers, Solved MCQs, Short Notes & More)

+ Click Here to Search (Looking For something at vustudents.ning.com?)

+ Click Here To Join (Our facebook study Group)

Replies to This Discussion

kitnay marks ki hai yeh assignment ahmed ???

bro 20 marks ke

Please Discuss here about this assignment.Thanks

Our main purpose here discussion not just Solution

We are here with you hands in hands to facilitate your learning and do not appreciate the idea of copying or replicating solutions. Read More>>



For Important Helping Material related to this subject (Solved MCQs, Short Notes, Solved past Papers, E-Books, FAQ,Short Questions Answers & more). You must view all the featured Discussion in this subject group.

For how you can view all the Featured discussions click on the Back to Subject Name Discussions link below the title of this Discussion & then under featured Discussion corner click on the view all link.

Or visit this link 

Click Here For Detail.


.•°How to Download past papers from study groups°•.


Please Click on the below link to see…

.... How to Find Your Subject Study Group & Join .... 


These techniques are  in which chapter of hand books , i did not find them.

if some one know ,please reply. 

I think these techniques could be found in lesson no-39 Web Security.

anybody tried to solve this solution??

no responce about this solution guys

i think these are related to active attacks. ???

lesson no-39 Web Security. ... Yeah its related to this lecture ... Listen Lecture Video ... will helpful for solution .... otherwise I will share solution tomorrow .... 

solution bhai??????????

Answer for Peoblem 1:

It is Piggybacking attack in this type of attack hacker gaining access to a restricted communications channel by using the session another user already established. Piggy-backing can be defeated by logging out before walking away from a workstation or terminal or by initiating a screensaver that requires re-authentication when resuming. There are numbers of ways to prevent piggybacking, especially physically. There are a plethora of physical access technologies that are cropping up, as a means to keep intruders (piggybackers and social engineers) out. Key card and key pad access control systems are already widely used, but once access is granted, anyone could pass through the door

39.4 Types of Active attacks
Common form of active attacks may include the following:
• Masquerading – involves carrying out unauthorized activity by impersonating a legitimateuser of the system.
• Piggybacking – involves intercepting communications between the operating system and
the user and modifying them or substituting new messages.
• Spoofing – A penetrator fools users into thinking they are interacting with the operating
system. He duplicates logon procedure and captures pass word.
• Backdoors/trapdoors – it allows user to employ the facilities of the operating systemwithout being subject to the normal controls.
its from chapter 39 and just get the each type of attack detail from net.


© 2020   Created by + M.Tariq Malik.   Powered by

Promote Us  |  Report an Issue  |  Privacy Policy  |  Terms of Service