Time 14 hours
Description
Unformatted Attachment Preview
Environment Setup using Container
Docker compose build and up
Setting up the attack and host containers
Checking for available containers
Host b up
Attacker up
Task 1.1: Sniffing Packets
Initiating attack
Attack successful
Code
Task 1.2: Spoofing ICMP Packets
Code
Task 1.3: Traceroute
Task 1.4: Sniffing and-then Spoofing
ping 1.2.3.4 # a non-existing host on the Internet
ping 10.9.0.99 # a non-existing host on the LAN &ails to capture packets since none is successfully sent
ping 8.8.8.8 # an existing host on the Internet
Specify the following queries on the database schema shown in Figure 5.5 or slide 3 on chapter 6
using the relational operators discussed in this chapter. Also show the result of each query if applied
to the database of Figure 5.6 or slide 3 on chapter 6
(a) Retrieve the names of employees in department 4 who work on the ïmputerization0roject.
(b) Find the names of employees that works for ¥search$epartment
(c) Retrieve the average salary of all female employees who works for dministration$epartment
(d) For each department, list the department name and the total number of project controlled by the
department.
(e) Retrieve the names of employees who work on every project controlled by department 5
(f) Retrieve the names of department managers who do not work on any project.
(g) For each employee, retrieve employeeàname, and the total hours working in projects
(h). List the names of employees who have has dependents and is supervised by ‘Franklin Wong’.
(i) Find the names and addresses of employees who work on at least one project located in
Stafford.
(j) List the last names of female employees who have no dependents.
Purchase answer to see full
attachment

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."