SI202: Week 1

EC312 Homework 29
Name: _____________________________
Read: (1) Lesson 29 Notes
1. What is the underlying assumption between routers in the routing algorithms they use which makes it
possible to conduct a Man-In-The-Middle (MITM) attack?
2. What three things can an attacker do to your network traffic in a Man-In-The-Middle (MITM) attack and
what pillar of Information Assurance is affected during each?
3. Forouzan, P18-25. Circle the router interfaces below to indicate how the packet is routed to its destination.
Destination Address:
4. Two small size companies are to be combined into one medium-sized organization. If the first small-size
company uses the IP address block and the second uses the IP address block, what is the aggregate address block that can be used by the new medium-sized company?
5. An attacker is located on the network and wants to prevent midshipmen from reaching a
website at He turns his computer into a router using Loki to advertise a false network to Router C.
(a) Construct the routing table for Router C.
(b) Looking at Router C’s routing table, what network address and mask should the attacker choose?
(c) Complete the routing table entry below with your answer from (b) and draw a line into Router C’s
routing table showing where the attacker’s false network would go.
(d) What is the first and last IP address of the false network you chose for the evil instructor?
First Address:
Last Address:
(e) Does the IP address of the webserver fall within your choice for the evil instructor’s false network?
(f) Given your answer to part (e), whenever a midshipman sends a packet destined for the webserver at where will Router C forward their packet? Will the midshipman ever be able to reach the
important website?
(g) List and briefly describe two technical solutions that could be implemented on Router C to prevent
the evil instructor from injecting false routing information.
Solution #1 __________________________________________ :
Solution #2 __________________________________________ :
(h) Who is responsible for implementing these security measures in a network?