2.5.2.7 Packet Tracer – Using File and Data Integrity Checks Answers

Last Updated on by

2.5.2.7 Packet Tracer – Using File and Data Integrity Checks Answers

Packet Tracer – Using File and Data Integrity Checks (Answers Version)

Answers Note: Red font color or gray highlights indicate text that appears in the Answers copy only.

Addressing Table

DevicePrivate IP AddressPublic IP AddressSubnet MaskSite
FTP/Web Server10.44.1.254209.165.201.3

http://www.cisco.corp

255.255.255.0Metropolis Bank HQ
Backup File ServerN/A209.165.201.10

https://www.cisco2.corp

255.255.255.248Internet
Mike10.44.2.101N/A255.255.255.0Healthcare at Home
Sally10.44.1.2N/A255.255.255.0Metropolis Bank HQ
Bob10.44.1.3N/A255.255.255.0Metropolis Bank HQ

Objectives

Part 1: Download the Client Files to Mike’s PC

Part 2: Download the Client Files from the Backup File Server to Mike’s PC

Part 3: Verify the Integrity of the Client Files using Hashing

Part 4: Verify the Integrity of Critical Files using HMAC

Background

In this activity, you will verify the integrity of multiple files using hashes to ensure files have not been tampered with. If any files are suspected of being tampered with, they are to be sent to Sally’s PC for further analysis. The IP addressing, network configuration, and service configurations are already complete. You will use the client devices in the differing geographic regions to verify and transfer any suspect files.

Part 1: Download the Client Files to Mike’s PC

Step 1: Access the FTP server from Mike’s PC.

  1. Click the Gotham Healthcare Branch site and then click the PC Mike.
  2. Click the Desktop tab and then click Web Browser.
  3. Enter the URL http://www.cisco.corp and click Go.
  4. Click the link to download the most current files.
  5. What protocol was used to access this webpage on the backup file server?________________
    HTTP

Step 2: The file server has been hacked, notify Sally.

  1. Within the Gotham Healthcare Branch site, click the PC Mike.
  2. Click the Desktop tab and then click Email.
  3. Create an email and send it to [email protected] and tell her about the File Server.

Part 2: Download the Client Files from the Backup File Server to Mike’s PC

Step 1: Access the offsite FTP server from Mike’s PC.

  1. Within the Gotham Healthcare Branch site, click the PC Mike.
  2. Click the Desktop tab and then click Web Browser.
  3. Enter the URL https://www.cisco2.corp and click Go.
  4. Click the link to view the most recent files and their hashes.
    What protocol was used to access this webpage on the backup file server?____________
    HTTPS
    What are the file names and hashes of the client files on the backup server? (copy and paste them below)
    ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
    FileName | NWclients.txt | Hash| dd88482282785192d4a4ad4f8e32b3b6
    FileName | SWclients.txt | Hash| c202036c9210959e7b587b08f080c378
    FileName | NEclients.txt | Hash| 6c8fb699ac2ced0b5c9ea40aab9f8caf
    FileName | SEclients.txt | Hash| 48d7eceee217e83cd685b537a3066b2f
    FileName | Sclients.txt | Hash| abad7f7606e324f252bfebd6c09810e2
    FileName | Nclients.txt | Hash| 65f586602d9476b7b561b5d98b2ea23b

Step 2: Download the client files to Mike’s PC.

  1. Within the Gotham Healthcare Branch site, click the PC Mike.
  2. Click the Desktop tab and then click Command Prompt.
  3. Connect to the Backup File server by entering ftp www.cisco2.corp in the command prompt.
  4. Enter the username of mike and a password of cisco123.
  5. At the ftp> prompt, enter the command dir to view the current files stored on the remote FTP server.
  6. Download the six client files (NEclients.txt, NWclients.txt, Nclients.txt, SEclients.txt, SWclients.txt, and Sclients.txt) to Mike’s PC by entering the command get FILENAME.txt, replace FILENAME with one of the six client filenames.
    ftp> get NEclients.txt
    Reading file NEclients.txt from www.cisco2.corp:

    File transfer in progress…
    [Transfer complete – 584 bytes]
    584 bytes copied in 0.05 secs (11680 bytes/sec)
  7. After downloading all the files, enter the command quit at the ftp> prompt.
  8. At the PC> prompt, enter the command dir and verify the client files are now on Mike’s PC.

Part 3: Verify the Integrity of the Client Files using Hashing

Step 1: Check the hashes on the client files on Mike’s PC.

  1. Within the Gotham Healthcare Branch site, click the PC Mike.
  2. Click the Desktop tab and then click Text Editor.
  3. In the Text Editor window, click File > Open.
  4. Click on the first document NEclients.txt and click OK.
  5. Copy the entire text document contents.
  6. Open a web browser on your personal computer and browse to the website https://www.tools4noobs.com/online_tools/hash/
  7. Click the whitespace and paste in the text document contents. Make sure the algorithm is set to md2. Click Hash this!.
  8. To make sure a file has not been tampered with, you will compare the resulting hash with the filename/hash information you found in Part 2 Step 1.
  9. Repeat Steps d through h for each client file and compare the generated hash with the original hash shown in Part 2 Step 1.
    Which file has been tampered with and has an incorrect hash?___________________
    SEclients.txt

Step 2: Download the suspected file to Sally’s PC.

  1. Click the Metropolis Bank HQ site, and then click the PC Sally.
  2. Click the Desktop tab and then click Command Prompt.
  3. Connect to the Backup File server by entering ftp www.cisco2.corp in the command prompt.
  4. Enter the username of sally and a password of cisco123.
  5. At the ftp> prompt, enter the command dir to view the current files stored on the remote FTP server.
  6. Download the file that was found to have been tampered with in Part 3 Step 1.
  7. At the ftp> prompt, enter the command quit.
  8. At the PC> prompt, enter the command dir and verify the tampered client file is now on Sally’s PC for analysis at a later time.

Part 4: Verify the Integrity of Critical Files using HMAC

Step 1: Compute the HMAC of a critical file.

  1. Within the Metropolis Bank HQ site, click the PC Bob.
  2. Click the Desktop tab and then click Command Prompt.
  3. At the PC> prompt, enter the command dir and verify the critical file named income.txt is on Bob’s PC.
  4. Within the Desktop tab, click Text Editor.
  5. In the Text Editor window, click File > Open.
  6. Click the document income.txt and click OK.
  7. Copy the entire text document contents.
  8. Open a web browser on your personal computer and browse to the website http://www.freeformatter.com/hmac-generator.html
  9. Click the whitespace and paste in the text document contents. Enter the secret key of cisco123. Make sure the algorithm is set to SHA1. Click Compute HMAC.
    What is the computed HMAC for the contents of the file?____________________________________________________________________________________
    1b319bc7ba0adc63f2af2cafdc59f5279d46dd33
    How is using HMAC more secure than general hashing?____________________________________________________________________________________
    To produce a specific hash you need both the original message and a secret key.

Step 2: Verify the computed HMAC.

  1. Within the Metropolis Bank HQ site, click the PC Bob.
  2. Click the Desktop tab and then click Web Browser.
  3. Enter the URL https://www.cisco2.corp and click Go.
  4. Click on the link to view the most recent files and their hashes.
    Does the HMAC hash for the income.txt file match?_________________ Yes

Suggested Scoring Rubric

Activity SectionQuestion LocationPossible PointsEarned Points
Part 1: Download the client files to Mike’s PCStep 12
Part 2: Download the client files from the backup file server to Mike’s PCStep 12
Step 16
Part 3: Verify the integrity of the client files using hashingStep 15
Part 4: Verify the integrity of critical files using HMACStep 15
Step 15
Step 25
Questions30
Packet Tracer Score70
Total Score100