Practical cryptanalytic attacks on 3DES

Write 400–600 words that respond to the following questions:

Explain with example the practical cryptanalytic attacks on 3DES.
Is it possible to convert a block cipher into a stream cipher using cipher feedback, output feedback and

counter modes? If yes, how. If not, why not?