Analysis of the packet details of the loaded pcap

Assignment Help Basic Computer Science
Reference no: EM133255474

PART 2 & PART 3: FILTERING, INSPECTING, AND ANALYZING THE PCAP FILE- Analysis of the Packet Details of the Loaded PCAP Files | Using the Statistics | Flow Graph Tool

  1. What is the BSSID of each device being used, and the MAC address of the WAP found? Remember that the BSSID is the MAC address of the device.   
  2. What is the name and vendor of the WAP found? What is/are the channel(s) being used in those cases? 
  3. Were any of these in the approved device whitelist? Note that those not on the list are unapproved devices on the network.
  4. By analyzing the packet details of the loaded PCAP file, determine the nature of communications occurring between the source and destination endpoints (or IP addresses). What differentiates the receiver and transmitter addresses from the source and destination addresses?
  5. Do you see any indication of any wireless vulnerabilities such as the use of default SSIDs and passwords and the security implications of the frame check sequence upon analyzing the WLAN traffic? Why or why not?
  6. Does the channel information match any device in the approved whitelist?  Does the source device, using this channel, match those in the approved whitelist? If not, then this is an unapproved device on the channel being used. 
  7. What devices do you suspect as rogue WAPs overall? Explain why.
  8. By analyzing the packet details of the loaded PCAP file, determine the nature of communications occurring between the source and destination endpoints (or IP addresses). 
  9. What useful information can you determine from the flow graph based on your analysis w.r.t. any IOC of the wireless/mobile communications?
  10. How is this indication different from the Statistics information retrieved earlier and from the perspective of this attack? Is there any Wireshark feature that can help you arrive at the same conclusion?
  11. If malicious actors got into your network to access your network security logs, how could they use the packet details to their advantage? Specifically, what utilities within Wireshark can you count on?
  12. Describe some automated tools and techniques that could be added to prevent similar events. Also, consider statements to add to the BYOD policy to strengthen compliance requirements.

Reference no: EM133255474

Questions Cloud

Job characteristics model does steven most likely value : Which part of the Job Characteristics Model does Steven most likely value?
Find a museum artifact depicting the myth itself : LITT 19798G Sheridan College Find a museum artifact (vase, jar, bowl, jewelry, ornament) depicting the myth itself, or showing a god, goddess or key figure
Grep command with yara signature search routines : Considering the pattern matching for regex2, why do you think the YARA program did not fire any alert?
Discuss in detail the tapestry weaving : Discuss in detail the Tapestry weaving from the series"Hunt of the Unicorn," known as the "Unicorn Found at the Fountain". How was it woven
Analysis of the packet details of the loaded pcap : What is the BSSID of each device being used, and the MAC address of the WAP found? Remember that the BSSID is the MAC address of the device.
Dawkins brings up concept of deception in animals : Dawkins brings up the concept of deception in animals and discusses the benefits to a species who could evolve to perform such behaviors.
What accounts for the appeal of christianity to some people : what accounts for the appeal of Christianity to some people of the ancient world? Remember that some rejected Jesus and others found him
Find an example where an es or ai system : Find an example where an ES or AI system was employed to support the BI needs of an organization (industry, government, etc.) Provide the URL to the source arti
Importance of encryption to information security : Consider the importance of encryption to information security. How has this week changed your perception on the topic?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd