Analysis of the packet details of the loaded pcap

Assignment Help Basic Computer Science
Reference no: EM133255474

PART 2 & PART 3: FILTERING, INSPECTING, AND ANALYZING THE PCAP FILE- Analysis of the Packet Details of the Loaded PCAP Files | Using the Statistics | Flow Graph Tool

  1. What is the BSSID of each device being used, and the MAC address of the WAP found? Remember that the BSSID is the MAC address of the device.   
  2. What is the name and vendor of the WAP found? What is/are the channel(s) being used in those cases? 
  3. Were any of these in the approved device whitelist? Note that those not on the list are unapproved devices on the network.
  4. By analyzing the packet details of the loaded PCAP file, determine the nature of communications occurring between the source and destination endpoints (or IP addresses). What differentiates the receiver and transmitter addresses from the source and destination addresses?
  5. Do you see any indication of any wireless vulnerabilities such as the use of default SSIDs and passwords and the security implications of the frame check sequence upon analyzing the WLAN traffic? Why or why not?
  6. Does the channel information match any device in the approved whitelist?  Does the source device, using this channel, match those in the approved whitelist? If not, then this is an unapproved device on the channel being used. 
  7. What devices do you suspect as rogue WAPs overall? Explain why.
  8. By analyzing the packet details of the loaded PCAP file, determine the nature of communications occurring between the source and destination endpoints (or IP addresses). 
  9. What useful information can you determine from the flow graph based on your analysis w.r.t. any IOC of the wireless/mobile communications?
  10. How is this indication different from the Statistics information retrieved earlier and from the perspective of this attack? Is there any Wireshark feature that can help you arrive at the same conclusion?
  11. If malicious actors got into your network to access your network security logs, how could they use the packet details to their advantage? Specifically, what utilities within Wireshark can you count on?
  12. Describe some automated tools and techniques that could be added to prevent similar events. Also, consider statements to add to the BYOD policy to strengthen compliance requirements.

Reference no: EM133255474

Questions Cloud

Job characteristics model does steven most likely value : Which part of the Job Characteristics Model does Steven most likely value?
Find a museum artifact depicting the myth itself : LITT 19798G Sheridan College Find a museum artifact (vase, jar, bowl, jewelry, ornament) depicting the myth itself, or showing a god, goddess or key figure
Grep command with yara signature search routines : Considering the pattern matching for regex2, why do you think the YARA program did not fire any alert?
Discuss in detail the tapestry weaving : Discuss in detail the Tapestry weaving from the series"Hunt of the Unicorn," known as the "Unicorn Found at the Fountain". How was it woven
Analysis of the packet details of the loaded pcap : What is the BSSID of each device being used, and the MAC address of the WAP found? Remember that the BSSID is the MAC address of the device.
Dawkins brings up concept of deception in animals : Dawkins brings up the concept of deception in animals and discusses the benefits to a species who could evolve to perform such behaviors.
What accounts for the appeal of christianity to some people : what accounts for the appeal of Christianity to some people of the ancient world? Remember that some rejected Jesus and others found him
Find an example where an es or ai system : Find an example where an ES or AI system was employed to support the BI needs of an organization (industry, government, etc.) Provide the URL to the source arti
Importance of encryption to information security : Consider the importance of encryption to information security. How has this week changed your perception on the topic?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Network penetration testing techniques

Do a bit of research on penetration testing techniques. Possible negative implications of penetration testing.

  Notice that multiple people have added files

After configuring the share, you notice that multiple people have added files to it. What is the problem and how should you address it?

  Write an efficient algorithm for combining two heaps

Write an efficient algorithm for combining two heaps, one with size n and the other with size 1. What is the Big Oh performance of your algorithm?

  Percent market value of equity for firm

What is the percent market value of equity for this firm? (Answer to the nearest hundredth of a percent, but do not use a percent sign).

  Determining the optimal strategy

If Mary uses an optimal strategy, then she will determine the answer at the end of exactly how many questions in the worst case?

  Sketch the indifference curves of two individuals

The New and Improved Health Insurance plan picks up 70% of annual medical costs over and above $200 (called the "deductible")

  Distinctions of research questions

What are some distinctions of research questions that are posed for qualitative research methods?

  How breaking the traditional raid concepts helps

Discuss how breaking the traditional RAID concepts helps Big Data deal with ever-growing needs of a storage system.

  Define a class octagon to be a regular octagon

Define a class Octagon to be a regular octagon. Write a test that exercises all of its functions (as defined by you or inherited from Shape).

  What are the proceeds after converting to swiss francs

What are the proceeds after converting to Swiss francs? (Don't round intermediate calculations. Round your final answer to nearest Swiss franc)

  Subroutines in assembly language programming

Discuss the use of the stack when using subroutines in Assembly Language programming. Make sure to reference the stack pointer and the struction pointer.

  Poor security implementation

The relationship between poor security implementation and policy to decreased levels of integrity and confidentiality.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd