Popular protocol analyzer and packet sniffer

Assignment Help Other Subject
Reference no: EM133189211

ICT 202 Cyber Security - Introduction to Wireshark

Objective of this lab:
The basic purpose of this lab is to introduce you to Wireshark, a popular protocol analyzer and packet sniffer. By the end of this lab, you will be familiar to its environment and will be able to capture packets.

Instructions:

• Read carefully before starting the lab.
• These exercises are to be done individually.
• You are supposed to provide the answers to the questions listed at the end of this document

1. What is a Protocol Analyzer?
Taking Wireshark on a Test Run
The best way to learn about any new piece of software is to try it out! We'll assume that your computer is connected to the Internet via a wired Ethernet interface or a wireless 802.11 WiFi interface. Do the following:

1. Start up your favorite web browser, which will display your selected homepage.

2. Start up the Wireshark software. You will initially see a window similar to that shown in Figure 2. Wireshark has not yet begun capturing packets.

3. To begin packet capture, select the Capture pull down menu and select Interfaces. This will cause the "Wireshark: Capture Interfaces" window to be displayed (on a PC) or you can choose Options on a Mac. You should see a list of interfaces, as shown in Figures 4a (Windows) and 4b (Mac).

4. You'll see a list of the interfaces on your computer as well as a count of the packets that have been observed on that interface so far. On a Windows machine, click on Start for the interface on which you want to begin packet capture (in the case in Figure 4a, the Gigabit network Connection). On a Windows machine, select the interface and click Start on the bottom of the window). Packet capture will now begin - Wireshark is now capturing all packets being sent/received from/by your computer!

5. Once you begin packet capture, a window similar to that shown in Figure 3 will appear. This window shows the packets being captured. By selecting Capture pulldown menu and selecting Stop, or by click on the red Stop square, you can stop packet capture. But don't stop packet capture yet. Let's capture some interesting packets first. To do so, we'll need to generate some network traffic. Let's do so using a web browser, which will use the HTTP protocol that we will study in detail in class to download content from a website.

6. While Wireshark is running, enter the URL:

8. Type in "http" (without the quotes, and in lower case - all protocol names are in lower case in Wireshark) into the display filter specification window at the top of the main Wireshark window. Then select Apply (to the right of where you entered "http") or just hit return. This will cause only HTTP message to be displayed in the packet-listing window. Figure 5 below shows a screenshot after the http filter has been applied to the packet capture window shown earlier in Figure 3. Note also that in the Selected packet details window, we've chosen to show detailed content for the Hypertext Transfer Protocol application message that was found within the TCP segment, that was inside the IPv4 datagram that was inside the Ethernet II (WiFi) frame. Focusing on content at a specific message, segment, datagram and frame level lets us focus on just what we want to look at (in this case HTTP messages).

Answer the following Questions. You must provide a brief explanation and a screenshot of your work otherwise no marks will be given.

1. List 2 different protocols that appear in the protocol column in the unfiltered packet-listing window in step 7 above.

2. What is the Internet Protocol (IP) address of the destination server? What is the Internet Protocol (IP) address of your computer?

3. Is your browser running HTTP version 1.0 or 1.1?

4. What is the TCP port number used by your machine? What is the TCP port number used by the destination server?

Over Hyper Text Transfer Protocol (HTTP)

Your next task is to capture username and password that is entered on a website that uses HTTP. Remember that HTTP does not provide security and usernames and passwords are sent in cleartext (i.e., with no encryption). Follow the steps given below:

a. Start capturing packets with Wireshark and in your browser
b. Enter your first name as username and last name as password and then press login.

c. Stop packets capturing by Wireshark and search for HTTP Post method that contains the username and password that is sent by your browser. You have to submit the screenshot of that HTTP message.

Attachment:- Cyber Security.rar

Reference no: EM133189211

Questions Cloud

Etermining organization capability : How may Michael Porter's Value Chain concept be helpful in determining organization's capability and value focus to the customer?
Neutral and positive sentiment classification : If you were to train the feature learning models for negative, neutral and positive sentiment classification, what would it do to the results?
How would you use the utilitarianism approach : You work at a dialysis center where people with impaired kidney function come to use a dialysis machine to clean their blood as would their kidneys if they were
Compare and contrast job-order and process costing systems : The type of product a company produces affects the type of accounting system needed to determine product cost. The 2 most common types of costing systems are jo
Popular protocol analyzer and packet sniffer : Popular protocol analyzer and packet sniffer. By the end of this lab, you will be familiar to its environment and will be able to capture packets
Australian dairy processing industry so unattractive : In the HBS case, the a2 Milk Company, What makes the Australian dairy processing industry so unattractive?
Functions of the contract : Companies always face a dilemma when deciding whether to fulfill their own inputs or whether to ask other companies to meet their input needs.
What is the standard deviation : Assume that the values x below, represent data collected for a population. Calculate the summary statistics indicated below. You will fill in the blanks to SHOW
Case analysis of the carlson company : Case Analysis of The Carlson Company and Protecting Children in the Global Tourism Industry

Reviews

Write a Review

Other Subject Questions & Answers

  Refuse to administer the medication to the patient

Refuse to administer the medication to the patient. Inject the Haldol into the patient's juice and encourage her to drink it.

  Enterprise risk management is most effective

Select the option which best completes this statement: Enterprise Risk Management is most effective when it is a(n) process

  What lessened letter was the fact that i was new in position

What lessened the letter was the fact that I was new in the position, but I failed to give a clear explanation why we went with the other applicant.

  Unit 19 Data Structures and Algorithms Assignment

Unit 19 Data Structures and Algorithms Assignment Help and Solution - Higher National Certificate/Diploma in Computing - Assessment Writing Service

  Civil liability-tort liability and vicarious liability

Explain the differences between general civil liability, tort liability, and vicarious liability, to include the potential civil and criminal ramifications

  Claim that african americans feel like strangers

Provide your explanation(s) for Du Bois' claim that African Americans feel like strangers in their own home and body in the USA.

  Why the leaders character is important to the organization

This week's readings focused on the Leader's Character. In 500 words (2 pages), explain why the leader's character is important to the organization.

  Write a short paragraph about given readings

Write a short paragraph about this reading what is common things and difffereces.

  Analyze the visual image and people in the music video

Analyze the visual image and people in the music video. Describe what messages the images and people convey towards societal topics and societal groups.

  What is the importance of dissenting opinions

How can it be that a group of intelligent, experienced researchers would not explore the possibility of another theory in their study?

  What are the benefits you see in using such a process

For this discussion, use the two frameworks presented in this unit's studies and construct a stakeholder analysis for a current or proposed change initiative.

  Describe the unique system of health care delivery

The United States has a unique system of health care delivery which has evolved over time. Although the U.S. health care delivery system has evolved.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd