What hostname was queried most often using dns in the pcap

Assignment Help Computer Engineering
Reference no: EM133337822

Question: Go to the pcaps directory on the SecurityOnion VM.

(a) Using tshark, find what hostnames were visited in the PCAP nitroba.pcap. Sort your output by the number of times that each was visited, largest number first.

(b) Using tshark, find what hostname was queried most often using DNS in the PCAP nuclear- exploit-kit.pcap. Show the top 5 results only.

(c) Using bro (zeek), find what hostname was queried most often using DNS in the PCAP nuclear- exploit-kit.pcap.
Show the top 5 results only.

(d) Using tshark, find how many times URLs containing the work 'photos' are visited in nitroba.pcap.

(e) Using tshark, find the top 10 IP addresses to which SYN packets were sent in the PCAP nuclear-exploit-kit-traffic.pcap.

These should not include SYN/ACK packets - SYN packets only.

Reference no: EM133337822

Questions Cloud

Perspective of israeli diplomat : From the perspective of an Israeli diplomat, which would be the most and least suitable of the listed organizations for serving as the mediator
How are secure software update, management : CSC 120 Hampton University How are secure software update, management of trusted applications, and attestation used to automate security assurance verification
History of criminal organizations : Compare, contrast, and analyze the organization, methods, and history of criminal organizations within at least two different nations.
What is the purpose of the first line of a script : CITA 170 SUNY Canton Can you name three popular compiled programming languages and What is the purpose of the first line of a script
What hostname was queried most often using dns in the pcap : CHE 212 The Bells University of Technology what hostname was queried most often using DNS in the PCAP nuclear- exploit-kit.pcap. Show the top 5 results only
Security issues regarding specified characteristic : Discuss how you can apply the McCumber Cube model to address security issues regarding the specified characteristic (utility) .
Hardening jump box : How should a jump box be configured? list of configurations that you would use to set up a jump box that had the fewest risks.
Discuss a possible security risk you see in each layer : ISSC 660 American Public University OSI model and each layer discuss a possible security risk you see in each layer. You will see a common theme by the end
Generate third-party certificates for ssl traffic : BIOD 702 George Mason University protected passwords should never be stored in plain text, but rather, using salted one-way cryptographic hashes of passwords

Reviews

Write a Review

Computer Engineering Questions & Answers

  Design traffic light controller as a digital controller

In this assignment, you are asked to design, implement and demonstrate the Traffic Light Controller as a Digital controller as hardware (using remote lab or DSX kit).

  IS5101 Data Warehouse and Architecture Assignment

IS5101 Data Warehouse and Architecture Assignment Help and Solution, Kristiania University College - Assessment Writing Service

  Explain the different ways a web-based application

Explain the different ways a web-based application could authenticate against a company that uses Active Directory as its identity provider.

  Calculate the predictions and accuracy function

For 0,1 and 3,5 cases, explain if you observe any difference you in accuracy. Also, explain why do you think this difference might be.

  Describing the purpose of a browser

Use the information in the video and this week's in-class presentation to write a 250-300 word short essay describing the purpose of a browser, browser wars.

  Defining and understanding the elements of a group culture

defining and understanding the elements of a group culture is essential to forging a professional identity either

  Implement an efficient algorithm

Your program will take as input a file with edge information. Each line in the file contains from, to and weight. You may assume the vertices are numbered .

  Create a function to play your schools fight song using midi

Create a function to play your school's fight song using MIDI. Take any one of those songs and translate it into MIDI notes, and write a function to play it.

  Identify specific manufacture and model of one magnetic disk

identify the specific manufacture and model of one magnetic disk, one solid state drive, and one optical drive. Evaluate the quality of each in terms of read and write speeds, access methods, storage capacity, longevity, and price.

  What is the difference between a sequential control

post a 200 to 300-word response to the following questionwhat is the difference between a sequential control structure

  Disadvantages of using each method

The first process is to create slides from scratch. This means starting each slide as a blank slide; inserting text boxes and formatted text; and then adding bullets and numbering, colors, clip art, charts, and graphics you might want to use.

  Define the human elements in it strategy

The success factors for your organization's information technology (IT) were identified in the previous assignment. Now, you can turn your attention.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd