Produce a pcap file from a wireshark capture, Computer Network Security

Assignment Help:

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the frames captured.

Before completing this task, you must:

1.    Have Wireshark installed on your personal desktop/laptop

2.    Have network (Internet) connectivity to your desktop/laptop

3.    Have completed the packet capture exercises in weeks 1 - 3

This activity cannot be completed on CQUNet connected labs.

Capture Requirements:

You are required to perform a capture of a web search.  In order to do this, you should:

1.    Begin the capture in Wireshark

2.    In your web browser (IE, Firefox, Safari etc.) go to:

3.    Enter your CQU email address in the Catalogue search box

4.    Hit Search

5.    Stop the capture in Wireshark


Related Discussions:- Produce a pcap file from a wireshark capture

Network security in an organisation, Network security is an issue for compa...

Network security is an issue for companies regardless of whether they participate in electronic commerce; however, since most organizations have a Web site that allows some interac

Explain what is a broadcast storm, QUESTION: (a) Ethernet has grown in ...

QUESTION: (a) Ethernet has grown in popularity in the recent years and is now used in LANs. Give three reasons for the success behind Ethernet. (b) Ethernet uses the CSMA/CD

Using Technology as Experience Framework, Write a two to three (2-3) page p...

Write a two to three (2-3) page paper in which you: Explain how the Web user interfaces help donors to make decisions. Relate the emotional thread demonstrated in the case study to

Star topology, In Star topology all computers are connected using a cen...

In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a

Cipher methods-cryptography, Cipher Methods There are 2 methods of encry...

Cipher Methods There are 2 methods of encrypting plaintext: • Bit stream method – every bit in the plaintext bit is transformed into a cipher bit one bit at a time. • Block cip

Short term scheduler, Short term Scheduler function , also shown as a disp...

Short term Scheduler function , also shown as a dispatcher runs most frequently, and creates the finest-grained decision of which program could run next. This scheduler is called

CRC, CRC in matlab

CRC in matlab

Explain quality management system, Question: Quality management standar...

Question: Quality management standards are seen as a major pillar supporting the drive for continuous quality improvement through TQM. (a) What do you meant by the term ‘Qua

Risk determination, Risk Determination For purpose of relative risk asse...

Risk Determination For purpose of relative risk assessment, risk equals probability of vulnerability occurrence TIMES value MINUS percentage risk already controlled PLUS an elem

Develop a preliminary simulation model, Question: (a) State the strong ...

Question: (a) State the strong law of large numbers. (b) Data have been collected on response times (in minutes) at a fire station. The data are 2:7 1:8 0:8 1:4 1:2 (i

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd