Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Lab : Network Based Evidence Analysis

This lab is intended to get you comfortable looking at network data in Wireshark and writing up what you find. The second part requires that you collect some of your own traffic and discuss the activity that you see.

In order to complete this lab, you will have to download Wireshark from wireshark.org. If you like, you are free to use any other packet capture tool, but the lecture provides guidance on how to use this tool to complete most parts of the lab.

In the first part of the lab you will have to download the twopcap files from Blackboard and address each of the questions below for the specific datasets. In part two, you are required to collect information from your own machine.

Please provide screenshots for your answers in part 2.

Part I: Analyzing PCAP files

1) hb.pcap

This packet capture is from the investigation of a machine (IP: 192.168.0.184) that is having slowness at startup and it is unknown what may be causing this slowness

• How many packets are there in the capture?

• What protocol is the most popular?

• When did the capture occur?

• Can we identify what the domain name that the computer is trying to connect to? What is the IP address for this domain?

2) fc.pcap

This packet capture is from the investigation of a server that has significant amounts of traffic directed at it at odd hours

• How many packets are there in the capture?

• What protocol is the most popular?

• When did the capture occur?

• What does this pcap represent?

• What username is attempting to login?

• Please identify at least fiveof the passwords that were attempted?

• Do you think that this activity should be alarming to a network administrator?

• What would be the next step if you were called in as part of an incident response team?

Part II: Collecting and analyzing your own traffic

Collect traffic using Wireshark for your computer for at least 60 minutes. This can be done by clicking on "Capture" and then "Start".

If you have multiple network interfaces, choose "interfaces" and choose the appropriate one. (If you have issues with this, please email me).

• Using summary and protocol hierarchy describe the traffic you collected

• How many packets did you collect?

• What are the top three protocols based on frequency?

• How long did the capture last?

• Using the "endpoints" feature discuss your traffic patterns

• Do you have any IPv6 traffic or is it all IPv4?

• If you have IPv6 traffic, what is the device that is using IPv6

• What is the distribution between TCP versus UDP packets?

• What is the most common endpoint IP?

• Does that IP resolve to a domain?

• Were you purposely doing something (surfing the web, checking email) or was this IP communicating in the background?

Attachment:- Data file.rar

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M93046940

Have any Question?


Related Questions in Management Information System

Apa format is required references should be listed

APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique refere ...

In class we have discussed web 20 web 30 cloud computing

In class, we have discussed Web 2.0, Web 3.0, Cloud Computing, Mobile Computing, and the Internet of Things. Select an example of one of these four topics (for example, Amazon Web Services or the smart home) and discuss ...

Many organizations have now adopted or begun to offer cloud

Many organizations have now adopted or begun to offer cloud computing. This type of computing has advantages and disadvantages that may vary from organization to organization. Select two (2) organizations in which you ar ...

Question you are in charge of creating a new security

Question : You are in charge of creating a new security awareness policy for your organization or an organization you are familiar with. You are also to create a plan for training on this policy in this same organization ...

Question suppose a computer using direct mapped cache has

Question : Suppose a computer using direct mapped cache has 2G Bytes of main memory and a cache of 512Blocks,where each cache Block has 8words,and word size is 2 Bytes a) How many blocks are in the main memory? b) What i ...

Security and privacy play an important role within an ea

Security and privacy play an important role within an EA program and its architecture. Please respond to the following in your own words: 1. What is your understanding of the role of security and privacy in the EA progra ...

Subject business continuity plan amp disaster recovery

Subject: Business continuity plan & disaster recovery plan What a journey! The last eight weeks was not only fast-paced but educational. We learned a tremendous amount of information about various business continuity and ...

Assignment 1resources chapter 11 in the spirit catches you

Assignment 1 Resources: chapter 11 in The Spirit Catches You and You Fall Down that discusses Hmong read the chapter in its entirety. Each team member should take notes and call out important details of Hmong history and ...

Project title security lapses and data breaches an

Project Title: "Security Lapses and Data Breaches: An Examination of the Failures to Protect Business Data and their Consequences" Instruction of creating the Background: Background information expands upon the key point ...

Assignment application perform data gathering and

Assignment Application: Perform Data Gathering and Footprinting on a Targeted Website You might be wondering how some hackers select their targets. Well, the answer is surprisingly simple-Internet research. The Internet ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As