Preview

Hackers: Transmission Control Protocol and Protocol Capture

Powerful Essays
Open Document
Open Document
2612 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hackers: Transmission Control Protocol and Protocol Capture
Week 4 Lab Part 1: Network Traffic Analysis and Baseline Definition & Secure WLAN Solution

Part A Assignment Requirements

Watch the Demo Lab in Learning Space Unit 7 and then answer questions 1-10 below.

1. Which tool is better at performing protocol captures and which tool is better at performing protocol analysis? The best tool for protocol captures is Wireshark. The best tool for protocol analysis is Netwitness. 2. What is promiscuous mode and how does this allow tcpdump, Wireshark, and Netwitness Investigator to perform protocol capture off a live network? Promiscuous mode causes the controller to pass all traffic it receives to the CPU rather than passing only the frames that the controller is intended to receive. It allows them to perform protocol captures because it is using the network traffic from the system network.

3. What is the significance of the TCP, 3-Way Handshake for applications that utilize TCP as a transport protocol? Which application in your protocol capture uses TCP as a transport protocol? The significance of the TCP 3-way handshake is that it is required for both the server and the client to setup initial sequence numbers and ensure that they both understand each other. The protocol that uses TCP as a transport protocol is Wireshark.

4. How many different source IP host addresses did you capture in your protocol capture? I captured 14 different IP addresses in my protocol capture.

5. How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What function in Wireshark

You May Also Find These Documents Helpful

  • Powerful Essays

    In the Screenshot above, cdn2 has a different IP (54.230.2.234) in one case and cdn0 also has a different IP (54.230.3.190) for three different objects. o Now, because we parse har file w.r.t host name and pcap w.r.t IP, all three of cdn0, cdn2, cdn3 have same TCP connections in the table as they have same IPs. o Better way to read this would be to consider only non-zero download size connections for each of these three domains. Haven’t implemented it to avoid irregularity in the table.…

    • 2486 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    To establish a connection, TCP uses a three-way handshake. Before a client attempts to connect with a server, the server must first bind to and listen at a port to open it up for connections: this is called a passive open. Once the passive open is established, a client may initiate an active open. To establish a connection, the three-way (or 3-step) handshake occurs:…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    The 3 components of the 3-way handshake are SYN-SYN-ACK. There are 3 messages transmitted by TCP to negotiate and start a TCP session between the two computers. This is designed so that two computers attempting to communicate can negotiate the parameters of…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    7) How does Nessus differ from ZeNmap GUI and which tool would you use for network discovery and inventory versus identifying software vulnerabilities?…

    • 486 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    NT1210Unit3Lab3

    • 1288 Words
    • 4 Pages

    Exercise 3.3.2 Identify the layer in which each protocol resides according to the TCP/IP model. Using figure 3.4 from the Lab manual,…

    • 1288 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 458 Words
    • 2 Pages

    Identify the three IP address classes, the default subnet mask used with each, and the number of hosts for each.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Manages information-consistency capacities, i.e., gives a dependable byte stream between two nodes on a system. TCP and UDP exert at this particular level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NETW204 Week 4 iLab

    • 616 Words
    • 3 Pages

    Task 6, Step 6: Paste a screenshot of the results from the ping commands. (1 point)…

    • 616 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 4 Assignment

    • 1851 Words
    • 8 Pages

    RESEARCH MAN-IN-THE MIDDLE ATTACKS IN ETHERNET WIFI. DESCRIBE HOW THEY ARE IMPLEMENTED AND HOW THEY CAN BE PREVENTED.…

    • 1851 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    A 3-way handshake allows a connection to be created between a client and server. The client sends a SYN requesting a connection to the server, then the server sends a SYN-ACK back to acknowledge the request, then the client send an ACK to acknowledge the connection to the server.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Wireshark provides detailed information about network traffic down to the packet level. However, many are…

    • 424 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NET310 ILab5

    • 304 Words
    • 1 Page

    2. What is seen in each of the three panes that display the packets seen on a local area…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    State the source MAC and IP addresses as well as destination MAC and IP addresses for a packet going from the client to the cache…

    • 2570 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    3. This tool uses the command-line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Capsa Vs Wireshark

    • 1241 Words
    • 5 Pages

    Some users that do not have much experience might prefer Capsa over Wireshark due to all the capability through display. Capsa is easier to read and has much more options for visual aids unlike Wireshark. On the other hand if the user has some experience with networking they might prefer Wireshark due to the fact that it can support more protocols over Capsa and also that Wireshark is much cheaper than Capsa. Therefore witch ever tool the users are using there will be pros and cons but both of the tools are packet sniffing tool. With these tools the analysis can determine weather the network traffic are from the enemy or not. Each tools has it own use, if the user has the capability, one should never restrict themselves with just one tool and expand their mind and…

    • 1241 Words
    • 5 Pages
    Good Essays