Preview

Hacking2E Lab07 AW

Satisfactory Essays
Open Document
Open Document
330 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Hacking2E Lab07 AW
Lab #7 – Assessment Worksheet
Analyzing Network Traffic to Create a Baseline Definition
Course Name and Number: _____________________________________________________
Student Name: ________________________________________________________________
Instructor Name: ______________________________________________________________
Lab Due Date: ________________________________________________________________
Overview
In this lab, you monitored the traffic on the virtual network, a key step in determining a network baseline. You used TCPdump, a command line packet analyzer, to capture HTTP traffic generated by the Damn Vulnerable Web Application (DVWA). You used Wireshark to capture traffic you generated with the available tools using Telnet, Secure Shell (SSH), File Transfer
Protocol (FTP), and Trivial FTP (TFTP) protocols over several machines in the network. Finally, you used NetWitness Investigator as to analyze the captured data.
Lab Assessment Questions & Answers
1. Both Wireshark and NetWitness Investigator can be used for packet capture and analysis. Which tool is preferred for each task, and why?

2. What is the significance of the TCP three-way handshake for applications that utilize TCP as transport protocol?

3. How many different source IP host address did you capture in your protocol capture?

4. How many different protocols did your protocol capture session have? What function in Wireshark provides you with a breakdown of the different protocol types on the LAN segment?

5. How and where can you find Wireshark network traffic packet size counts? Can you distinguish how many of each packet size was transmitted on your LAN segment? Why is this important?

2 | Lab #7 Analyzing Network Traffic to Create a Baseline Definition

6. Why is it important to use protocol capture tools and protocol analyzers as an information systems security professional?

7. What are some challenges to baseline analysis?

8. Why would an information systems security practitioner want

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt 2580 Project Part 2

    • 1249 Words
    • 5 Pages

    Bridges are networking devices that can connect 2 local area networks (LAN). A bridge can learn all of the MAC addresses on the network, and this is done during the bridges data gathering phase. Basically a bridge will receive the data and analyze the address. The bridge will then pass the data on to the correct address. The ports on a bridge are in and out, but they are smart ports with the ability to locate the address on the network.…

    • 1249 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    To establish a connection, TCP uses a three-way handshake. Before a client attempts to connect with a server, the server must first bind to and listen at a port to open it up for connections: this is called a passive open. Once the passive open is established, a client may initiate an active open. To establish a connection, the three-way (or 3-step) handshake occurs:…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    ISS Week 3 Vlab 1

    • 136 Words
    • 1 Page

    3. When the 172.16.8.5 IP host responded to the ICMP echo-request, how many echo-reply packets were sent back to the workstation?…

    • 136 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 458 Words
    • 2 Pages

    Identify the three IP address classes, the default subnet mask used with each, and the number of hosts for each.…

    • 458 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 5 Assignment 1

    • 1348 Words
    • 6 Pages

    4. The client accept the connection and send data to server and the server to replay the…

    • 1348 Words
    • 6 Pages
    Good Essays
  • Good Essays

    nt1210 unit 1 lab1

    • 1325 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1325 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Manages information-consistency capacities, i.e., gives a dependable byte stream between two nodes on a system. TCP and UDP exert at this particular level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    7. Find a TCP 3-way handshake for a TELNET session. What is the significance of the TCP 3-way handshake?…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Router Simulation

    • 331 Words
    • 2 Pages

    9. What numeric port range is commonly used by clients in a client -> server communication session? 0 to 1023…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT 1210, Unit 3 Homework

    • 1335 Words
    • 5 Pages

    5. Which of the following are true about the commonly used version of the TCP/IP model as shown in this chapter? (Choose two answers.)…

    • 1335 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    unit 2 labs

    • 465 Words
    • 2 Pages

    1. A network device is usually built in to the computer. A peripheral device is a device connected to the computer…

    • 465 Words
    • 2 Pages
    Good Essays
  • Good Essays

    ShortAnswer

    • 544 Words
    • 2 Pages

    NT1210: Introduction to Networking_V1.0 > Week 1 > Submit Short Answer Assessment > Short Answer…

    • 544 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    3. This tool uses the command-line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 251 Words
    • 2 Pages

    PuTTY to connect to a Linux machine and ran several Cisco commands to display statistics for…

    • 251 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Network Monitoring System

    • 3845 Words
    • 16 Pages

    In this information age the network is essential to the organization. Information and the rate at which it can be obtained and distributed, is key to the economic success of companies in the information age. This is the reason why the computer network is the central nervous system of most organizations today. Organizations must have a network that is available and reliable. Since networks consist of a complicated set of software and hardware components, reliability comes at the cost of redundancy, diligence, man power and management.…

    • 3845 Words
    • 16 Pages
    Powerful Essays