Preview

Transmission Control Protocol and Protocol Capture

Satisfactory Essays
Open Document
Open Document
338 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Transmission Control Protocol and Protocol Capture
Assessment Worksheet

113

LAB #7 – ASSESSMENT WORKSHEET

Conduct a Network Traffic Analysis and Baseline Definition
Course Name and Number:
Student Name:
Instructor Name:
Lab Due Date:

Overview
In this lab, you created and captured traffic from the machines in this lab using tcpdump, a command line packet analyzer, and the Wireshark protocol capture and analyzer tool. You opened Telnet and SSH sessions and used FileZilla and the Tftpd32 application to transfer files between the virtual machines. You used
NetWitness Investigator, a free tool that provides security practitioners with a means of analyzing packets to view the data captured using Wireshark.

Lab Assessment Questions & Answers
1. Which tool is better at performing protocol captures and which tool is better at performing protocol

analysis?

7
Conduct a Network Traffic Analysis and Baseline Definition

9781284037548_LB07_Printer.indd 113

22/05/13 2:43 PM

114

Lab #7 | Conduct a Network Traffic Analysis and Baseline Definition 2.
What is the significance of the TCP three-way handshake for applications that utilize TCP as a transport

protocol? Which application in your protocol capture uses TCP as a transport protocol?

3.
How many different source IP host addresses did you capture in your protocol capture?

4.
How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What

function in Wireshark provides you with a breakdown of the different protocol types on the LAN segment? 5.
Can Wireshark provide you with network traffic packet size counts? How and where? Are you able to

distinguish how many of each packet size was transmitted on your LAN segment? Why is this important to know?

9781284037548_LB07_Printer.indd 114

22/05/13 2:43 PM

Assessment Worksheet

115

6.
Why is it important to use protocol capture tools and protocol analyzers as an information systems

security

You May Also Find These Documents Helpful

  • Powerful Essays

    Iperf is a tool to measure maximum TCP bandwidth, allowing the tuning of various parameters and UDP characteristics. Iperf reports bandwidth, delay jitter, datagram loss.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    Investigator provides security operations staff, auditors, and fraud and forensics investigators the power to perform unprecedented free-form contextual analysis of raw network data captured and reconstructed…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1120 Lab 3

    • 115 Words
    • 1 Page

    2. You can see what kind the time the IP address the destination the protocol and the length of the packet.…

    • 115 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    In order to do so, the packet analyzer must “understand” the structure of all messages exchanged by protocols. For example, suppose we are interested in displaying the various fields in messages exchanged by the HTTP protocol in Figure 1. The packet analyzer understands the format of Ethernet frames, and so can identify the IP datagram within an Ethernet frame. It also understands the IP datagram format, so that it can extract the TCP segment within the IP datagram. Finally, it understands the TCP segment structure, so it can extract the HTTP message contained in the TCP segment. Finally, it understands the HTTP protocol and so, for example, knows that the first bytes of an HTTP message will contain the string “GET,” “POST,” or “HEAD,” as shown in Figure 2.8 in the…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    100 NT2580 Lab01 Final

    • 287 Words
    • 2 Pages

    connect to a Linux machine and ran several Cisco commands to display statistics for the network…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    4. List any two (2) other protocols observed within the wireshark capture and their purposes?…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NET310 ILab5

    • 304 Words
    • 1 Page

    2. What is seen in each of the three panes that display the packets seen on a local area…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Packet sniffing is a type of attack in which the attacker uses the collection of network messages as it is traveling from the user to the server in order to divulge…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    State the source MAC and IP addresses as well as destination MAC and IP addresses for a packet going from the client to the cache…

    • 2570 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    Week 6 Lab

    • 313 Words
    • 2 Pages

    * Under Object Statistics, select Group A WAP / Data Traffic Recvd (bits/sec) and Group B WAP / Data Traffic Recvd (bits/sec). Change the presentation style to Overlaid Statistics. Use <Alt><PrtSc> to this DES Graphs window (as shown below) and paste it into your lab document.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    (TCO 5) Which AAA server protocol is best suited to produce detailed accounting reports of network activity?…

    • 282 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Web Server Administration

    • 2959 Words
    • 12 Pages

    I will begin with a quick refresher on the protocols used and existing implementations, and then delve into our design and implementation, finishing with some conclusions.…

    • 2959 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Ipt Communications Notes

    • 6283 Words
    • 26 Pages

    * Handshaking is used to establish which protocols to use. Handshaking controls the flow of data between computers…

    • 6283 Words
    • 26 Pages
    Good Essays