Preview

Transmission Control Protocol and Protocol Capture

Satisfactory Essays
Open Document
Open Document
338 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Transmission Control Protocol and Protocol Capture
Assessment Worksheet

113

LAB #7 – ASSESSMENT WORKSHEET

Conduct a Network Traffic Analysis and Baseline Definition
Course Name and Number:
Student Name:
Instructor Name:
Lab Due Date:

Overview
In this lab, you created and captured traffic from the machines in this lab using tcpdump, a command line packet analyzer, and the Wireshark protocol capture and analyzer tool. You opened Telnet and SSH sessions and used FileZilla and the Tftpd32 application to transfer files between the virtual machines. You used
NetWitness Investigator, a free tool that provides security practitioners with a means of analyzing packets to view the data captured using Wireshark.

Lab Assessment Questions & Answers
1. Which tool is better at performing protocol captures and which tool is better at performing protocol

analysis?

7
Conduct a Network Traffic Analysis and Baseline Definition

9781284037548_LB07_Printer.indd 113

22/05/13 2:43 PM

114

Lab #7 | Conduct a Network Traffic Analysis and Baseline Definition 2.
What is the significance of the TCP three-way handshake for applications that utilize TCP as a transport

protocol? Which application in your protocol capture uses TCP as a transport protocol?

3.
How many different source IP host addresses did you capture in your protocol capture?

4.
How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What

function in Wireshark provides you with a breakdown of the different protocol types on the LAN segment? 5.
Can Wireshark provide you with network traffic packet size counts? How and where? Are you able to

distinguish how many of each packet size was transmitted on your LAN segment? Why is this important to know?

9781284037548_LB07_Printer.indd 114

22/05/13 2:43 PM

Assessment Worksheet

115

6.
Why is it important to use protocol capture tools and protocol analyzers as an information systems

security

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Capture the HTTP frame. Answer all of the questions found below based on the details of your captured HTTP frame.…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    NT1120 Lab 3

    • 115 Words
    • 1 Page

    2. You can see what kind the time the IP address the destination the protocol and the length of the packet.…

    • 115 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Use the DETER Visualization tab to show the network and use arp and ifconfig commands to detect MAC and IP addresses for each machine.…

    • 2570 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Copy and paste the following screenshots from your Using Show Commands to Investigate Network Status lab.…

    • 1117 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    In order to do so, the packet analyzer must “understand” the structure of all messages exchanged by protocols. For example, suppose we are interested in displaying the various fields in messages exchanged by the HTTP protocol in Figure 1. The packet analyzer understands the format of Ethernet frames, and so can identify the IP datagram within an Ethernet frame. It also understands the IP datagram format, so that it can extract the TCP segment within the IP datagram. Finally, it understands the TCP segment structure, so it can extract the HTTP message contained in the TCP segment. Finally, it understands the HTTP protocol and so, for example, knows that the first bytes of an HTTP message will contain the string “GET,” “POST,” or “HEAD,” as shown in Figure 2.8 in the…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    4. List any two (2) other protocols observed within the wireshark capture and their purposes?…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nmap ("Network Mapper") is a free and open source utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets to determine what hosts are available on the network, what services those hosts are offering, what operating systems they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, and also works against single hosts. Nmap runs on all major computer operating systems, Linux, Windows, and Mac OS…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Lab 12

    • 3059 Words
    • 13 Pages

    In this lab you will use the Wireshark packet analyzer to capture and display the control information and data stored in packets transmitted over a network. Wireshark collects network traffic data and creates files that display packet header information in a layered format like that used by the Internet model. These layers can be expanded to view details that may prove helpful in determining the source of problems that your network might be experiencing. Creating filters that hide unwanted data and facilitate data analysis will also be discussed in this lab.…

    • 3059 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Packet sniffing is a type of attack in which the attacker uses the collection of network messages as it is traveling from the user to the server in order to divulge…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 6 Lab

    • 313 Words
    • 2 Pages

    * Under Object Statistics, select Group A WAP / Data Traffic Recvd (bits/sec) and Group B WAP / Data Traffic Recvd (bits/sec). Change the presentation style to Overlaid Statistics. Use <Alt><PrtSc> to this DES Graphs window (as shown below) and paste it into your lab document.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    (TCO 5) Which AAA server protocol is best suited to produce detailed accounting reports of network activity?…

    • 282 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Web Server Administration

    • 2959 Words
    • 12 Pages

    I will begin with a quick refresher on the protocols used and existing implementations, and then delve into our design and implementation, finishing with some conclusions.…

    • 2959 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Ipt Communications Notes

    • 6283 Words
    • 26 Pages

    * Handshaking is used to establish which protocols to use. Handshaking controls the flow of data between computers…

    • 6283 Words
    • 26 Pages
    Good Essays