Need help with your Discussion

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

glass
pen
clip
papers
heaphones

Kennesaw State University Cyber Security Lab Report

Kennesaw State University Cyber Security Lab Report

Kennesaw State University Cyber Security Lab Report

Description

Description: This lab requires that you do some “hands-on” research regarding the protocols used in the Wireshark captures provided to determine what is happening in the capture. For IT pros, research means going on the web and doing searches to determine how to use IT tools, such as Wireshark. Keep in mind that research and documentation is a big part of what you will do in the real world in your career. You will have to explain to others your findings and propose solutions. “Hands on” means usingyour brain, too! You may collaborate with other students in your class if you like, just make sure to turn in your own work.

Use the capture files “Project Wireshark PCAP Files” in the Lab#5 Module in D2L (you will have to unzip the zip files to extract the individual capture files) to answer the following questions:

Part I – HTTP

  1. Review the first capture file (Project Part I-a) and determine what is happening with the HTTPtraffic.
    1. Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture)
    2. Take a screenshot of the actual packets within the capture file that you observed this behavior.
  2. Review the second capture file (Project Part I-b) and determine what is happening with the HTTP traffic in this capture.

c. How is the traffic different from the first capture? Describe the traffic: what packets are

involved and what is happening? (include source, destination, time of capture)
a. Take a screenshot of the actual packets within the capture file that you observed.

Part II – PPP

  1. Review the third capture file (Project Part II-a) and determine what is happening with the PPP traffic in this capture.
    1. Research one of the protocols relating to PPP and describe it here.
    2. Describe the traffic: what packets are involved and what is happening? (include source,destination, time of capture)
    3. Take a screenshot of the actual packets within the capture file that you observed thisbehavior.
  2. Review the third capture file (Project Part II-b) and determine what is happening with the PPPtraffic that you are investigating in this capture. What else is involved?

a. Research one of the protocols relating to PPP and describe it here.

  1. Describe the traffic: what packets are involved and what is happening? (include source,destination, time of capture)
  2. Take a screenshot of the actual packets within the capture file that you observed thisbehavior.

page1image3331904 page1image3328064 page1image3331136

5. Review the third capture file (Project Part II-c) and determine what is happening with the PPP traffic in this capture. What else is involved?
a. Research one of the protocols relating to PPP and describe it here.

  1. Describe the traffic: what packets are involved and what is happening? (include source,destination, time of capture)
  2. Take a screenshot of the actual packets within the capture file that you observed thisbehavior.

Part III – 802.11

  1. Review the first capture file (Nokia) and determine what is happening with the 802.11 traffic.Hint: use the Analyze/Conversation Filter
    1. Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture)
    2. Take a screenshot of the actual packets within the capture file that you observed this behavior.
  2. Review the second capture file (wpa) and determine what is happening with the WPA traffic in this capture. (password is “Induction”). Hint: Use Edit->preferences, Protocol IEEE 802.11, decryption with “Induction”); Look at the packets prior to and after decryption. Use this https://wiki.wireshark.org/HowToDecrypt802.11 . You are STILL required to answer the following questions in your own words and provide a screenshot!

f. What do you different once you have decrypted the packets? What is decrypted and what is happening? (include source, destination, time of capture)

h. Take a screenshot of the actual packets within the capture file that you observed.

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

We Can Write It for You! Enjoy 20% OFF on This Order. Use Code SAVE20

Stuck with your Assignment?

Enjoy 20% OFF Today
Use code SAVE20