preview

Hackers: Transmission Control Protocol and Protocol Capture Essay

Better Essays

Week 4 Lab Part 1: Network Traffic Analysis and Baseline Definition & Secure WLAN Solution Part A Assignment Requirements Watch the Demo Lab in Learning Space Unit 7 and then answer questions 1-10 below. 1. Which tool is better at performing protocol captures and which tool is better at performing protocol analysis? The best tool for protocol captures is Wireshark. The best tool for protocol analysis is Netwitness. 2. What is promiscuous mode and how does this allow tcpdump, Wireshark, and Netwitness Investigator to perform protocol capture off a live network? …show more content…

They would want to see both internal and external LAN segments because they have to be able to implement solid security practices, perform in depth risk analysis, configure proper access rights and permissions, secure data, and recognize methods used to attack resources, perform security audits, and develop a BCP. Part B Assignment Requirements Answer the following questions based on the packet capture that precedes them. You may research any of these on the Internet if you need to do so. 15:40:19.571032 IP 192.168.2.62.44389 > 192.168.2.104.22: S 1273007928:1273007928(0) win 5840 <mss 1460, sackOK, timestamp 885 0, nop, wscale 6> 15:40:19.571720 IP 192.168.2.104.22 > 192.168.2.62.44389: S 1312754191:1312754191(0) ack 1273007929 win 5792 <mss 1460, sackOK, timestamp 107351 885, nop, wscale 6> 15:40:19.571812 IP 192.168.2.62.44389 > 192.168.2.104.22: . ack 1 win 92 <nop, nop,timestamp 886 107351> 15:40:19.604635 IP 192.168.2.104.22 > 192.168.2.62.44389: P 1:40(39) ack 1 win 91 <nop, nop, timestamp 107361 886> 15:40:19.611687 IP 192.168.2.62.44389 > 192.168.2.104.22: . ack 40 win 92 <nop,nop,timestamp 898 107361> 15:40:19.612844 IP 192.168.2.62.44389 > 192.168.2.104.22: P 1:40(39) ack 40 win 92 <nop, nop, timestamp 898

Get Access