Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Here is a description on how to answer the questions.... Some activity is abnormal, some is normal, and some is mixture of both. If it's
Here is a description on how to answer the questions....
Some activity is abnormal, some is normal, and some is mixture of both. If it's normal network traffic without anything suspicious, don't overthink it; report on why it's normal and move on If you can't ascertain whether or not it's abnormal, tell me why and move on There are examples of both of those situations in the packet capture.
Good description vs poor description
Poor:
IP xxxxxxxxxxxx is accessing port over TCP on IP xxxxxxxx
While this is a fact, it's not useful information as it missing the description which makes it relevant to what's going on
Good:
IP xxxxxxxxxxxx is attempting to connect to port on IP xxxxxxxxxxxx Port is ftp which sends credentials in the clear. The series of packet captures shows that the intruder was attempting to guess passwords for user "sumowrestler". The intruder was eventually successful after the th try. The passwords guessed were "password", "sumo", "wrestler", "beatles" and "sumo the latter of which allowed the intruder to gain access to the computer.
Is the activity occurring in packets abnormal? If so provide a detailed interpretation of what is occurring, and the possible uses of the information gained. If theres nothing suspicious, tell me so and explain why its normal traffic.
Is the activity occurring in packets abnormal? If so provide a detailed interpretation of what is occurring, and the possible uses of the information gained.
Is the activity occurring in packets abnormal? If so provide a detailed interpretation of what is occurring, and the possible consequences.
Is the activity occurring in packets abnormal? If so provide a detailed interpretation of what is occurring, and the possible consequences such as how many ports are involved and their associated services. What information would be gained and how could it be used by an attacker?
Is the activity occurring in packets abnormal? Hint: this is a TCP stream so you can select the first packet RightClick "Follow TCP Stream" or Follow TCP Stream depending on your version and Wireshark will extract those packets in to a single readable stream. Provide a detailed description and interpretation of what is occurring along with possible consequences. There is a lot going on there; tell me what happened.
Is the activity occurring in packets abnormal? If so provide a detailed interpretation of what is occurring. This may require a light Googling. Hint: This is also a TCP Stream; see above.
Is the activity occurring in packets abnormal? If so provide a detailed interpretation of what is occurring, and the possible uses of the information gained. Hint: You guessed it also a TCP Stream.
Is the activity occurring in packets through the end of the packet capture abnormal? If so provide a detailed interpretation of what is occurring, and the possible uses of the information gained.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started