Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Packet (.pcap) files: https://drive.google.com/drive/folders/1-Zx34tyQ5bEZwMZn_t4LB8jOiXgDyowK?usp=sharing Open these .pcap files through Wireshark to access the data needed to correctly resolve this prompt. Please include screenshots of

Packet (.pcap) files: https://drive.google.com/drive/folders/1-Zx34tyQ5bEZwMZn_t4LB8jOiXgDyowK?usp=sharing 

 

Open these .pcap files through Wireshark to access the data needed to correctly resolve this prompt. Please include screenshots of where the information is found throughout Wireshark.

 

Packet Capture 1: File1.pcap: 

  • What are the sources of the traffic that you have identified in the capture (IP Addresses, MAC Addresses)?
  • What are the destinations of the traffic you have identified in the capture (IP Addresses, MAC Addresses)?
  • What was the timeframe in which the malicious network activity took place?
  • What type of traffic are you able to identify in the capture? Explain how you know this.
  • What is the purpose of the traffic you identified in the capture? Explain how you know this.
  • Is the traffic safe/normal or suspicious/malicious?
    • What makes you arrive at this conclusion? Be specific.
  • If this is malicious, what are the IP Addresses of the attacker and victim?
  • If there is an attack, what could be done in the future to protect against similar attacks to the network system?
  • What did you learn in your process of determining the signature of this packet capture?


 

Packet Capture 2: File2.pcap: 

  • What are the sources of the traffic that you have identified in the capture (IP Addresses, MAC Addresses)?
     
  • What are the destinations of the traffic you have identified in the capture (IP Addresses, MAC Addresses)?
     
  • What was the timeframe in which the incident took place?
  • What type of traffic are you able to identify in the capture? Explain how you know this.
  • What is the purpose of the traffic you identified in the capture? Explain how you know this.
  • Is the traffic safe/normal or suspicious/malicious?
    • What makes you arrive at this conclusion? Be specific.
  • If this is malicious, what are the IP Addresses of the attacker and victim?
  • If there is an attack, what could be done in the future to protect against similar attacks to the network system?
  • What did you learn in your process of determining the signature of this packet capture?


 

  • Packet Capture 3: File3.pcap:
    • What are the sources of the traffic that you have identified in the capture (IP Addresses, MAC Addresses)?
  • What are the destinations of the traffic you have identified in the capture (IP Addresses, MAC Addresses)?
  • What was the timeframe in which the incident took place?
  • What type of traffic are you able to identify in the capture? Explain how you know this.
  • What is the purpose of the traffic you identified in the capture? Explain how you know this.
  • Is the traffic safe/normal or suspicious/malicious?
    • What makes you arrive at this conclusion? Be specific.
  • If this is malicious, what are the IP Addresses of the attacker and victim?
  • If there is an attack, what could be done in the future to protect against similar attacks to the network system?
  • What did you learn in your process of determining the signature of this packet capture?

 

 

  • Packet Capture 4: File4.pcap:
    • What are the sources of the traffic that you have identified in the capture (IP Addresses, MAC Addresses)?
  • What are the destinations of the traffic you have identified in the capture (IP Addresses, MAC Addresses)?
  • What was the timeframe in which the incident took place?
  • What type of traffic are you able to identify in the capture? Explain how you know this.
  • What is the purpose of the traffic you identified in the capture? Explain how you know this.
  • Is the traffic safe/normal or suspicious/malicious?
    • What makes you arrive at this conclusion? Be specific.
  • If this is malicious, what are the IP Addresses of the attacker and victim?
  • If there is an attack, what could be done in the future to protect against similar attacks to the network system?
  • What did you learn in your process of determining the signature of this packet capture?


 

  • Packet Capture 5: File5.pcap:
    • What are the sources of the traffic that you have identified in the capture (IP Addresses, MAC Addresses)?
  • What are the destinations of the traffic you have identified in the capture (IP Addresses, MAC Addresses)?
  • What was the timeframe in which the incident took place?
  • What type of traffic are you able to identify in the capture? Explain how you know this.
  • What is the purpose of the traffic you identified in the capture? Explain how you know this.
  • Is the traffic safe/normal or suspicious/malicious?
    • What makes you arrive at this conclusion? Be specific.
  • If this is malicious, what are the IP Addresses of the attacker and victim?
  • If there is an attack, what could be done in the future to protect against similar attacks to the network system?
  • What did you learn in your process of determining the signature of this packet capture?

 

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Accounting Information Systems

Authors: George H. Bodnar, William S. Hopwood

11th Edition

0132871939, 978-0132871938

More Books

Students also viewed these Computer Network questions

Question

When do I give in to my bad habit?

Answered: 1 week ago