Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

You are analyzing PCAP files in Wireshark, and you notice a Source and Destination P address of the following: Keep in the mind, the 10.168

image text in transcribed
You are analyzing PCAP files in Wireshark, and you notice a Source and Destination P address of the following: Keep in the mind, the 10.168 network is an internal IP Address in your corporate environment, but the other IP address is unknown. As the network administrator, you were not notified of any external communications that may have warranted this transmission at that time of day Destination 10.168.1.2:23 -Source-23.54.1.2 42012 Time-0200 UTC Destination-10.168.1.2:20-Source-23.54.1.2:42013 Time 0201 UTC Destination -10.168.1.2:21 Source-23.54.1.2:42014 Time -0205 UTC Destination 10.168.1.2:389-Source-23.541.2:42015 Time 0230 UTC In a short 2-3 paragraphs, what is going on in this scenario in terms of a potential Incident. You will need to identify the potential victim IP address. What protocols are being used based on the provided information

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Practical Database Programming With Visual C# .NET

Authors: Ying Bai

1st Edition

0470467274, 978-0470467275

More Books

Students also viewed these Databases questions