subject

Wireshark is an open sourcenetwork packet/protocol analyzer. A network packet analyzer captures network packets and tries to display that packet data asdetailed as possible. Wireshark is perhaps one of the best open source packet analyzers available today for UNIX and Windows. Wireshark isn'tan intrusion detection system. Wireshark will not manipulate data on the network. Legitimate Uses of Wireshark:• Network administrators use it to troubleshoot network problems• Network security engineers use it to examine security problems• Developers use it to debug protocol implementations• People use it to learn network protocol internalsResources • The wireshark main page • Some sample captures to work with • The user’s guide PDF 2 Assignment 2.0.1 Part 1 Watch the ∼11 minute Hands on with Wireshark video that you will find in the Learn Wireshark section on the Wireshark main page. 2.0.2 Part 2 1. Download and install Wireshark (Windows, Mac, or Linux) from the Wireshark website shown above. 2. Capture data from an interface in your computer (e. g., Ethernet or WiFi) • Remember to set the encryption if required • Store the captured data 3. Store the captured data in a file named . • Break the captured files each 10 seconds and record during 30 seconds (you should end up with 3 files, each with the name above plus timestamp information) • Make sure all name resolution options are unchecked. 2.0.3 Part 3 1. Load the LabAssignment1.pcapng. gz file into Wireshark 2. What are the two IP addresses of the computers in the HTTP session? 3. Use Wireshark’s data window to examine the XML data • Using the Go menu, go to packet 520 • Use the HTTP view to examine the captured XML data in the packet 4. Answer the following questions: a) What is Dish DSS25 tracking? b) What is the antenna’s azimuth angle? c) What is the antenna’s elevation angle? d) What is the antenna’s wind speed? e) What is the downsignal power? CIS3360 Lab 1 2 2.1 Submission Submit a zip file with the three captured files and a report document containing the following: 1. Your name - please make sure your name is on every page submitted. 2. A description of what features of Wireshark you tried, including Part 2 and Part 3, and your observations and impressions of the tool. 3. A screenshot with your capturing settings (Part 2) 4. The name of your computer’s network interface that you used for captures (Part 2) 5. The two IP addresses on (Part 3) 6. The answers to the questions derived from data in Packet 520 below (Part 3) a) What is Dish DSS25 tracking? b) What is the antenna’s azimuth angle? c) What is the antenna’s elevation angle? d) What is the antenna’s wind speed? e) What is the downsignal power?

ansver
Answers: 3

Another question on Computers and Technology

question
Computers and Technology, 22.06.2019 19:10
10. when you create a pivottable, you need to specify where to find the data for the pivottable. is it true
Answers: 2
question
Computers and Technology, 22.06.2019 23:00
Which factor is the most important when choosing a website host? whether customers will make secure transactions the number of email accounts provided the purpose of the website the quality of the host control panel
Answers: 3
question
Computers and Technology, 23.06.2019 08:30
Helen's credit card has an apr of 15.32% and a grace period of 17 days and helen pays her balance in the full every month. if her last billing cycle ended on september 26, 2009, and she made her payment on october 11, 2009, did she owe any interest on her last statement's balance?
Answers: 3
question
Computers and Technology, 23.06.2019 21:30
Which of the following includes the three primary network access technologies? dsl, cable modem, broadband lan, wan, man voip, uc, iptv tcp/ip, ftp, dhcp
Answers: 2
You know the right answer?
Wireshark is an open sourcenetwork packet/protocol analyzer. A network packet analyzer captures netw...
Questions
question
Biology, 24.04.2020 18:44
question
Mathematics, 24.04.2020 18:44
question
Arts, 24.04.2020 18:44
Questions on the website: 13722362