ProductsLogo
LogoStudy Documents
LogoAI Grader
LogoAI Answer
LogoAI Code Checker
LogoPlagiarism Checker
LogoAI Paraphraser
LogoAI Quiz
LogoAI Detector
PricingBlogAbout Us
logo

Computer Information System

Verified

Added on  2023/06/14

|10
|1992
|82
AI Summary
This article provides information about Ping, HTTP and Big Data. It includes IP addresses, port numbers, URLs, usernames, passwords, and binary data.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: COMPUTER INFORMATION SYSTEM
Computer Information System
Name of the Student
Name of the University
Author’s Note

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
1
COMPUTER INFORMATION SYSTEM
Table of Contents
PART A: Ping......................................................................................................................2
PART B: HTTP...................................................................................................................2
PART C: Big Data...............................................................................................................8
Bibliography........................................................................................................................9
Document Page
2
COMPUTER INFORMATION SYSTEM
PART A: Ping
1. The ping was sent to the IP address – 138.80.92.2
2. The ping was sent from the IP address – 224.0.0.2
3. 7 requests are made in total
4. The size of the data sent in each request is 106 bytes
5. The average response time for the ping request is 59 ms
PART B: HTTP
1. The IP address and the port number of the password protected website is 128.119.245.12 and
PORT - 80
2. The URL of the password protected website is
http://gaia.cs.umass.edu/wireshark-labs/protected_pages/HTTP-wireshark-file5.html
3. The number of wrong attempts entries that have been made before the correct password has
been put in is 5.
4. The username and the password for all the wrong attempts are
i. wireshark: students
ii. wire: shark
iii. students: network
iv. wireshark-students: netwoek
5. The text displayed in the website when the wrong username and the password was put in is
Document Page
3
COMPUTER INFORMATION SYSTEM
“This server could not verify that you are authorized to access the document requested. Either
you supplied the wrong credentials (e.g., bad password), or your browser doesn't understand how
to supply the credentials required.”
6. The time taken by the person for putting the correct username and password is
11:13:41 to 11:14:23
7. The corresponding binary data for the response from the website is
00000000 47 45 54 20 2f 77 69 72 65 73 68 61 72 6b 2d 6c GET /wir eshark-l
00000010 61 62 73 2f 70 72 6f 74 65 63 74 65 64 5f 70 61 abs/prot ected_pa
00000020 67 65 73 2f 48 54 54 50 2d 77 69 72 65 73 68 61 ges/HTTP -wiresha
00000030 72 6b 2d 66 69 6c 65 35 2e 68 74 6d 6c 20 48 54 rk-file5 .html HT
00000040 54 50 2f 31 2e 31 0d 0a 48 6f 73 74 3a 20 67 61 TP/1.1.. Host: ga
00000050 69 61 2e 63 73 2e 75 6d 61 73 73 2e 65 64 75 0d ia.cs.um ass.edu.
00000060 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 6b 65 65 .Connect ion: kee
00000070 70 2d 61 6c 69 76 65 0d 0a 41 75 74 68 6f 72 69 p-alive. .Authori
00000080 7a 61 74 69 6f 6e 3a 20 42 61 73 69 63 20 64 32 zation: Basic d2
00000090 6c 79 5a 58 4e 6f 59 58 4a 72 4c 58 4e 30 64 57 lyZXNoYX JrLXN0dW
000000A0 52 6c 62 6e 52 7a 4f 6d 35 6c 64 48 64 76 63 6d RlbnRzOm 5ldHdvcm
000000B0 73 3d 0d 0a 55 70 67 72 61 64 65 2d 49 6e 73 65 s=..Upgr ade-Inse
000000C0 63 75 72 65 2d 52 65 71 75 65 73 74 73 3a 20 31 cure-Req uests: 1

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
4
COMPUTER INFORMATION SYSTEM
000000D0 0d 0a 55 73 65 72 2d 41 67 65 6e 74 3a 20 4d 6f ..User-A gent: Mo
000000E0 7a 69 6c 6c 61 2f 35 2e 30 20 28 57 69 6e 64 6f zilla/5. 0 (Windo
000000F0 77 73 20 4e 54 20 31 30 2e 30 3b 20 57 69 6e 36 ws NT 10 .0; Win6
00000100 34 3b 20 78 36 34 29 20 41 70 70 6c 65 57 65 62 4; x64) AppleWeb
00000110 4b 69 74 2f 35 33 37 2e 33 36 20 28 4b 48 54 4d Kit/537. 36 (KHTM
00000120 4c 2c 20 6c 69 6b 65 20 47 65 63 6b 6f 29 20 43 L, like Gecko) C
00000130 68 72 6f 6d 65 2f 36 34 2e 30 2e 33 32 38 32 2e hrome/64 .0.3282.
00000140 31 38 36 20 53 61 66 61 72 69 2f 35 33 37 2e 33 186 Safa ri/537.3
00000150 36 0d 0a 41 63 63 65 70 74 3a 20 74 65 78 74 2f 6..Accep t: text/
00000160 68 74 6d 6c 2c 61 70 70 6c 69 63 61 74 69 6f 6e html,app lication
00000170 2f 78 68 74 6d 6c 2b 78 6d 6c 2c 61 70 70 6c 69 /xhtml+x ml,appli
00000180 63 61 74 69 6f 6e 2f 78 6d 6c 3b 71 3d 30 2e 39 cation/x ml;q=0.9
00000190 2c 69 6d 61 67 65 2f 77 65 62 70 2c 69 6d 61 67 ,image/w ebp,imag
000001A0 65 2f 61 70 6e 67 2c 2a 2f 2a 3b 71 3d 30 2e 38 e/apng,* /*;q=0.8
000001B0 0d 0a 41 63 63 65 70 74 2d 45 6e 63 6f 64 69 6e ..Accept -Encodin
000001C0 67 3a 20 67 7a 69 70 2c 20 64 65 66 6c 61 74 65 g: gzip, deflate
000001D0 0d 0a 41 63 63 65 70 74 2d 4c 61 6e 67 75 61 67 ..Accept -Languag
000001E0 65 3a 20 65 6e 2d 55 53 2c 65 6e 3b 71 3d 30 2e e: en-US ,en;q=0.
Document Page
5
COMPUTER INFORMATION SYSTEM
000001F0 39 0d 0a 0d 0a 9....
00000000 48 54 54 50 2f 31 2e 31 20 32 30 30 20 4f 4b 0d HTTP/1.1 200 OK.
00000010 0a 44 61 74 65 3a 20 46 72 69 2c 20 30 39 20 4d .Date: F ri, 09 M
00000020 61 72 20 32 30 31 38 20 30 35 3a 34 34 3a 32 33 ar 2018 05:44:23
00000030 20 47 4d 54 0d 0a 53 65 72 76 65 72 3a 20 41 70 GMT..Se rver: Ap
00000040 61 63 68 65 2f 32 2e 34 2e 36 20 28 43 65 6e 74 ache/2.4 .6 (Cent
00000050 4f 53 29 20 4f 70 65 6e 53 53 4c 2f 31 2e 30 2e OS) Open SSL/1.0.
00000060 32 6b 2d 66 69 70 73 20 50 48 50 2f 35 2e 34 2e 2k-fips PHP/5.4.
00000070 31 36 20 6d 6f 64 5f 70 65 72 6c 2f 32 2e 30 2e 16 mod_p erl/2.0.
00000080 31 30 20 50 65 72 6c 2f 76 35 2e 31 36 2e 33 0d 10 Perl/ v5.16.3.
00000090 0a 4c 61 73 74 2d 4d 6f 64 69 66 69 65 64 3a 20 .Last-Mo dified:
000000A0 54 68 75 2c 20 30 38 20 4d 61 72 20 32 30 31 38 Thu, 08 Mar 2018
000000B0 20 30 36 3a 35 39 3a 30 31 20 47 4d 54 0d 0a 45 06:59:0 1 GMT..E
000000C0 54 61 67 3a 20 22 38 34 2d 35 36 36 65 31 33 35 Tag: "84 -566e135
000000D0 65 61 62 31 32 32 22 0d 0a 41 63 63 65 70 74 2d eab122". .Accept-
000000E0 52 61 6e 67 65 73 3a 20 62 79 74 65 73 0d 0a 43 Ranges: bytes..C
000000F0 6f 6e 74 65 6e 74 2d 4c 65 6e 67 74 68 3a 20 31 ontent-L ength: 1
00000100 33 32 0d 0a 4b 65 65 70 2d 41 6c 69 76 65 3a 20 32..Keep -Alive:
Document Page
6
COMPUTER INFORMATION SYSTEM
00000110 74 69 6d 65 6f 75 74 3d 35 2c 20 6d 61 78 3d 31 timeout= 5, max=1
00000120 30 30 0d 0a 43 6f 6e 6e 65 63 74 69 6f 6e 3a 20 00..Conn ection:
00000130 4b 65 65 70 2d 41 6c 69 76 65 0d 0a 43 6f 6e 74 Keep-Ali ve..Cont
00000140 65 6e 74 2d 54 79 70 65 3a 20 74 65 78 74 2f 68 ent-Type : text/h
00000150 74 6d 6c 3b 20 63 68 61 72 73 65 74 3d 55 54 46 tml; cha rset=UTF
00000160 2d 38 0d 0a 0d 0a 0a 3c 68 74 6d 6c 3e 0a 0a 54 -8.....< html>..T
00000170 68 69 73 20 70 61 67 65 20 69 73 20 70 61 73 73 his page is pass
00000180 77 6f 72 64 20 70 72 6f 74 65 63 74 65 64 21 20 word pro tected!
00000190 20 49 66 20 79 6f 75 27 72 65 20 73 65 65 69 6e If you' re seein
000001A0 67 20 74 68 69 73 2c 20 79 6f 75 27 76 65 20 64 g this, you've d
000001B0 6f 77 6e 6c 6f 61 64 65 64 20 74 68 65 20 70 61 ownloade d the pa
000001C0 67 65 20 63 6f 72 72 65 63 74 6c 79 20 3c 62 72 ge corre ctly <br
000001D0 3e 0a 43 6f 6e 67 72 61 74 75 6c 61 74 69 6f 6e >.Congra tulation
000001E0 73 21 0a 3c 2f 68 74 6d 6c 3e s!.</htm l>
8. The text data that was been carried in the response from the webserver when the correct
username and password have been put in is
GET /wireshark-labs/protected_pages/HTTP-wireshark-file5.html HTTP/1.1
Host: gaia.cs.umass.edu
Connection: keep-alive

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
7
COMPUTER INFORMATION SYSTEM
Authorization: Basic d2lyZXNoYXJrLXN0dWRlbnRzOm5ldHdvcms=
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like
Gecko) Chrome/64.0.3282.186 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/
*;q=0.8
Accept-Encoding: gzip, deflate
Accept-Language: en-US,en;q=0.9
HTTP/1.1 200 OK
Date: Fri, 09 Mar 2018 05:44:23 GMT
Server: Apache/2.4.6 (CentOS) OpenSSL/1.0.2k-fips PHP/5.4.16 mod_perl/2.0.10 Perl/v5.16.3
Last-Modified: Thu, 08 Mar 2018 06:59:01 GMT
ETag: "84-566e135eab122"
Accept-Ranges: bytes
Content-Length: 132
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
Document Page
8
COMPUTER INFORMATION SYSTEM
<html>
This page is password protected! If you're seeing this, you've downloaded the page correctly
<br>
Congratulations!
</html>
PART C: Big Data
From the captured packet the following observations are made
i. The network is a Ipv6 network and the source and destination address are
fe80::d148:bd39:f8ec:d065 and fe80::d9ea:702a:3dba:9aa5.
ii. The router is configured with HSRP for establishment of fault-tolerance and the
router is virtualized to ensure that the traffic is immediately recovered from the first
hop failure.
iii. A secure connection is established with the server and is secured by the TLS protocol.
iv. Then hosts connected in the network finds each other using the neighbor solicitation
as there are no ARP in IPv6.
Document Page
9
COMPUTER INFORMATION SYSTEM
Bibliography
Chappell, L. (2017). Wireshark 101: Essential Skills for Network Analysis-Wireshark Solution
Series. Laura Chappell University.
Sanders, C. (2017). Practical packet analysis: Using Wireshark to solve real-world network
problems. No Starch Press.
1 out of 10
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]