logo

Information Technology | Question and Answer

Analyzing the use of packet analysis/sniffing as an active or passive technique, the need for 'sudo' command when executing Wireshark, retrieving username and password from HTTP packet, the availability of credentials in a HTTP POST packet, assessing the security of a login page based on captured traffic, and suggesting improvements for page security.

6 Pages1038 Words15 Views
   

Added on  2022-09-09

Information Technology | Question and Answer

Analyzing the use of packet analysis/sniffing as an active or passive technique, the need for 'sudo' command when executing Wireshark, retrieving username and password from HTTP packet, the availability of credentials in a HTTP POST packet, assessing the security of a login page based on captured traffic, and suggesting improvements for page security.

   Added on 2022-09-09

ShareRelated Documents
IT 0
IT
Information Technology | Question and Answer_1
IT 1
Table of Contents
Question 1.................................................................................................................. 2
Question 2.................................................................................................................. 2
Question 3.................................................................................................................. 2
Question 4.................................................................................................................. 3
Question 5.................................................................................................................. 3
References................................................................................................................. 5
Information Technology | Question and Answer_2
IT 2
Question 1
It is determined that packet analysis/sniffing is an active technique that is
mainly used by hackers for performing data breach and hacking activities
effectively. Most of the criminals use active sniffing process in which they
transfer the fraud and spam signals to the computing networks and obtain
the reliable and personal information of the users and companies
(Karpiński, et al., 2017). In terms of security attacks, sniffing is a major
attack that has the capability to reduce the performance of computing
devices and provide a way to reduce confidentiality and gather personal
data in less time. Packet sniffing mainly contains malware networks and
malicious codes that help to produce larger traffic signals and perform
security threats in the case of computing devices (Trabelsi, 2014). So, it is
significant for the business communities to control and handle such issues
from the computers in order to enhance the privacy of data.
Question 2
The term Sudo is a kind of computing program which is mainly used in
Linux programming that enables companies to run developed programs
with security privileges of others. It is mainly designed and implemented in
the computing networks to run commands only as of the superuser. It is
determined that while executing Wireshark, the sudo program is used due
to its capability to control and handle the vulnerabilities and threats from
the programs and provide a way to securely perform the developed codes. If
the consumers do not use the sudo process in the Wireshark the unwanted
or security threats can be occurred in the computing programs that can
help the criminals to obtain sensitive data and produce hacking issues. So,
it is significant to use Sudo codes while developing and implementing
programs in the Wireshark network.
Information Technology | Question and Answer_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireshark: A Comprehensive Guide to Network Traffic Analysis
|23
|1709
|177

Computer Criminals, IoT, CRM and Communication Methods for Organizations
|10
|3100
|491

Assignment on Trends in Cybercrime
|13
|3063
|21

IT Security Management Program for a Shipping Agency Database
|13
|1987
|279

Assignment on Cyber Defense in Web Based Attacks
|7
|1418
|22

Detailed Report on Suspicious Networks Intrusion on Top Gear Industries
|7
|2269
|133