logo

Software Foundations for Cyber security

   

Added on  2022-08-09

16 Pages1928 Words220 Views
Running head: Software Foundations for Cyber security
Software Foundations for Cyber security
Name of the Student
Name of the University
Author Note

Software Foundations for Cyber security 1
1 Table of Contents
2 Introduction:........................................................................................................................2
3 LAB:...................................................................................................................................2
3.1 Capturing current network with Wireshark:................................................................2
4 Question 1:........................................................................................................................12
5 Question 2:........................................................................................................................12
5.1 Baseline the traffic:....................................................................................................13
5.2 Performing passive discovery:..................................................................................13
5.3 Detect unsecured application:....................................................................................13
6 Question 3:........................................................................................................................13
7 Question 4:........................................................................................................................13
8 Question 5:........................................................................................................................14
9 Conclusion:.......................................................................................................................14
10 References:....................................................................................................................15

Software Foundations for Cyber security 2
2 Introduction:
The purpose of this paper is to discuss about Wireshark. Wireshark is a powerful tool
for capturing the network but it also helps to access the unauthorised websites like Facebook,
Instagram, and twitter by logging in (Sanders, 2017). It has the ability to capture each and
individual packets which is sent to the system or is received by the system. Live data of the
Traffic network media like Ethernet, Bluetooth USB, wireless LAN can be captured by using
it and it also captures the data from the wire.
3 LAB:
3.1 Capturing current network with Wireshark:

Software Foundations for Cyber security 3
Vulnerable TCP:
"174","35.396803","10.10.63.40","192.124.249.6","TCP","54","55905 443 [RST,
ACK] Seq=3 Ack=1 Win=0 Len=0"
Frame 174: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) on interface \Device\
NPF_{BECE976C-9D88-4DD3-9D98-00A946BC0AE8}, id 0
Ethernet II, Src: Dell_4b:c4:b9 (58:8a:5a:4b:c4:b9), Dst: Cisco_b3:3f:d6 (a0:23:9f:b3:3f:d6)

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Wireshark Lab: ICMP and Traceroute
|21
|3293
|430

MITS4004 Research Study: Networking
|17
|2522
|493

Analyse Network Performance
|15
|1632
|240

ITECH1003 Networking Assignment
|8
|855
|41

Data Communication Question Answer 2022
|13
|1111
|14