Software Foundations for Cyber security
Added on 2022-08-09
16 Pages1928 Words220 Views
Running head: Software Foundations for Cyber security
Software Foundations for Cyber security
Name of the Student
Name of the University
Author Note
Software Foundations for Cyber security
Name of the Student
Name of the University
Author Note
Software Foundations for Cyber security 1
1 Table of Contents
2 Introduction:........................................................................................................................2
3 LAB:...................................................................................................................................2
3.1 Capturing current network with Wireshark:................................................................2
4 Question 1:........................................................................................................................12
5 Question 2:........................................................................................................................12
5.1 Baseline the traffic:....................................................................................................13
5.2 Performing passive discovery:..................................................................................13
5.3 Detect unsecured application:....................................................................................13
6 Question 3:........................................................................................................................13
7 Question 4:........................................................................................................................13
8 Question 5:........................................................................................................................14
9 Conclusion:.......................................................................................................................14
10 References:....................................................................................................................15
1 Table of Contents
2 Introduction:........................................................................................................................2
3 LAB:...................................................................................................................................2
3.1 Capturing current network with Wireshark:................................................................2
4 Question 1:........................................................................................................................12
5 Question 2:........................................................................................................................12
5.1 Baseline the traffic:....................................................................................................13
5.2 Performing passive discovery:..................................................................................13
5.3 Detect unsecured application:....................................................................................13
6 Question 3:........................................................................................................................13
7 Question 4:........................................................................................................................13
8 Question 5:........................................................................................................................14
9 Conclusion:.......................................................................................................................14
10 References:....................................................................................................................15
Software Foundations for Cyber security 2
2 Introduction:
The purpose of this paper is to discuss about Wireshark. Wireshark is a powerful tool
for capturing the network but it also helps to access the unauthorised websites like Facebook,
Instagram, and twitter by logging in (Sanders, 2017). It has the ability to capture each and
individual packets which is sent to the system or is received by the system. Live data of the
Traffic network media like Ethernet, Bluetooth USB, wireless LAN can be captured by using
it and it also captures the data from the wire.
3 LAB:
3.1 Capturing current network with Wireshark:
2 Introduction:
The purpose of this paper is to discuss about Wireshark. Wireshark is a powerful tool
for capturing the network but it also helps to access the unauthorised websites like Facebook,
Instagram, and twitter by logging in (Sanders, 2017). It has the ability to capture each and
individual packets which is sent to the system or is received by the system. Live data of the
Traffic network media like Ethernet, Bluetooth USB, wireless LAN can be captured by using
it and it also captures the data from the wire.
3 LAB:
3.1 Capturing current network with Wireshark:
Software Foundations for Cyber security 3
Vulnerable TCP:
"174","35.396803","10.10.63.40","192.124.249.6","TCP","54","55905 → 443 [RST,
ACK] Seq=3 Ack=1 Win=0 Len=0"
Frame 174: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) on interface \Device\
NPF_{BECE976C-9D88-4DD3-9D98-00A946BC0AE8}, id 0
Ethernet II, Src: Dell_4b:c4:b9 (58:8a:5a:4b:c4:b9), Dst: Cisco_b3:3f:d6 (a0:23:9f:b3:3f:d6)
Vulnerable TCP:
"174","35.396803","10.10.63.40","192.124.249.6","TCP","54","55905 → 443 [RST,
ACK] Seq=3 Ack=1 Win=0 Len=0"
Frame 174: 54 bytes on wire (432 bits), 54 bytes captured (432 bits) on interface \Device\
NPF_{BECE976C-9D88-4DD3-9D98-00A946BC0AE8}, id 0
Ethernet II, Src: Dell_4b:c4:b9 (58:8a:5a:4b:c4:b9), Dst: Cisco_b3:3f:d6 (a0:23:9f:b3:3f:d6)
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
Wireshark Lab: ICMP and Traceroutelg...
|21
|3293
|430
MITS4004 Research Study: Networkinglg...
|17
|2522
|493
Analyse Network Performancelg...
|15
|1632
|240
ITECH1003 Networking Assignmentlg...
|8
|855
|41
Data Communication Question Answer 2022lg...
|13
|1111
|14