7COM1069 Cyber Operations Project: Wireshark Analysis and Critique
VerifiedAdded on 2022/09/08
|26
|4466
|30
Project
AI Summary
This project delves into the realm of cyber operations, commencing with an exploration of the information environment and the 'fog of war,' analyzing their impact on decision-making in cybersecurity. Task 1 examines the information environment, critical discussion on decision-making, and mitigation strategies. Task 2 provides a critique of an article on maneuver warfare utilizing cloud resources, covering principles of maneuver warfare, defensive and offensive strategies, and deception strategy. Task 3 includes Wireshark file analysis, examining packet details, statistical analysis, network boundaries, active nodes, IP protocols, and identification of network activity. The project aims to provide a comprehensive understanding of cyber operations and their associated challenges and solutions. This assignment covers the importance of information security and the strategies used to mitigate potential threats.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.

Running head: CYBER OPERATIONS
CYBER OPERATIONS
Name of the Student
Name of the University
Author Note
CYBER OPERATIONS
Name of the Student
Name of the University
Author Note
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

CYBER OPERATIONS 1
Abstract
In the contemporary world, the entire system of information is based on the technology. The
information is gathered, processed and optimized such that it can be used for the process of
the decision making. This information has to be protected such that the integrity of the data is
maintained. The ‘fog of war’ is one such method which is used for the determination of the
ambiguity of the data which can cause issues in the decision making. The report discusses
about the importance of the Information environment and reasons which can cause issues in
the process of decision making. It also gives an insight regarding the measures which can
mitigate the issues regarding the decision making. There will be a review of the article
“Deception and Manoeuvre Warfare utilising Cloud Resources” in the task 2 and lastly there
will be Wireshark file analysis included in the task 3.
Abstract
In the contemporary world, the entire system of information is based on the technology. The
information is gathered, processed and optimized such that it can be used for the process of
the decision making. This information has to be protected such that the integrity of the data is
maintained. The ‘fog of war’ is one such method which is used for the determination of the
ambiguity of the data which can cause issues in the decision making. The report discusses
about the importance of the Information environment and reasons which can cause issues in
the process of decision making. It also gives an insight regarding the measures which can
mitigate the issues regarding the decision making. There will be a review of the article
“Deception and Manoeuvre Warfare utilising Cloud Resources” in the task 2 and lastly there
will be Wireshark file analysis included in the task 3.

2CYBER OPERATIONS
Table of Contents
Task 1.........................................................................................................................................4
Introduction:...............................................................................................................................4
Fog of War:................................................................................................................................4
Information Environment:..........................................................................................................5
Critical Discussion:....................................................................................................................5
Decision Making In Cyber Security:......................................................................................5
Mitigation of the Issues Identified:........................................................................................6
Task 2:........................................................................................................................................8
Critique:......................................................................................................................................8
Principles of Maneuver warfare:................................................................................................9
Defensive strategies:..................................................................................................................9
Offensive strategies:.................................................................................................................10
Deception strategy:...................................................................................................................10
Task 3.......................................................................................................................................12
Wireshark:................................................................................................................................12
Packet:......................................................................................................................................13
Statistical analysis:...................................................................................................................14
Network boundaries:............................................................................................................14
Active nodes:........................................................................................................................15
Table of Contents
Task 1.........................................................................................................................................4
Introduction:...............................................................................................................................4
Fog of War:................................................................................................................................4
Information Environment:..........................................................................................................5
Critical Discussion:....................................................................................................................5
Decision Making In Cyber Security:......................................................................................5
Mitigation of the Issues Identified:........................................................................................6
Task 2:........................................................................................................................................8
Critique:......................................................................................................................................8
Principles of Maneuver warfare:................................................................................................9
Defensive strategies:..................................................................................................................9
Offensive strategies:.................................................................................................................10
Deception strategy:...................................................................................................................10
Task 3.......................................................................................................................................12
Wireshark:................................................................................................................................12
Packet:......................................................................................................................................13
Statistical analysis:...................................................................................................................14
Network boundaries:............................................................................................................14
Active nodes:........................................................................................................................15

3CYBER OPERATIONS
Types of IP protocols:..............................................................................................................15
DHCP:..................................................................................................................................15
Address resolution protocol:................................................................................................16
DNS:.....................................................................................................................................18
HTTP:...................................................................................................................................19
TCP:.....................................................................................................................................21
Identification of activity:..........................................................................................................22
Attack explanation:..................................................................................................................23
Conclusion:..............................................................................................................................23
References:...............................................................................................................................25
Types of IP protocols:..............................................................................................................15
DHCP:..................................................................................................................................15
Address resolution protocol:................................................................................................16
DNS:.....................................................................................................................................18
HTTP:...................................................................................................................................19
TCP:.....................................................................................................................................21
Identification of activity:..........................................................................................................22
Attack explanation:..................................................................................................................23
Conclusion:..............................................................................................................................23
References:...............................................................................................................................25
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

4CYBER OPERATIONS
Task 1
Introduction:
With the emergence of the digital age, the need for the cyber security has increased as
well. The damage or the loss of the data due to the unauthorized access of the third party or
the intrusion of the hackers can affect the privacy and the integrity of the data. Thus,
protection of the data is the main concern in the contemporary world. The entire concept of
the information system has been updated with the various security measures that are taken in
order to protect the available information over the air. The following report discusses about
the Information system and its importance along with the concept of the cyber security and
the ‘Fog of War’.
Fog of War:
As per Clausewitz, the uncertainty of the data and information system in the
contemporary world is the fog of war. The ambiguity and the chaos in the information system
creates difficulties in the process of the decision making which in turns lead to the severe
consequences in the entire Information system. With the emergence of the digital age, the
flow of the information into the system has increased at an exponential rate (Canabarro and
Borne 2013). This has increased the rate at which the crimes have in the cyber world. It is
very difficult to identify the possible targets in the cyber world which creates a fog in the
cyber war. Recently, one of the technology has been introduced which is known as the fog
computing according to which, the more is the fogginess of the data the more security
insurance can be provided to the system. In this system, a part of the data remains secure
even if some other part of the data has been compromised and this is all due to the
opaqueness of the data due to high fogginess. The fog computing technology ensures security
Task 1
Introduction:
With the emergence of the digital age, the need for the cyber security has increased as
well. The damage or the loss of the data due to the unauthorized access of the third party or
the intrusion of the hackers can affect the privacy and the integrity of the data. Thus,
protection of the data is the main concern in the contemporary world. The entire concept of
the information system has been updated with the various security measures that are taken in
order to protect the available information over the air. The following report discusses about
the Information system and its importance along with the concept of the cyber security and
the ‘Fog of War’.
Fog of War:
As per Clausewitz, the uncertainty of the data and information system in the
contemporary world is the fog of war. The ambiguity and the chaos in the information system
creates difficulties in the process of the decision making which in turns lead to the severe
consequences in the entire Information system. With the emergence of the digital age, the
flow of the information into the system has increased at an exponential rate (Canabarro and
Borne 2013). This has increased the rate at which the crimes have in the cyber world. It is
very difficult to identify the possible targets in the cyber world which creates a fog in the
cyber war. Recently, one of the technology has been introduced which is known as the fog
computing according to which, the more is the fogginess of the data the more security
insurance can be provided to the system. In this system, a part of the data remains secure
even if some other part of the data has been compromised and this is all due to the
opaqueness of the data due to high fogginess. The fog computing technology ensures security

5CYBER OPERATIONS
by splitting the bulk data into more subparts such that the opaqueness of the information can
be increased. The sub parts or the sub-division of the data is stored in the end user devices or
some other devices which are not the part of the same device. In this way the security of the
data in the online services as well as the information system can be increased.
Information Environment:
The information environment is the aggregate of the organizations or the individuals
or the system which helps in the collection of the data and dissemination of the information.
The data obtained from the various sources are unstructured and raw. These data are process
by information system for optimization which further helps in decision making of the
organization such that goals for the organization is obtained. For this purpose of information
optimization, certain tools and techniques are required which is known as the information
technology environment. There are three dimension of the information environment and they
are namely, physical dimension, cognitive dimension and informational dimension (McHale
2019). The physical dimension is the place where the overlapping between the physical world
and the information environment takes place. The informational dimension is one of the place
where the information is processed, disseminated and protected for providing an optimized
result. The cognitive dimension is the place where the human can make decisions of the
available information. The information system is the medium via which the information
technology and people interact with one another for the generation of results which benefits
the organization.
Critical Discussion:
Decision Making In Cyber Security:
Uncertainty in the cyber incidents: The cyber system consists of the technology.
The technologies are nothing more than the machines with certain functionalities
by splitting the bulk data into more subparts such that the opaqueness of the information can
be increased. The sub parts or the sub-division of the data is stored in the end user devices or
some other devices which are not the part of the same device. In this way the security of the
data in the online services as well as the information system can be increased.
Information Environment:
The information environment is the aggregate of the organizations or the individuals
or the system which helps in the collection of the data and dissemination of the information.
The data obtained from the various sources are unstructured and raw. These data are process
by information system for optimization which further helps in decision making of the
organization such that goals for the organization is obtained. For this purpose of information
optimization, certain tools and techniques are required which is known as the information
technology environment. There are three dimension of the information environment and they
are namely, physical dimension, cognitive dimension and informational dimension (McHale
2019). The physical dimension is the place where the overlapping between the physical world
and the information environment takes place. The informational dimension is one of the place
where the information is processed, disseminated and protected for providing an optimized
result. The cognitive dimension is the place where the human can make decisions of the
available information. The information system is the medium via which the information
technology and people interact with one another for the generation of results which benefits
the organization.
Critical Discussion:
Decision Making In Cyber Security:
Uncertainty in the cyber incidents: The cyber system consists of the technology.
The technologies are nothing more than the machines with certain functionalities

6CYBER OPERATIONS
(M’manga et al. 2019). They can malfunction no one can predict the time when it will
do so. Thus the process of the decision making can be hindered resulting in sever
issues in the system.
Delay in the building of the cyber security: With the emergence of the technology
the needs for the cyber security has increased as well. But the existing process of the
security is not enough to cover the risk associated to the latest technology (Abomhara
2015). To understand the possible measures that can be taken for solving the issues
delays the entire process.
Risk Assessment problems: Analysis of the risk in the system is important and there
are multiple way in doing so. Choosing the wrong process for the assessment of the
risk can have severe effects in the process of decision making.
Lack of the knowledge: The advancement of the technology has resulted in the new
technology. The existing people are not acquainted with the technology which causes
problems. Moreover, improper training of the people can lead to the operational issues
of the technology. The lack of the knowledge of the technology of the people who are
responsible for the process of decision making leads to the hindrance in the
development of the cyber security against the crimes.
Communication issues: For the better access to the system, it is extremely important
to develop a proper communication between admin and employees is essential for the
process of the decision making. It can give rise to conflict in the organization due to
improper interaction.
Mitigation of the Issues Identified:
To combat with the uncertainty issue, organization must be prepared for any incident.
An Incident response team can be beneficial in this case.
(M’manga et al. 2019). They can malfunction no one can predict the time when it will
do so. Thus the process of the decision making can be hindered resulting in sever
issues in the system.
Delay in the building of the cyber security: With the emergence of the technology
the needs for the cyber security has increased as well. But the existing process of the
security is not enough to cover the risk associated to the latest technology (Abomhara
2015). To understand the possible measures that can be taken for solving the issues
delays the entire process.
Risk Assessment problems: Analysis of the risk in the system is important and there
are multiple way in doing so. Choosing the wrong process for the assessment of the
risk can have severe effects in the process of decision making.
Lack of the knowledge: The advancement of the technology has resulted in the new
technology. The existing people are not acquainted with the technology which causes
problems. Moreover, improper training of the people can lead to the operational issues
of the technology. The lack of the knowledge of the technology of the people who are
responsible for the process of decision making leads to the hindrance in the
development of the cyber security against the crimes.
Communication issues: For the better access to the system, it is extremely important
to develop a proper communication between admin and employees is essential for the
process of the decision making. It can give rise to conflict in the organization due to
improper interaction.
Mitigation of the Issues Identified:
To combat with the uncertainty issue, organization must be prepared for any incident.
An Incident response team can be beneficial in this case.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

7CYBER OPERATIONS
Organization that deals with cyber technologies must lay focus upon the security.
That is the most important aspect for the organization. Implementation of the firewall
technology or encryption of data helps in enhancement of the security of the data
(Adhie et al. 2018).
It is not possible to consider all possible methods of risk assessment all though the
most suitable method must be considered.
People with expertise in the technologies that are in the organization must be recruited
or given the responsibilities of the decision making in the organization.
The transparency in communication helps in prevention of the conflicts arising in the
organization. This is mainly achieved with experience in the particular field of the
organization (Haesevoets et al. 2019).
Organization that deals with cyber technologies must lay focus upon the security.
That is the most important aspect for the organization. Implementation of the firewall
technology or encryption of data helps in enhancement of the security of the data
(Adhie et al. 2018).
It is not possible to consider all possible methods of risk assessment all though the
most suitable method must be considered.
People with expertise in the technologies that are in the organization must be recruited
or given the responsibilities of the decision making in the organization.
The transparency in communication helps in prevention of the conflicts arising in the
organization. This is mainly achieved with experience in the particular field of the
organization (Haesevoets et al. 2019).

8CYBER OPERATIONS
Task 2:
Critique:
The paper aims at describing the key Manoeuvre warfare operations with the use of
cloud computing resources. It has been observed that technology has become one of the key
aspect that is needed to be managed properly. With the help of an efficient technology it
becomes easy to gain better real world access. The assets needs to be protected properly so
that it can prevent from offensive strategies. Beside this the paper has focused on
implementing and integrating a deception strategy so that the security can be designed
properly. The paper has successfully focused on developing a proper computer strategy that
will ensure that the risks are successfully mitigated. However the article has focused and
analyzed the strategies that are needed for mitigating the risks so that it can enhance the
performance. Beside this the paper has also evaluated the necessary manoeuvre warfare
principles so that it becomes easy to carry out the functions within the system. The article
has evaluated offensive and defensive strategy within an organization so that it becomes easy
to use the manoeuvre warfare. It can be stated that with the help of defensive strategy it
becomes easy to withstand the different types of security attacks. Thus in order to enhance
the performance there is a need to manage the cloud resources. After analysing the article it
can be stated that the way intelligence gathering process takes place within a system needs
proper resources so that they can offer maximum output.
Thus the article has focused on determining the act of manoeuvre warfare effectively.
It states that the manoeuvre warfare not only simply moves from one place to other but it has
been observed that these gets interpreted frequently by environmental aspects. Thus with an
intelligence gathering process it becomes easy to prevent the attack from taking place.
Task 2:
Critique:
The paper aims at describing the key Manoeuvre warfare operations with the use of
cloud computing resources. It has been observed that technology has become one of the key
aspect that is needed to be managed properly. With the help of an efficient technology it
becomes easy to gain better real world access. The assets needs to be protected properly so
that it can prevent from offensive strategies. Beside this the paper has focused on
implementing and integrating a deception strategy so that the security can be designed
properly. The paper has successfully focused on developing a proper computer strategy that
will ensure that the risks are successfully mitigated. However the article has focused and
analyzed the strategies that are needed for mitigating the risks so that it can enhance the
performance. Beside this the paper has also evaluated the necessary manoeuvre warfare
principles so that it becomes easy to carry out the functions within the system. The article
has evaluated offensive and defensive strategy within an organization so that it becomes easy
to use the manoeuvre warfare. It can be stated that with the help of defensive strategy it
becomes easy to withstand the different types of security attacks. Thus in order to enhance
the performance there is a need to manage the cloud resources. After analysing the article it
can be stated that the way intelligence gathering process takes place within a system needs
proper resources so that they can offer maximum output.
Thus the article has focused on determining the act of manoeuvre warfare effectively.
It states that the manoeuvre warfare not only simply moves from one place to other but it has
been observed that these gets interpreted frequently by environmental aspects. Thus with an
intelligence gathering process it becomes easy to prevent the attack from taking place.

9CYBER OPERATIONS
Cloud computing offers a model that helps in enabling the ubiquitous and convenient
network. Beside this the network also becomes on demand and will offer access for the
purpose of sharing the configurable computing resources. This will enhance the performance
and will also improve the interaction procedure. With the help of the article it becomes easy
to organize the key objectives. Thus with the help of technology it will become easy to
organize the threats.
Principles of Manoeuvre warfare:
Manoeuvre warfare aims at following the key principles that will help in reducing the
vulnerabilities within the design. The main objective behind including principles is that with
the help of effective principles it becomes easy to achieve the security. This will enhance the
way performance is maintained. The key principles that are followed includes targeting the
critical vulnerabilities, focusing on decentralized decision making and using combined arms.
The three major principles are as follows:
Identifying and targeting the enemy centres of the gravity
Setting and maintaining a favourable terms for the battle
Finding the gaps and exploiting them
Defensive strategies:
In order to deploy the cloud resources effectively it becomes very much essential to
ensure that proper operations have been integrated. The article stated that with the help of
proper defensive strategy the security can be obtained successfully within the cloud. With the
help of through defensive strategy the system will be able to withstand the different types of
attacks. The cloud operations are deployed with the use of deception plan as this helps in
ensuring that the chances of security breaches has reduced. The OPSEC is used with the aim
of determining the security control aspects.
Cloud computing offers a model that helps in enabling the ubiquitous and convenient
network. Beside this the network also becomes on demand and will offer access for the
purpose of sharing the configurable computing resources. This will enhance the performance
and will also improve the interaction procedure. With the help of the article it becomes easy
to organize the key objectives. Thus with the help of technology it will become easy to
organize the threats.
Principles of Manoeuvre warfare:
Manoeuvre warfare aims at following the key principles that will help in reducing the
vulnerabilities within the design. The main objective behind including principles is that with
the help of effective principles it becomes easy to achieve the security. This will enhance the
way performance is maintained. The key principles that are followed includes targeting the
critical vulnerabilities, focusing on decentralized decision making and using combined arms.
The three major principles are as follows:
Identifying and targeting the enemy centres of the gravity
Setting and maintaining a favourable terms for the battle
Finding the gaps and exploiting them
Defensive strategies:
In order to deploy the cloud resources effectively it becomes very much essential to
ensure that proper operations have been integrated. The article stated that with the help of
proper defensive strategy the security can be obtained successfully within the cloud. With the
help of through defensive strategy the system will be able to withstand the different types of
attacks. The cloud operations are deployed with the use of deception plan as this helps in
ensuring that the chances of security breaches has reduced. The OPSEC is used with the aim
of determining the security control aspects.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

10CYBER OPERATIONS
Offensive strategies:
Offensive operations mainly takes place within the system for the purpose of
destroying the asset or controlling the assets completely. For the purpose of carrying out
offensive strategy it becomes very much essential to integrate cloud technology offers on
demand rapid elasticity service. This allows the individual to change the layout of the
computing infrastructure so that it can ensure a cost- effective and transparent structure. The
strategy involves combining the characteristics of manoeuvre warfare with the cloud
computing so that it enables asymmetric system. Apart from this the cloud technologies are
mainly offered as a service that helps in evaluating the different operations and also focuses
on analysing the impacts that are created with the actions. Thus it can be stated that with the
help of offensive operation it becomes easy to control the assets conditions.
Deception strategy:
The deception strategy mainly focuses on granting right of information at the time of
need by ensuring that proper decision is made so that information are processed
successfully. The article states that the essence of “deception,” mainly focuses on identifying
the core capabilities associated with information operation. In order to evaluate the deception
strategy the paper has selected three key operations that are Psychological Operations
(PSYOP), Military Deception (MILDEC) and Operational Security (OPSEC). With the use of
deception the behaviour and the psychological aspects can be made clear. The article stated
the deception strategy with the help of a quotation that is “A wise man has great power, and a
man of knowledge increases strength; for waging war you need guidance, and for victory
many advisers.” Apart from this several quotes have been provided within the article that is
used for the purpose of determining the Information Operations and deception. Thus it can be
stated that with an effective deception strategy it becomes easy to organize the performance
within a system.
Offensive strategies:
Offensive operations mainly takes place within the system for the purpose of
destroying the asset or controlling the assets completely. For the purpose of carrying out
offensive strategy it becomes very much essential to integrate cloud technology offers on
demand rapid elasticity service. This allows the individual to change the layout of the
computing infrastructure so that it can ensure a cost- effective and transparent structure. The
strategy involves combining the characteristics of manoeuvre warfare with the cloud
computing so that it enables asymmetric system. Apart from this the cloud technologies are
mainly offered as a service that helps in evaluating the different operations and also focuses
on analysing the impacts that are created with the actions. Thus it can be stated that with the
help of offensive operation it becomes easy to control the assets conditions.
Deception strategy:
The deception strategy mainly focuses on granting right of information at the time of
need by ensuring that proper decision is made so that information are processed
successfully. The article states that the essence of “deception,” mainly focuses on identifying
the core capabilities associated with information operation. In order to evaluate the deception
strategy the paper has selected three key operations that are Psychological Operations
(PSYOP), Military Deception (MILDEC) and Operational Security (OPSEC). With the use of
deception the behaviour and the psychological aspects can be made clear. The article stated
the deception strategy with the help of a quotation that is “A wise man has great power, and a
man of knowledge increases strength; for waging war you need guidance, and for victory
many advisers.” Apart from this several quotes have been provided within the article that is
used for the purpose of determining the Information Operations and deception. Thus it can be
stated that with an effective deception strategy it becomes easy to organize the performance
within a system.

11CYBER OPERATIONS
The deception strategy that is used for protecting a computing infrastructure will
further lead to impacting the decision making process. The affects that are created has the
potential to affect the motivation and also impacts the opportunity. Beside this the capability
also gets impacted with the use of deception strategy. The article stated that the SME
specialized methodology helps in targeting the audience. The deception plan mainly involves
planning reaction, PSYOPS planning, INFOSEC planning, OPSEC planning and NETOPS
planning. Thus the article has explained all the necessary components effectively.
The deception strategy that is used for protecting a computing infrastructure will
further lead to impacting the decision making process. The affects that are created has the
potential to affect the motivation and also impacts the opportunity. Beside this the capability
also gets impacted with the use of deception strategy. The article stated that the SME
specialized methodology helps in targeting the audience. The deception plan mainly involves
planning reaction, PSYOPS planning, INFOSEC planning, OPSEC planning and NETOPS
planning. Thus the article has explained all the necessary components effectively.

12CYBER OPERATIONS
Task 3
Wireshark:
Wireshark is basically a tool that is used for analysing the packet files. The tool is
available open-source, it is utilized for analysis, education, development of software,
troubleshooting of network, development of communication protocol. The tool is utilized for
tracking the network packets, so that each of the packets are to be filtered to meet the specific
needs. This is commonly called as network protocol analyser, sniffer and network analyser.
This is also utilized by the engineers for examining the problems of security. The Wireshark
is an open source software application that is used for apprehending the data back and forth.
This is often known as an open source packet tracer sniffer application of computer. The
application puts the card of the network to a mode that is unselective, for accepting all of the
received network packets. The Wireshark network analyser tool can be utilized in the ways as
follows:
This is utilized by the engineers of network security for examining the security
problems.
The tool allows the clients to see all of the network traffic that are being passed within
the network.
The Wireshark is utilized by the network engineers that they can troubleshoot the
issues of network.
The tool can also help the network engineers to trouble shoot the latency issues as
well as activities that are malicious over the network.
The tool helps the users that they can gain knowledge about how all of the devices
such as mobile phones, laptops, switch, desktop and routers for communicating in the
local network.
Task 3
Wireshark:
Wireshark is basically a tool that is used for analysing the packet files. The tool is
available open-source, it is utilized for analysis, education, development of software,
troubleshooting of network, development of communication protocol. The tool is utilized for
tracking the network packets, so that each of the packets are to be filtered to meet the specific
needs. This is commonly called as network protocol analyser, sniffer and network analyser.
This is also utilized by the engineers for examining the problems of security. The Wireshark
is an open source software application that is used for apprehending the data back and forth.
This is often known as an open source packet tracer sniffer application of computer. The
application puts the card of the network to a mode that is unselective, for accepting all of the
received network packets. The Wireshark network analyser tool can be utilized in the ways as
follows:
This is utilized by the engineers of network security for examining the security
problems.
The tool allows the clients to see all of the network traffic that are being passed within
the network.
The Wireshark is utilized by the network engineers that they can troubleshoot the
issues of network.
The tool can also help the network engineers to trouble shoot the latency issues as
well as activities that are malicious over the network.
The tool helps the users that they can gain knowledge about how all of the devices
such as mobile phones, laptops, switch, desktop and routers for communicating in the
local network.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

13CYBER OPERATIONS
Packet:
The packet is the unit of information and data that is transmitted over the network that
is between destination and origin. The packet of the network are very much small, like 1.5 Kb
for the ether net packets as well as 64 Kb for the IP related packets. The network packets that
are existed in the Wireshark, can be watched online as well as they can be analysed offline.
Packet:
The packet is the unit of information and data that is transmitted over the network that
is between destination and origin. The packet of the network are very much small, like 1.5 Kb
for the ether net packets as well as 64 Kb for the IP related packets. The network packets that
are existed in the Wireshark, can be watched online as well as they can be analysed offline.

14CYBER OPERATIONS
Statistical analysis:
Network boundaries:
2 0.059335 Sagemcom_56:f8:f0 Broadcast ARP 60 Who has
192.168.1.200? Tell 192.168.1.254
Statistical analysis:
Network boundaries:
2 0.059335 Sagemcom_56:f8:f0 Broadcast ARP 60 Who has
192.168.1.200? Tell 192.168.1.254

15CYBER OPERATIONS
3 0.059350 Dell_4b:2e:02 Sagemcom_56:f8:f0 ARP 42 192.168.1.200 is
at 00:1c:23:4b:2e:02
14 0.330913 192.168.1.200 192.168.1.254 DNS 74 Standard query 0x9ce0
AAAA www.google.com
15 0.405474 192.168.1.254 192.168.1.200 DNS 102 Standard query response
0x9ce0 AAAA www.google.com AAAA 2a00:1450:4009:806::1011
Active nodes:
The active nodes and external servers are:
Types of IP protocols:
DHCP:
The DHCP is standing for the dynamic host configuring protocol as well as it is a
network protocol that is utilized on the networks of internet protocol where the DHCP servers
can assign the IP addresses automatically as well as some of the other data and information to
each of the hosts that are existed on the network, so that they can communicate with the
different kinds of endpoints efficiently.
3 0.059350 Dell_4b:2e:02 Sagemcom_56:f8:f0 ARP 42 192.168.1.200 is
at 00:1c:23:4b:2e:02
14 0.330913 192.168.1.200 192.168.1.254 DNS 74 Standard query 0x9ce0
AAAA www.google.com
15 0.405474 192.168.1.254 192.168.1.200 DNS 102 Standard query response
0x9ce0 AAAA www.google.com AAAA 2a00:1450:4009:806::1011
Active nodes:
The active nodes and external servers are:
Types of IP protocols:
DHCP:
The DHCP is standing for the dynamic host configuring protocol as well as it is a
network protocol that is utilized on the networks of internet protocol where the DHCP servers
can assign the IP addresses automatically as well as some of the other data and information to
each of the hosts that are existed on the network, so that they can communicate with the
different kinds of endpoints efficiently.
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

16CYBER OPERATIONS
11156 4614.912857 0.0.0.0 255.255.255.255 DHCP 342 DHCP Discover -
Transaction ID 0x671a0129
11176 4616.646437 0.0.0.0 255.255.255.255 DHCP 377 DHCP Request -
Transaction ID 0x671a0129
11261 4620.372880 192.168.1.82 255.255.255.255 DHCP 342 DHCP Inform -
Transaction ID 0x2de5bfde
Address resolution protocol:
The ARP (address resolution protocol) is basically a process that is used to map the
dynamic IP addresses to one of the permanent machine address that is physical, in a LAN
(local area network). The address of the physical machine is known also as the MAC address
(media access control address). The main job of the ARP basically is to translate essentially
the 32 bit addresses into 48 bit addresses as well as vice versa. This is very much important
as in the IPV4 (internet protocol version 4) which is the common most level of IP.
11156 4614.912857 0.0.0.0 255.255.255.255 DHCP 342 DHCP Discover -
Transaction ID 0x671a0129
11176 4616.646437 0.0.0.0 255.255.255.255 DHCP 377 DHCP Request -
Transaction ID 0x671a0129
11261 4620.372880 192.168.1.82 255.255.255.255 DHCP 342 DHCP Inform -
Transaction ID 0x2de5bfde
Address resolution protocol:
The ARP (address resolution protocol) is basically a process that is used to map the
dynamic IP addresses to one of the permanent machine address that is physical, in a LAN
(local area network). The address of the physical machine is known also as the MAC address
(media access control address). The main job of the ARP basically is to translate essentially
the 32 bit addresses into 48 bit addresses as well as vice versa. This is very much important
as in the IPV4 (internet protocol version 4) which is the common most level of IP.

17CYBER OPERATIONS
3 0.059350 Dell_4b:2e:02 Sagemcom_56:f8:f0 ARP 42 192.168.1.200 is
at 00:1c:23:4b:2e:02
95 44.376887 Dell_4b:2e:02 Sagemcom_56:f8:f0 ARP 42 192.168.1.200 is
at 00:1c:23:4b:2e:02
175 126.152335 Sagemcom_56:f8:f0 Dell_4b:2e:02 ARP 60 Who has
192.168.1.200? Tell 192.168.1.254
176 126.152352 Dell_4b:2e:02 Sagemcom_56:f8:f0 ARP 42 192.168.1.200 is
at 00:1c:23:4b:2e:02
272 151.733840 Dell_4b:2e:02 Sagemcom_56:f8:f0 ARP 42 Who has
192.168.1.254? Tell 192.168.1.200
273 151.734144 Sagemcom_56:f8:f0 Dell_4b:2e:02 ARP 60 192.168.1.254 is
at 3c:81:d8:56:f8:f0
293 199.778244 Dell_4b:2e:02 Sagemcom_56:f8:f0 ARP 42 192.168.1.200 is
at 00:1c:23:4b:2e:02
317 234.714328 Dell_4b:2e:02 Sagemcom_56:f8:f0 ARP 42 Who has
192.168.1.254? Tell 192.168.1.200
DNS:
The domain name system or the DNS is having the ability to translate the domain
names that are readable, to the IP addresses that are readable by the machines.
3 0.059350 Dell_4b:2e:02 Sagemcom_56:f8:f0 ARP 42 192.168.1.200 is
at 00:1c:23:4b:2e:02
95 44.376887 Dell_4b:2e:02 Sagemcom_56:f8:f0 ARP 42 192.168.1.200 is
at 00:1c:23:4b:2e:02
175 126.152335 Sagemcom_56:f8:f0 Dell_4b:2e:02 ARP 60 Who has
192.168.1.200? Tell 192.168.1.254
176 126.152352 Dell_4b:2e:02 Sagemcom_56:f8:f0 ARP 42 192.168.1.200 is
at 00:1c:23:4b:2e:02
272 151.733840 Dell_4b:2e:02 Sagemcom_56:f8:f0 ARP 42 Who has
192.168.1.254? Tell 192.168.1.200
273 151.734144 Sagemcom_56:f8:f0 Dell_4b:2e:02 ARP 60 192.168.1.254 is
at 3c:81:d8:56:f8:f0
293 199.778244 Dell_4b:2e:02 Sagemcom_56:f8:f0 ARP 42 192.168.1.200 is
at 00:1c:23:4b:2e:02
317 234.714328 Dell_4b:2e:02 Sagemcom_56:f8:f0 ARP 42 Who has
192.168.1.254? Tell 192.168.1.200
DNS:
The domain name system or the DNS is having the ability to translate the domain
names that are readable, to the IP addresses that are readable by the machines.

18CYBER OPERATIONS
14 0.330913 192.168.1.200 192.168.1.254 DNS 74 Standard query 0x9ce0
AAAA www.google.com
53 1.138277 192.168.1.254 192.168.1.200 DNS 149 Standard query response
0x4939 AAAA clients1.google.co.uk CNAME clients-cctld.l.google.com AAAA
2a00:1450:4009:806::1018
55 1.186369 192.168.1.254 192.168.1.200 DNS 169 Standard query response
0x15cc A clients1.google.co.uk CNAME clients-cctld.l.google.com A 173.194.41.87 A
173.194.41.88 A 173.194.41.95
732 498.835735 192.168.1.200 192.168.1.254 DNS 87 Standard query 0x9e3d
PTR 173.197.90.146.in-addr.arpa
4401 4018.587017 192.168.1.200 192.168.1.254 DNS 87 Standard query 0x0813
PTR 173.197.90.146.in-addr.arpa
4408 4018.721292 192.168.1.254 192.168.1.200 DNS 103 Standard query response
0x5596 A 173.197.90.146.dyn.plus.net A 146.90.197.173
9581 4429.217684 192.168.1.254 192.168.1.200 DNS 103 Standard query response
0x0174 A 173.197.90.146.dyn.plus.net A 146.90.197.173
14 0.330913 192.168.1.200 192.168.1.254 DNS 74 Standard query 0x9ce0
AAAA www.google.com
53 1.138277 192.168.1.254 192.168.1.200 DNS 149 Standard query response
0x4939 AAAA clients1.google.co.uk CNAME clients-cctld.l.google.com AAAA
2a00:1450:4009:806::1018
55 1.186369 192.168.1.254 192.168.1.200 DNS 169 Standard query response
0x15cc A clients1.google.co.uk CNAME clients-cctld.l.google.com A 173.194.41.87 A
173.194.41.88 A 173.194.41.95
732 498.835735 192.168.1.200 192.168.1.254 DNS 87 Standard query 0x9e3d
PTR 173.197.90.146.in-addr.arpa
4401 4018.587017 192.168.1.200 192.168.1.254 DNS 87 Standard query 0x0813
PTR 173.197.90.146.in-addr.arpa
4408 4018.721292 192.168.1.254 192.168.1.200 DNS 103 Standard query response
0x5596 A 173.197.90.146.dyn.plus.net A 146.90.197.173
9581 4429.217684 192.168.1.254 192.168.1.200 DNS 103 Standard query response
0x0174 A 173.197.90.146.dyn.plus.net A 146.90.197.173
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

19CYBER OPERATIONS
HTTP:
The HTTP stands for Hypertext Transfer Protocol. It is basically the set of standards
which allows the clients in exchanging the information that are found on the web pages. At
the time of accessing any of the web pages, entering the http:// is for communicating over the
HTTP.
9058 4369.738131 146.90.197.173 192.168.1.200 HTTP 255 GET
/wordpress//?p=303 HTTP/1.1
9060 4369.738356 192.168.1.200 146.90.197.173 HTTP 530 HTTP/1.1 404
Not Found (text/html)
9065 4371.177983 146.90.197.173 192.168.1.200 HTTP 255 GET
/wordpress//?p=304 HTTP/1.1
9067 4371.178214 192.168.1.200 146.90.197.173 HTTP 530 HTTP/1.1 404
Not Found (text/html)
HTTP:
The HTTP stands for Hypertext Transfer Protocol. It is basically the set of standards
which allows the clients in exchanging the information that are found on the web pages. At
the time of accessing any of the web pages, entering the http:// is for communicating over the
HTTP.
9058 4369.738131 146.90.197.173 192.168.1.200 HTTP 255 GET
/wordpress//?p=303 HTTP/1.1
9060 4369.738356 192.168.1.200 146.90.197.173 HTTP 530 HTTP/1.1 404
Not Found (text/html)
9065 4371.177983 146.90.197.173 192.168.1.200 HTTP 255 GET
/wordpress//?p=304 HTTP/1.1
9067 4371.178214 192.168.1.200 146.90.197.173 HTTP 530 HTTP/1.1 404
Not Found (text/html)

20CYBER OPERATIONS
9072 4372.295657 146.90.197.173 192.168.1.200 HTTP 255 GET
/wordpress//?p=305 HTTP/1.1
9074 4372.295882 192.168.1.200 146.90.197.173 HTTP 530 HTTP/1.1 404
Not Found (text/html)
9144 4377.007592 146.90.197.173 192.168.1.200 HTTP 255 GET
/wordpress//?p=309 HTTP/1.1
9146 4377.007900 192.168.1.200 146.90.197.173 HTTP 530 HTTP/1.1 404
Not Found (text/html)
9155 4378.149706 146.90.197.173 192.168.1.200 HTTP 255 GET
/wordpress//?p=310 HTTP/1.1
9157 4378.149859 192.168.1.200 146.90.197.173 HTTP 530 HTTP/1.1 404
Not Found (text/html)
9162 4379.502803 146.90.197.173 192.168.1.200 HTTP 255 GET
/wordpress//?p=311 HTTP/1.1
9164 4379.503172 192.168.1.200 146.90.197.173 HTTP 530 HTTP/1.1 404
Not Found (text/html)
TCP:
Transmission Control Protocol or the TCP, is actually a communication protocol
which is used for connecting the network related devices over the web. This can be utilized
also as the communication protocol for an extranet or intranet that is private.
9072 4372.295657 146.90.197.173 192.168.1.200 HTTP 255 GET
/wordpress//?p=305 HTTP/1.1
9074 4372.295882 192.168.1.200 146.90.197.173 HTTP 530 HTTP/1.1 404
Not Found (text/html)
9144 4377.007592 146.90.197.173 192.168.1.200 HTTP 255 GET
/wordpress//?p=309 HTTP/1.1
9146 4377.007900 192.168.1.200 146.90.197.173 HTTP 530 HTTP/1.1 404
Not Found (text/html)
9155 4378.149706 146.90.197.173 192.168.1.200 HTTP 255 GET
/wordpress//?p=310 HTTP/1.1
9157 4378.149859 192.168.1.200 146.90.197.173 HTTP 530 HTTP/1.1 404
Not Found (text/html)
9162 4379.502803 146.90.197.173 192.168.1.200 HTTP 255 GET
/wordpress//?p=311 HTTP/1.1
9164 4379.503172 192.168.1.200 146.90.197.173 HTTP 530 HTTP/1.1 404
Not Found (text/html)
TCP:
Transmission Control Protocol or the TCP, is actually a communication protocol
which is used for connecting the network related devices over the web. This can be utilized
also as the communication protocol for an extranet or intranet that is private.

21CYBER OPERATIONS
9140 4376.520162 146.90.197.173 192.168.1.200 TCP 66 [TCP
Retransmission] 55106 → 80 [FIN, ACK] Seq=190 Ack=465 Win=131072 Len=0
TSval=72493711 TSecr=3650314
9141 4376.520171 192.168.1.200 146.90.197.173 TCP 78 [TCP Dup ACK
9106#1] 80 → 55106 [ACK] Seq=466 Ack=191 Win=6880 Len=0 TSval=3652009
TSecr=72493711 SLE=190 SRE=191
9142 4376.865317 192.168.1.200 146.90.197.173 TCP 66 [TCP
Retransmission] 80 → 55097 [FIN, ACK] Seq=465 Ack=191 Win=6880 Len=0
TSval=3652096 TSecr=72492956
9147 4377.030759 146.90.197.173 192.168.1.200 TCP 66 [TCP Dup ACK
9061#1] 55106 → 80 [ACK] Seq=191 Ack=465 Win=131072 Len=0 TSval=72494219
TSecr=3650314
9148 4377.217315 192.168.1.200 146.90.197.173 TCP 66 [TCP
Retransmission] 80 → 55106 [FIN, ACK] Seq=465 Ack=191 Win=6880 Len=0
TSval=3652184 TSecr=72494219
9149 4377.524850 146.90.197.173 192.168.1.200 TCP 66 55097 → 80
[ACK] Seq=191 Ack=466 Win=131072 Len=0 TSval=72494598 TSecr=3652096
9140 4376.520162 146.90.197.173 192.168.1.200 TCP 66 [TCP
Retransmission] 55106 → 80 [FIN, ACK] Seq=190 Ack=465 Win=131072 Len=0
TSval=72493711 TSecr=3650314
9141 4376.520171 192.168.1.200 146.90.197.173 TCP 78 [TCP Dup ACK
9106#1] 80 → 55106 [ACK] Seq=466 Ack=191 Win=6880 Len=0 TSval=3652009
TSecr=72493711 SLE=190 SRE=191
9142 4376.865317 192.168.1.200 146.90.197.173 TCP 66 [TCP
Retransmission] 80 → 55097 [FIN, ACK] Seq=465 Ack=191 Win=6880 Len=0
TSval=3652096 TSecr=72492956
9147 4377.030759 146.90.197.173 192.168.1.200 TCP 66 [TCP Dup ACK
9061#1] 55106 → 80 [ACK] Seq=191 Ack=465 Win=131072 Len=0 TSval=72494219
TSecr=3650314
9148 4377.217315 192.168.1.200 146.90.197.173 TCP 66 [TCP
Retransmission] 80 → 55106 [FIN, ACK] Seq=465 Ack=191 Win=6880 Len=0
TSval=3652184 TSecr=72494219
9149 4377.524850 146.90.197.173 192.168.1.200 TCP 66 55097 → 80
[ACK] Seq=191 Ack=466 Win=131072 Len=0 TSval=72494598 TSecr=3652096
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.

22CYBER OPERATIONS
9151 4377.571217 146.90.197.173 192.168.1.200 TCP 78 55113 → 80
[SYN] Seq=0 Win=65535 Len=0 MSS=1440 WS=16 TSval=72494725 TSecr=0
SACK_PERM=1
9155 4378.149706 146.90.197.173 192.168.1.200 HTTP 255 GET
/wordpress//?p=310 HTTP/1.1
9162 4379.502803 146.90.197.173 192.168.1.200 HTTP 255 GET
/wordpress//?p=311 HTTP/1.1
Identification of activity:
The MAC address used was 00:1c:23:4b:2e:02.
Attack explanation:
The hacker tried to login as admin however, the revert was unresponsive.
9151 4377.571217 146.90.197.173 192.168.1.200 TCP 78 55113 → 80
[SYN] Seq=0 Win=65535 Len=0 MSS=1440 WS=16 TSval=72494725 TSecr=0
SACK_PERM=1
9155 4378.149706 146.90.197.173 192.168.1.200 HTTP 255 GET
/wordpress//?p=310 HTTP/1.1
9162 4379.502803 146.90.197.173 192.168.1.200 HTTP 255 GET
/wordpress//?p=311 HTTP/1.1
Identification of activity:
The MAC address used was 00:1c:23:4b:2e:02.
Attack explanation:
The hacker tried to login as admin however, the revert was unresponsive.

23CYBER OPERATIONS
The attacker also tried to access the word press however he failed to gain access.
Conclusion:
Thus it can be concluded that the cyber security is one of the important aspect of the
information system and enhancing the security is essential for maintain the privacy and the
integrity of the data. The concept of the ‘fog of war’ is used to explain the problem of the
chaos and ambiguity of the information in the contemporary information system and solving
the problem is important s it helps in the process of decision making which plays an
important role in the organization. The issues arising in the organization can be fixed with the
help of certain methods which are discussed in the report as well. After analysis of the pcap
file, it can be concluded that the attacker tried to access the network so many ways but every
time he failed to access.
The attacker also tried to access the word press however he failed to gain access.
Conclusion:
Thus it can be concluded that the cyber security is one of the important aspect of the
information system and enhancing the security is essential for maintain the privacy and the
integrity of the data. The concept of the ‘fog of war’ is used to explain the problem of the
chaos and ambiguity of the information in the contemporary information system and solving
the problem is important s it helps in the process of decision making which plays an
important role in the organization. The issues arising in the organization can be fixed with the
help of certain methods which are discussed in the report as well. After analysis of the pcap
file, it can be concluded that the attacker tried to access the network so many ways but every
time he failed to access.

24CYBER OPERATIONS
Bibliography:
Abomhara, M., 2015. Cyber security and the internet of things: vulnerabilities, threats,
intruders and attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Adhie, R.P., Hutama, Y., Ahmar, A.S. and Setiawan, M.I., 2018, January. Implementation
cryptography data encryption standard (DES) and triple data encryption standard (3DES)
method in communication system based near field communication (NFC). In Journal of
Physics: Conference Series (Vol. 954, No. 1, p. 012009). IOP Publishing.
Canabarro, D.R. and Borne, T., 2013. Reflections on the Fog of (Cyber) War.
Haesevoets, T., De Cremer, D., De Schutter, L., McGuire, J., Yang, Y., Jian, X. and Van
Hiel, A., 2019. Transparency and Control in Email Communication: The More the Supervisor
is Put in cc the Less Trust is Felt. Journal of Business Ethics, pp.1-21.
M’manga, A., Faily, S., McAlaney, J., Williams, C., Kadobayashi, Y. and Miyamoto, D.,
2019. A normative decision-making model for cyber security. Information & Computer
Security.
McHale, J., 2019. The changing information environment. Routledge.
Mukherjee, S., Raychaudhuri, D., Yates, R., Mandayam, N. and Ravindran, R.,
2019. Network protocols for the mobility-centric future internet (Doctoral dissertation,
Rutgers University-School of Graduate Studies).
Ndatinya, V., Xiao, Z., Manepalli, V.R., Meng, K. and Xiao, Y., 2015. Network forensics
analysis using Wireshark. International Journal of Security and Networks, 10(2), pp.91-106.
Rao, J.D.P., Rai, S. and Narain, B., 2017. A study of Network Attacks and Features of Secure
Protocols. Research Journal of Engineering and Technology, 8(1), p.4.
Bibliography:
Abomhara, M., 2015. Cyber security and the internet of things: vulnerabilities, threats,
intruders and attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Adhie, R.P., Hutama, Y., Ahmar, A.S. and Setiawan, M.I., 2018, January. Implementation
cryptography data encryption standard (DES) and triple data encryption standard (3DES)
method in communication system based near field communication (NFC). In Journal of
Physics: Conference Series (Vol. 954, No. 1, p. 012009). IOP Publishing.
Canabarro, D.R. and Borne, T., 2013. Reflections on the Fog of (Cyber) War.
Haesevoets, T., De Cremer, D., De Schutter, L., McGuire, J., Yang, Y., Jian, X. and Van
Hiel, A., 2019. Transparency and Control in Email Communication: The More the Supervisor
is Put in cc the Less Trust is Felt. Journal of Business Ethics, pp.1-21.
M’manga, A., Faily, S., McAlaney, J., Williams, C., Kadobayashi, Y. and Miyamoto, D.,
2019. A normative decision-making model for cyber security. Information & Computer
Security.
McHale, J., 2019. The changing information environment. Routledge.
Mukherjee, S., Raychaudhuri, D., Yates, R., Mandayam, N. and Ravindran, R.,
2019. Network protocols for the mobility-centric future internet (Doctoral dissertation,
Rutgers University-School of Graduate Studies).
Ndatinya, V., Xiao, Z., Manepalli, V.R., Meng, K. and Xiao, Y., 2015. Network forensics
analysis using Wireshark. International Journal of Security and Networks, 10(2), pp.91-106.
Rao, J.D.P., Rai, S. and Narain, B., 2017. A study of Network Attacks and Features of Secure
Protocols. Research Journal of Engineering and Technology, 8(1), p.4.
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

25CYBER OPERATIONS
Saxena, P. and Sharma, S.K., 2017. Analysis of Network Traffic by using Packet Sniffing
Tool: Wireshark. International Journal of Advance Research, Ideas and Innovations in
Technology, 3(6), pp.804-808.
Sha, M., Gunatilaka, D., Wu, C. and Lu, C., 2017. Empirical study and enhancements of
industrial wireless sensor–actuator network protocols. IEEE Internet of Things Journal, 4(3),
pp.696-704.
VIDALIS, S. and Angelopoulou, O., 2013. Deception and Manoeuvre Warfare Utilising
Cloud Resources. Information Security Journal: A Global Perspective.
Saxena, P. and Sharma, S.K., 2017. Analysis of Network Traffic by using Packet Sniffing
Tool: Wireshark. International Journal of Advance Research, Ideas and Innovations in
Technology, 3(6), pp.804-808.
Sha, M., Gunatilaka, D., Wu, C. and Lu, C., 2017. Empirical study and enhancements of
industrial wireless sensor–actuator network protocols. IEEE Internet of Things Journal, 4(3),
pp.696-704.
VIDALIS, S. and Angelopoulou, O., 2013. Deception and Manoeuvre Warfare Utilising
Cloud Resources. Information Security Journal: A Global Perspective.
1 out of 26
Related Documents

Your All-in-One AI-Powered Toolkit for Academic Success.
+13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
© 2024 | Zucol Services PVT LTD | All rights reserved.