Preview

Transmission Control Protocol and Protocol Capture

Satisfactory Essays
Open Document
Open Document
338 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Transmission Control Protocol and Protocol Capture
Assessment Worksheet

113

LAB #7 – ASSESSMENT WORKSHEET

Conduct a Network Traffic Analysis and Baseline Definition
Course Name and Number:
Student Name:
Instructor Name:
Lab Due Date:

Overview
In this lab, you created and captured traffic from the machines in this lab using tcpdump, a command line packet analyzer, and the Wireshark protocol capture and analyzer tool. You opened Telnet and SSH sessions and used FileZilla and the Tftpd32 application to transfer files between the virtual machines. You used
NetWitness Investigator, a free tool that provides security practitioners with a means of analyzing packets to view the data captured using Wireshark.

Lab Assessment Questions & Answers
1. Which tool is better at performing protocol captures and which tool is better at performing protocol

analysis?

7
Conduct a Network Traffic Analysis and Baseline Definition

9781284037548_LB07_Printer.indd 113

22/05/13 2:43 PM

114

Lab #7 | Conduct a Network Traffic Analysis and Baseline Definition 2.
What is the significance of the TCP three-way handshake for applications that utilize TCP as a transport

protocol? Which application in your protocol capture uses TCP as a transport protocol?

3.
How many different source IP host addresses did you capture in your protocol capture?

4.
How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What

function in Wireshark provides you with a breakdown of the different protocol types on the LAN segment? 5.
Can Wireshark provide you with network traffic packet size counts? How and where? Are you able to

distinguish how many of each packet size was transmitted on your LAN segment? Why is this important to know?

9781284037548_LB07_Printer.indd 114

22/05/13 2:43 PM

Assessment Worksheet

115

6.
Why is it important to use protocol capture tools and protocol analyzers as an information systems

security

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 4A

    • 1053 Words
    • 4 Pages

    Layer 2 - [Frame] – This piece of data captured from Wireshark is called a Frame it contains 339 bytes of data that was captured when inspecting a website. The frame protocol is not a real protocol. This type of protocol is used by Wireshark as a base for all protocols. The Ethernet II frame is 38 bytes of overhead data.…

    • 1053 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Lab 01

    • 424 Words
    • 2 Pages

    Wireshark provides detailed information about network traffic down to the packet level. However, many are…

    • 424 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 5

    • 440 Words
    • 2 Pages

    How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What function in Wireshark provides you with a breakdown of the different protocol types on the LAN segment?…

    • 440 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    unit 2 labs

    • 465 Words
    • 2 Pages

    1. A network device is usually built in to the computer. A peripheral device is a device connected to the computer…

    • 465 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    100 NT2580 Lab01 Final

    • 287 Words
    • 2 Pages

    connect to a Linux machine and ran several Cisco commands to display statistics for the network…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    5. How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What function in Wireshark provides you with a breakdown of the different protocol types on the LAN segment?…

    • 696 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Lab 2.6.2: Using Wireshark

    • 2260 Words
    • 10 Pages

    Wireshark is programmed to recognize the structure of different network protocols. This enables it to display the encapsulation and individual fields of a PDU and interpret their meaning.…

    • 2260 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    5. How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What function in Wireshark…

    • 2612 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Week 6 Lab

    • 313 Words
    • 2 Pages

    * Under Object Statistics, select Group A WAP / Data Traffic Recvd (bits/sec) and Group B WAP / Data Traffic Recvd (bits/sec). Change the presentation style to Overlaid Statistics. Use <Alt><PrtSc> to this DES Graphs window (as shown below) and paste it into your lab document.…

    • 313 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    In order to do so, the packet analyzer must “understand” the structure of all messages exchanged by protocols. For example, suppose we are interested in displaying the various fields in messages exchanged by the HTTP protocol in Figure 1. The packet analyzer understands the format of Ethernet frames, and so can identify the IP datagram within an Ethernet frame. It also understands the IP datagram format, so that it can extract the TCP segment within the IP datagram. Finally, it understands the TCP segment structure, so it can extract the HTTP message contained in the TCP segment. Finally, it understands the HTTP protocol and so, for example, knows that the first bytes of an HTTP message will contain the string “GET,” “POST,” or “HEAD,” as shown in Figure 2.8 in the…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    (TCO 5) Which AAA server protocol is best suited to produce detailed accounting reports of network activity?…

    • 282 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Web Server Administration

    • 2959 Words
    • 12 Pages

    I will begin with a quick refresher on the protocols used and existing implementations, and then delve into our design and implementation, finishing with some conclusions.…

    • 2959 Words
    • 12 Pages
    Powerful Essays
  • Good Essays

    Ipt Communications Notes

    • 6283 Words
    • 26 Pages

    * Handshaking is used to establish which protocols to use. Handshaking controls the flow of data between computers…

    • 6283 Words
    • 26 Pages
    Good Essays
  • Powerful Essays

    Tcptrack is a sniffer which displays information about TCP connections it sees on a network interface.…

    • 1518 Words
    • 5 Pages
    Powerful Essays