Produce a packet from a wireshark capture, Computer Network Security

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the frames captured.

Before completing this task, you must:

1. Have Wireshark installed on your personal desktop/laptop

2. Have network (Internet) connectivity to your desktop/laptop

3. Have completed the packet capture exercises in weeks 1 - 3

This activity cannot be completed on CQUNet connected labs.

Capture Requirements:

You are required to perform a capture of a web search.  In order to do this, you should:

1.    Begin the capture in Wireshark

2.    In your web browser (IE, Firefox, Safari etc.) go to

3.    Enter your CQU email address in the Catalogue search box (see "Screen Capture 1")

4.    Hit Search

5.    Stop the capture in Wireshark

pcap Requirements:

When you examine the frames you have captured in Wireshark, you will probably see a lot of activity apart from your web search.  For the purposes of this assignment, you must strip away all other parts of the capture EXCEPT those relating to the search.  You will need to do some research on how to do this - hint: what does "Follow TCP Stream" do?  The pcap file you submit should contain ONLY the frames relevant to the search.

Posted Date: 3/1/2013 12:10:58 AM | Location : United States







Related Discussions:- Produce a packet from a wireshark capture, Assignment Help, Ask Question on Produce a packet from a wireshark capture, Get Answer, Expert's Help, Produce a packet from a wireshark capture Discussions

Write discussion on Produce a packet from a wireshark capture
Your posts are moderated
Related Questions
Q. Develop a completely secure WSN based on the triple key? Wireless network is the most vulnerable type of network to security attack. Unauthorized access to wireless network

I am ryan, i am looking for data security and network assignment help, Do you have experts in data security?

QUESTION a) Consider the speed of propagation of an electrical signal is same to 2x10 8 m/s, evaluate the ratio of the propagation delay to the transmit time for the given typ

FRAGMENTATION AND PATH MTU IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive d

Early networks used simple point-to-point communication . In such a method of communication every communication channel connects exactly two devices. In this way it prepares a m

Problem a) Consider a 1000 Mbps Ethernet with a single Store-N-Forward switch mid-way in the path between two nodes A and B. Assume that there are no other nodes on the network

Assume that the RSA problem is hard, prove that the RSA encryption is secure against IND- CPA. Provide a game between an adversary A and a simulator (or challenger) B.

a. PKI and PGP are two methods for generating and managing public keys for use in protocols such as secure email. Compare and contrast the trust models for public keys used in PKI

To master the complexity one must apply the given points. CONCENTRATE IN UNDERSTANDING THE CONCEPTS: Instead of details of wires used to connect computers to a specif

hi have a look and tell me if u can do it. if u can do Q1then i will allow u to do Q2