Produce a packet from a wireshark capture, Computer Network Security

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the frames captured.

Before completing this task, you must:

1. Have Wireshark installed on your personal desktop/laptop

2. Have network (Internet) connectivity to your desktop/laptop

3. Have completed the packet capture exercises in weeks 1 - 3

This activity cannot be completed on CQUNet connected labs.

Capture Requirements:

You are required to perform a capture of a web search.  In order to do this, you should:

1.    Begin the capture in Wireshark

2.    In your web browser (IE, Firefox, Safari etc.) go to

3.    Enter your CQU email address in the Catalogue search box (see "Screen Capture 1")

4.    Hit Search

5.    Stop the capture in Wireshark

pcap Requirements:

When you examine the frames you have captured in Wireshark, you will probably see a lot of activity apart from your web search.  For the purposes of this assignment, you must strip away all other parts of the capture EXCEPT those relating to the search.  You will need to do some research on how to do this - hint: what does "Follow TCP Stream" do?  The pcap file you submit should contain ONLY the frames relevant to the search.

Posted Date: 3/1/2013 12:10:58 AM | Location : United States







Related Discussions:- Produce a packet from a wireshark capture, Assignment Help, Ask Question on Produce a packet from a wireshark capture, Get Answer, Expert's Help, Produce a packet from a wireshark capture Discussions

Write discussion on Produce a packet from a wireshark capture
Your posts are moderated
Related Questions
QUESTION The major decision hierarchy for disclosing security problems is if the problem is with the product owned by the business or if it is used by the business. Although th

IP DATAGRAM SIZE:  Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 6

MAC Address The address for a machine as it is identified at the Media Access Control (MAC) layer in the network structure. MAC address is generally stored in ROM on the n

QUESTION a) Compare and contrast between static and dynamic routing. b) What are the merits (five merits) and limitations (3 limitations) of using Open Shortest Path First

Question: (a) Which of the following is not a goal of security: i) detection ii) prevention iii) recovery iv) prosecution (b) You are an honest student. One day you

Question: Quality management standards are seen as a major pillar supporting the drive for continuous quality improvement through TQM. (a) What do you meant by the term ‘Qua

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ

(a) Briefly explain the following security goals provided by cryptography: confidentiality, authentication, integrity and non-repudiation. (b) State Kerckhoff's Princip

Management of Classified Data Management of classified data comprises of its storage, distribution, portability, and destruction of classified data. All information which is not

Evaluations, Assessment, and Maintenance of Risk Controls When the control strategy has been implemented, it should be monitored and measured on an ongoing basis to determine ef