Produce a packet from a wireshark capture, Computer Network Security

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the frames captured.

Before completing this task, you must:

1. Have Wireshark installed on your personal desktop/laptop

2. Have network (Internet) connectivity to your desktop/laptop

3. Have completed the packet capture exercises in weeks 1 - 3

This activity cannot be completed on CQUNet connected labs.

Capture Requirements:

You are required to perform a capture of a web search.  In order to do this, you should:

1.    Begin the capture in Wireshark

2.    In your web browser (IE, Firefox, Safari etc.) go to

3.    Enter your CQU email address in the Catalogue search box (see "Screen Capture 1")

4.    Hit Search

5.    Stop the capture in Wireshark

pcap Requirements:

When you examine the frames you have captured in Wireshark, you will probably see a lot of activity apart from your web search.  For the purposes of this assignment, you must strip away all other parts of the capture EXCEPT those relating to the search.  You will need to do some research on how to do this - hint: what does "Follow TCP Stream" do?  The pcap file you submit should contain ONLY the frames relevant to the search.

Posted Date: 3/1/2013 12:10:58 AM | Location : United States







Related Discussions:- Produce a packet from a wireshark capture, Assignment Help, Ask Question on Produce a packet from a wireshark capture, Get Answer, Expert's Help, Produce a packet from a wireshark capture Discussions

Write discussion on Produce a packet from a wireshark capture
Your posts are moderated
Related Questions
Designing and coding of Job search mechanism: Project Title: FREEHIVE (Sep 2005- Nov 2006) Role             : Developer Domain         : Social Network Client

I have an assignment of Computer Security to submit. Will you guys help me making my assignment???

The Cost Benefit Analysis (CBA) Formula CBA determines that whether the control alternative being evaluated is worth cost incurred to control vulnerability or not. CBA easily ca

why is it that sometime we put password in our account to login or signup and it would not work?

What questions should Iris ask Charlie about the new job, about Kelvin''s team, and about the future of the company?

Q. What is Triple Key Management Scheme? The triple key management mechanism provides optimum security by enabling the use of two pre-deployed keys for each of the WS nodes, an

UDP DATAGRAM FORMAT: It is given in the figure below:

Problem (a) IT Service Support within the ITIL framework is divided in a number of processes. Compare and contrast the following processes: i. Incident Management and Problem M

Question: (a) What is the main security vulnerability of IPv4? (b) Which protocol can be used for secure remote login? (c) Distinguish between the transport and tunnel

INTRODUCTION TO PLANNING FOR SECURITY The creation of an information security program begins with creation and review of organization’s information security policies, standards,