Produce a packet from a wireshark capture, Computer Network Security

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the frames captured.

Before completing this task, you must:

1. Have Wireshark installed on your personal desktop/laptop

2. Have network (Internet) connectivity to your desktop/laptop

3. Have completed the packet capture exercises in weeks 1 - 3

This activity cannot be completed on CQUNet connected labs.

Capture Requirements:

You are required to perform a capture of a web search.  In order to do this, you should:

1.    Begin the capture in Wireshark

2.    In your web browser (IE, Firefox, Safari etc.) go to

3.    Enter your CQU email address in the Catalogue search box (see "Screen Capture 1")

4.    Hit Search

5.    Stop the capture in Wireshark

pcap Requirements:

When you examine the frames you have captured in Wireshark, you will probably see a lot of activity apart from your web search.  For the purposes of this assignment, you must strip away all other parts of the capture EXCEPT those relating to the search.  You will need to do some research on how to do this - hint: what does "Follow TCP Stream" do?  The pcap file you submit should contain ONLY the frames relevant to the search.

Posted Date: 3/1/2013 12:10:58 AM | Location : United States







Related Discussions:- Produce a packet from a wireshark capture, Assignment Help, Ask Question on Produce a packet from a wireshark capture, Get Answer, Expert's Help, Produce a packet from a wireshark capture Discussions

Write discussion on Produce a packet from a wireshark capture
Your posts are moderated
Related Questions
Problem (a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a TCP segment. The second screen capture is from the data portion of the frame.

a) Wireless local area network (WLAN) technologies constitute a fast-growing market introducing the flexibility of wireless access into office, home, or production environments. G

Question: Quality management standards are seen as a major pillar supporting the drive for continuous quality improvement through TQM. (a) What do you meant by the term ‘Qua

Internet Protocol IP Gives computer-to-computer communication. Host and receiver addresses are computers. This is also known machine-to-machine communication.

(a) What are the different architectures for wireless networks? (b) Explain how WEP authentication and encryption works, describe the vulnerability. (c) In what ways are secu

UDP DATAGRAM FORMAT: It is given in the figure below:

Problem: (a) What is the minimum length of a password that could be considered to be "strong" in the context of today's computing power? (b) The security of a PIN system,

(a) Illustrate what you understand by Nyquist Capacity Theorem? (b) Consider we wish to transmit at a rate of 64 kbps over a 4 kHz noisy but error-free channel. What is the mini

Question: (a) State the strong law of large numbers. (b) Data have been collected on response times (in minutes) at a fire station. The data are 2:7 1:8 0:8 1:4 1:2 (i

Question: (a) Consider that you enter the given URL in the address bar of a popular web client and that both the client and server accepts HTTP version 1.1. i. What can be t