Produce a pcap file from a wireshark capture, Computer Network Security

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the frames captured.

Before completing this task, you must:

1.    Have Wireshark installed on your personal desktop/laptop

2.    Have network (Internet) connectivity to your desktop/laptop

3.    Have completed the packet capture exercises in weeks 1 - 3

This activity cannot be completed on CQUNet connected labs.

Capture Requirements:

You are required to perform a capture of a web search.  In order to do this, you should:

1.    Begin the capture in Wireshark

2.    In your web browser (IE, Firefox, Safari etc.) go to:

3.    Enter your CQU email address in the Catalogue search box

4.    Hit Search

5.    Stop the capture in Wireshark

Posted Date: 3/11/2013 3:57:07 AM | Location : United States







Related Discussions:- Produce a pcap file from a wireshark capture, Assignment Help, Ask Question on Produce a pcap file from a wireshark capture, Get Answer, Expert's Help, Produce a pcap file from a wireshark capture Discussions

Write discussion on Produce a pcap file from a wireshark capture
Your posts are moderated
Related Questions
Access Controls Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control

THREADS AND ATTACKS Threat is an object, person, or other entity which represents a constant danger to an asset. To make sound decisions about information security, management s

Detect each visit to www.google.com that is made by the machine. o Send an alert when an activity relating to network chat is detected. o Send an alert when an attempt is made for

How does the POP functions? What are the advantages/benefits of IMAP over POP? POP stands for Post Office Protocol, version 3 (POP3) is one of the easiest message access protoc

For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi

implementing password policy in organisation

Dropbox’s tool shows how chatbots could be future of cybersecurity

According to the case, The EZ Company introduced a new technology, focusing on the principles of informationintegration and visualization. The company started negotiatinga saleto a

Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.

ADVANCED RESEARCH PROJECT AGENCY (ARPA) The efforts of ARPA was to active all its research groups have accept to new era computers. For this purpose ARPA started investing in wa