Produce a pcap file from a wireshark capture, Computer Network Security

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the frames captured.

Before completing this task, you must:

1.    Have Wireshark installed on your personal desktop/laptop

2.    Have network (Internet) connectivity to your desktop/laptop

3.    Have completed the packet capture exercises in weeks 1 - 3

This activity cannot be completed on CQUNet connected labs.

Capture Requirements:

You are required to perform a capture of a web search.  In order to do this, you should:

1.    Begin the capture in Wireshark

2.    In your web browser (IE, Firefox, Safari etc.) go to:

3.    Enter your CQU email address in the Catalogue search box

4.    Hit Search

5.    Stop the capture in Wireshark

Posted Date: 3/11/2013 3:57:07 AM | Location : United States







Related Discussions:- Produce a pcap file from a wireshark capture, Assignment Help, Ask Question on Produce a pcap file from a wireshark capture, Get Answer, Expert's Help, Produce a pcap file from a wireshark capture Discussions

Write discussion on Produce a pcap file from a wireshark capture
Your posts are moderated
Related Questions
QUESTION (a) Consider the following authentication options A. Using password B. Using pin and fingerprint Which option A or B provides stronger security and why? (b

In the e-mail system, where the e-mail messages are saved and why? E-mail messages are saved in user’s private electronic mailbox. A mailbox refers to a local/domestic hard drive c

Question (a) A CRC is constructed to generate a 4-bit FCS for an 11-bit message. The divisor polynomial is X 4 + X 3 + 1 (i) Encode the data bit sequence 00111011001 using po

QUESTION: (a) Show the Negative Cycle Algorithm in Minimum Cost Flows. (b) List the steps added in finding a Negative Cycle. (c) Apply Dijkstra's algorithm on the subs

LOG FILE MONITORS Log file monitor (LFM) is similar to NIDS. It reviews log files generated by servers, network devices, and even other IDSs for patterns and signatures. Pattern

CarALouer provides rental of cars to its customer on a regional basis i.e. a car is attached to a regional home-base which also houses a regional office of the company. Each regi

QUESTION A small ISP requests your help. The technicians report that they have had no downstream access to the Internet. They believe the problem lies with their access provide

QUESTION: a) Below is a capture of an Ethernet II frame which has an IPv4 packet and a segment. Provide the source MAC address in hexadecimal; the source IP address, the length

Selecting a Risk Control Strategy Risk controls involve selecting one of the 4 risk control strategies for every vulnerability. The flowchart is shown in the figure given below

a) Calculate the CRC for the frame below: Frame: 1101011011 Generator: 10011 Message after appending 4 zero bits: 11010110110000 b) OSI refers to a system in which any