Obtain a packet sniffer and install it on your home system

Assignment Help Computer Networking
Reference no: EM131308653

Assignment

Introduction

In this assignment you will use several network tools to look at the protocols and data exchanged between network components. We will be only scratching the surface of the usefulness of these tools but the intent is for you to recognize the tools and understand how they can be useful for troubleshooting as well as simply understanding what is going on in your networks. You will consider the inherent danger of having such tools available indiscriminately and analyze how the information they make available could have information security implications in an enterprise or even for you as an individual.

For this assignment you will need to acquire a network sniffer (also called a packet sniffer). We describe the use of Wireshark which is freely available for MS Windows and provides a GUI. You may use another sniffer if you prefer.

Activities and Deliverables

You are required to perform Task A, B, and C. Submit a short paper which describes your experiences with the tasks performed and includes the answers to questions posed for the individual tasks. Each task is described below.

Task A: Using a Sniffer

Obtain a packet sniffer and install it on your home system. The instructions below have been written presuming that Wireshark has been your choice. Wireshark has a Windows-friendly interface and supports immediate translation of a large, but not exhaustive, set of protocols and interfaces. It is available for free download athttps://www.wireshark.org/. Before installing Wireshark, be sure you read and understand the licensing restrictions. Do not install the program on a computer that does not belong to you without express permission. Sniffers are considered "information assurance" vulnerabilities by most organizations. The tasks posed in this assignment are not questionable uses of the product but some security personnel will consider unapproved installation of a sniffer self-evident of improper activities.

Capture packets in your sniffer. If you need to choose an interface, choose the one through which you receive your Internet connection. Stop after a few packets are received (you may not be able to stop before more than 100, depending on how you are connected to the Internet). If using a command-line sniffer such as tcpdump you will need to specify the number of packets to stop after, and five or ten is sufficient. If using Wireshark, you will likely have to start the sniffer ("Capture" + "Interfaces" + start button for your selected interface) and then stop it ("Capture" + "Stop" or control-E) almost immediately if you are on a shared interface; ten packets collected is sufficient. In most cases, you will see a variety of packets including ARP and UDP. You may also see TCP and other types of packets if you are on a shared interface.

Save two or three UDP packets into a file. This can be done using copy-and-paste if necessary. Wireshark provides the ability to do this from its "File" + "SaveAs" drop-down menu options. You may have to filter or otherwise select the packets you save depending on the tool you chose.

Clear the capture buffer ("File" + "Close" + "Continue without saving" in Wireshark) or restart the sniffer and this time capture only TCP packets.

While the capture is running, point your browser to https://www.umuc.edu/and start it. Then, relatively quickly, stop the capture in thesniffer. You should see several TCP packets captured and should now save two or three of the lengthier ones into a file. You now have your real live packet data to analyze.

Include the saved packets in your submission, preferably as a text file embedded in your submission at the end. Alternatively the packets could be attached as a ".TXT" file or a Wireshark/tcpdump capture file (".CAP").

Provide a paragraph or two describing the ethical use of a packet sniffer. What are its legitimate uses? What should it not be used for? Explain your reasoning.

Task B: Address Resolution (ARP and Ping)

Note: You may be unable to do these actions from work but should be able to do them from home and on Polaris or Nova. Some network administrators block ping at the border routers. Others disable commands because of information assurance concerns.

Collect the current contents of the ARP table and save it in a file. The command "arp -a" will accomplish this on both Windows and Unix systems.

Start up your sniffer and engage the capture. You want to capture ARP packets.

Use the "ping" command to resolve a known address that is available on the networks but is not likely to have already been inserted in the ARP table. On your home system this should be easy because the table will be short and you'll know what sites you've visited recently. On Polaris or Nova it may take a little more work and investigation and a Web page like Google probably will already be in the table.

Stop your sniffer.

Capture the current contents of the ARP table again into a different file.

Locate two "ARP" packets in what your sniffer captured. If there are more, try to locate at least one that corresponds to what was "ping"ed. Put these into a separate file or paste them into your paper and include them with your submission.

Include a paragraph or two in your final submission on the advisability of having the ARP tool available without restrictions on all workstations of an enterprise's network. Explain your reasoning.

TASK C - Simple Encryption

The ciphertext below (which is related to this course) is an example of encryption using a monoalphabetic substitution cipher.

W K H F R X U V H W L W O H L V F P L V 7 6 8 F R P S X W H U Q H W Z R U N L Q J

What is the plaintext for this?

What key was used?

Reference no: EM131308653

Questions Cloud

What is the projects discounted payback : Project L costs $45,000, its expected cash inflows are $11,000 per year for 8 years, and its WACC is 8%. What is the project's discounted payback?
Calculate price of the bond when it was originally issued : To calculate the price of the bond when it was originally issued, you will use the function PV. By using the function PV calculate the price of the bond when it was originally issued.
Indifferent between the new and the old leases : A store has 5 years remaining on its lease in a mall. Rent is $1,900 per month, 60 payments remain, and the next payment is due in 1 month. The mall's owner plans to sell the property in a year and wants rent at that time to be high so that the prope..
Analyze the impact that the choice of model : From the first e-Activity, specify whether your state follows the private insurance model or the Medicaid model for its CHIP. Analyze the impact that the choice of model has on the fiscal health of your state. Provide two (2) examples of this impa..
Obtain a packet sniffer and install it on your home system : Obtain a packet sniffer and install it on your home system. The instructions below have been written presuming that Wireshark has been your choice.
Comparing return and growth on investments : Donald and Gabby are going to invest some of their money for two years from January 1, 2016 to December 31, 2017. Use 2016 rates, etc for both 2016 and 2017. Their taxable income without any return is $200,000. They will invest $55,720 for two years,..
How are law enforcement officers trained : how are law enforcement officers trained about youth gangs? Present a detailed overview of currently available training designed to teach law enforcement officers about youth gangs.
Create a small bank account database with one account table : Create a small Bank Account database with one Account table. The Account table Should have fields for account number, customer last and first names, and current balance.
Rapidly and currently needs to retain all of its earnings : Computech Corporation is expanding rapidly and currently needs to retain all of its earnings; hence, it does not pay dividends. However, investors expect Computech to begin paying dividends, beginning with a dividend of $1.50 coming 3 years from toda..

Reviews

Write a Review

Computer Networking Questions & Answers

  What are the distinguishing features of a lan

Define local area network. - What are the distinguishing features of a LAN? -  What are two reasons for developing LANs?

  Identification of the one thing about prototyping

Find an article on prototyping and write a one-page (250-word) paper that includes the following: A description of the article and where it was found and Identification of the one thing about prototyping that surprised you the most

  Essay about effective of wireless technology

Write an essay about effective of wireless technology on PHYCHOLOGICAL CONSIDERATIONS and CULTURAL CONTEXT

  A large environmental organization

A large environmental organization that provides services suchs as water quality monitoring and geological surveys to businesses and government agencies across the nation, needs help designing its corporate WAN

  Explain differences between viruses and worms

the differences between viruses and worms in their behavior, characteristics, and attack vectors. Their exploitation has been devastating in the past. Provide some examples of those malware outbreaks we have seen in the past.

  Describe the location and the use of a geo satellite

Digital cellular telephones can be used for what common applications? List and explain five of them. Define i-Mode. Describe the location and the use of a GEO satellite.

  Write down changes does ftp make to ascii file

Write down changes does FTP make to ASCII file when you download it in ASCII mode to Windows machine from Linux server.

  Validating the operation of the dhcp server

Screenshots from your client device validating the operation of the DHCP server

  How are pentium chips manufactured

How are Pentium chips manufactured?

  Implement stream socket for communication

You are required to implement stream socket for communication and both client and Server to be implemented on the same machine for demonstration

  Discuss the various different vpn solutions

Security is a major concern among all vendors in and out of the networking world. Despite this being a global issue, the network is still to blame. Discuss the various different VPN solutions and the protocols they use to secure data end-to-end

  Describe basic wireless network maintenance functions

Describe basic wireless network maintenance functions. Producers are continuously releasing firmware upgrades for their products. If you were manager of WLAN.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd