What is the IP address of the infected Windows computer

Assignment Help Computer Network Security
Reference no: EM132225728 , Length: word count:2200

Assignment -

Complete the Wireshark Column Display Exercise  and provide a screen shot of your re-configured Wireshark user interface.

Complete a 3-5 page reflection (double spaced) for Situation 1 and a 3-5 page reflection (double spaced) for Situation 2. Given these sample incident reports, write about what you learned, what you have questions about, what you researched as part of this review, and anything else you feel is relevant.

Project will begin by introducing you to the process of malware traffic analysis. Review the following situations utilizing Wireshark:

1. Situation: Traffic Analysis Exercise

Download this PCAP source file

Review the sample analysis discussing these questions:

  • What was the date and time of the infection?
  • What is the MAC address of the infected Windows computer?
  • What is the IP address of the infected Windows computer?
  • What is the host name of the infected Windows computer?
  • What type of malware was the computer infected with?
  • What is the name of the malware that infected the user's computer?
  • What exploit kit was used to infect the user's computer?
  • What compromised website kicked off the infection chain of events?
  • Before the Windows computer was infected, what did the user search for on Bing?
  • Which campaign(s) used the exploit kit noted in the pcap?
  • What are the indicators of compromise (I0Cs) from the pcap?

2. Situation: Co-worker Suffers from March Madness

You work as an analyst at a Security Operations Center (SOC) for Pollerman's Pharmaceuticals, a regional pharmaceutical conglomerate. You work the same shift as another analyst named Leonard.

Your relationship with Leonard is a lot like Jerry's relationship with Newman on episodes of Seinfeld. You find Leonard comically annoying.

Leonard was tasked to investigate some suspicious traffic, but he came down with a case of "March madness" and left the work undone. He called in sick, and now you have to pick up where he left off. He only saved traffic for the affected IP address in a pcap file.

Students Should:

Download this PCAP source file

Review the sample analysis discussing these questions:

  • Date and time of the activity
  • MAC address of the affected Windows computer
  • IP address of the affected Windows computer
  • Host name of the affected Windows computer
  • What happened

Attachment:- Assignment Files.rar

Reference no: EM132225728

Questions Cloud

What is strategic management and why is it critical : Prepare a 4-6-page case analysis on the topic of strategic management and why it is critical to the success of an organization in meeting its goals and mission.
Explain the financial and nonfinancial implications : Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments.
Identify the information needed to develop a template : Identify the information needed to develop a template that will be used to complete the individual employee's learning plan.
Describe the role of each member of your grad team : An important aspect of achieving your academic goal is knowing the academic advising you have available as an Argosy student.
What is the IP address of the infected Windows computer : Project will begin by introducing you to the process of malware traffic analysis. What is the IP address of the infected Windows computer
Discuss the main functions of hrm : Final Thoughts: After all you have learned from the textbook, research you have conducted, and discussions with fellow students;
What conditions need to be in place for teams to excel : What conditions need to be in place for teams to excel and why? Suggestion ways to design teamwork so that threats to performance is minimized
Identify a challenge you might encounter : Identify a challenge you might encounter related to human resource management and your specific topic. Briefly describe the challenge you are being faced.
Create a concise expose of two strategic planning concepts : Create a concise expose of two strategic planning concepts that may be utilized in your own organization. Do some research and write a 500-600-word summary.

Reviews

len2225728

2/1/2019 3:05:41 AM

Need 8 pages (2200 words). Instructions - Grammar and turnitin report is mandatory. Given this information: Install Wireshark o on either your system or a virtual machine is available at your request (email the instructor though Canvas- allow for a 3 day turn around). It is important to note that Wireshark is an essential tool and it is recommended that you install this on your individual system since it is a tool that will be used in the professional environment as well.

len2225728

2/1/2019 3:05:35 AM

Complete the Wireshark Column Display Exercise and provide a screen shot of your re-configured Wireshark user interface. Review both PCAPs within Wireshark and step through the analysis in Situations #1 and #2 to see if your data matches the one provided in the incident report. Complete a 3-5 page reflection (double spaced) for Situation #1 and a 3-5 page reflection (double spaced) for Situation #2. Given these sample incident reports, write about what you learned, what you have questions about, what you researched as part of this review, and anything else you feel is relevant. Later in the course, you will be asked to complete an incident report on a given PCAP but this project is meant to introduce you to the exercise of packet analysis and incident reporting.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd