Write a display filter expression to count all tcp packets

Assignment Help Computer Networking
Reference no: EM131077475

Wireshark Packet Capture

Download the appropriate Wireshark platform and install it on your computer https://www.wireshark.org/download.html

View the below links for some Wireshark tutorials.

https://www.howtogeek.com/104278/how-to-use-wireshark-to-capture-filter-and-inspect-packets/

https://www.youtube.com/watch?v=y-4UQSXkqig

Search for online tutorials and other handy information, such as YouTube videos for using Wireshark in addition to the above.

Packet Capture Experiment Description Write the exact packet capture filter expressions to accomplish the following:

1. Capture all TCP traffic to/fromhttps://webcampus.wilmu.edu, during the time when you are logging in to your Webcampus account. Your capture should already be running.

2. Capture all HTTP traffic to/from Webcampus, when you log in to your Webcampus account

3. Find a popular YouTube video and play it while capturing all traffic to/from YouTube.

4. Save all your captured packets as you will need to submit them along with your report.

After you run Wireshark with the above capture filters and collect the data, do the following:

1. Write a DISPLAY filter expression to count all TCP packets (captured under item #1) that have the flags SYN, PSH, and RST set. Show the fraction of packets that had each flag set.

2. Use a DISPLAY filter expression to separate the packets sent by your computer vs. received from Webcampus and YouTube Note that when sniffing out TCP packets, you will be receiving TCP packets, SSL packets, and HTTP packets. This is because HTTP/SSL run on top of TCP and you capture their packets by default because they are subclasses of TCP packets. So, capture them all and store in a local database. Then use display filters to separate the subset of TCP packets that are also HTTP packets. (You can do this by filtering only packets on port 80). Note that some of your sessions, e.g., Facebook, may be using secure HTTP (HTTP/SSL or HTTPS), which uses the port number 443.

Report Preparation and Submission

The report should contain the following information:

Location where the experiments were run (University campus/lab, home, other) and the type of your computer. Exact Wireshark filters used for capture and display. To improve the readability of your report, provide the filter expressions in separate lines and use the Courier font to write the filters. Screenshots of the filters results Explanation for every component of your filter expressions. The exact URL for all Youtube videos that you visited for this experiment. Include any reference sources. Attach the captured packets files to your submission.

Reference no: EM131077475

Questions Cloud

Opportunity to receive and respond to instructor feedback : After you submit your assignment on time, you will have the opportunity to receive and respond to instructor feedback. Guided by specific feedback provided by your instructor, you will be able to make improvements to your assignment and potentiall..
Describe merits of social and behavioral science policies : Discuss the influences of social, organizational and individual factors on the use of information technology by end users. Engage in dialogue and learning from others to advance public health goals.
What recommendations do you suggest to help keep training : From my experience, including screen shots seem to help. Lynn and class, what recommendations do you suggest to help keep training interesting?
Complete external analysis - elements in the pest analysis : Complete your external analysis using each of the four elements in the PEST analysis. When considering economic data, use the most current data you can find.
Write a display filter expression to count all tcp packets : Write a DISPLAY filter expression to count all TCP packets (captured under item #1) that have the flags SYN, PSH, and RST set. Show the fraction of packets that had each flag set.
Write a c++ interface for the set : Then write a C++ interface for the set. Include javadoc -style comments in your code.
The following system of non-linear equations : 1. In an Excel worksheet titled "Solver", solve the following system of non-linear equations using the Solver and find u, v, and t. Eqn
Middle eastern market : Lydia went out of town and wanted someone to feed her pet. Joe told me he gave her cat food. He has no reason to lie, and so I believe him. So, Joe gave Lydia cat food. That's a bizarre going away gift. So Joe gives very strange gifts.
Post your thoughts on perception vs reality of cyber threat : Read the article "Cyber Security Risk: Perception vs. Reality in Corporate America". After reading the article, please post your thoughts on the perception vs. reality of a cyber threat against a SCADA system.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd