Produce a pcap file from a wireshark capture, Computer Network Security

Assignment Help:

Question requires you to produce a pcap file from a Wireshark capture.  In addition, you must include a screen capture of Wireshark and some specific information regarding the frames captured.

Before completing this task, you must:

1.    Have Wireshark installed on your personal desktop/laptop

2.    Have network (Internet) connectivity to your desktop/laptop

3.    Have completed the packet capture exercises in weeks 1 - 3

This activity cannot be completed on CQUNet connected labs.

Capture Requirements:

You are required to perform a capture of a web search.  In order to do this, you should:

1.    Begin the capture in Wireshark

2.    In your web browser (IE, Firefox, Safari etc.) go to:

3.    Enter your CQU email address in the Catalogue search box

4.    Hit Search

5.    Stop the capture in Wireshark


Related Discussions:- Produce a pcap file from a wireshark capture

How Ethical are Major Internet Companies?, Ask question #MHow Ethical are M...

Ask question #MHow Ethical are Major Internet Companies?

Data compression and the transport services, Da t a compre s sion a...

Da t a compre s sion and the trans p ort s e rvices,   The main purpose of the transport layer is to provide services which are efficient, reliable and cost-effecti

Carrier sense multiple access (csma), CARRIER  SENSE MULTIPLE ACCESS (CSMA...

CARRIER  SENSE MULTIPLE ACCESS (CSMA) There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate tran

Define broadcasting , Broadcasting is the distribution of video and audio...

Broadcasting is the distribution of video and audio content to a whole audience via any audio or visual mass communications medium, but generally one using electromagnetic radiat

Describe how ipsec provides data source authentication, Question: (a) ...

Question: (a) Describe how IPSec provides data source authentication. (b) Which protocol can be used to provide limited traffic analysis confidentiality? Why is it "limite

Ipv6 base header format, IPV6 BASE HEADER FORMAT: It has less informat...

IPV6 BASE HEADER FORMAT: It has less information than IPV4 message header. Next header shows to first extension message header. Flow label is partitioned into a TRAFFIC CLASS

Ipv6 datagram format, IPV6 DATAGRAM FORMAT It is given in the figure b...

IPV6 DATAGRAM FORMAT It is given in the figure below:

Draw the waveform for an asynchronous transmission, Question: (a) Draw...

Question: (a) Draw the waveform for an asynchronous transmission with the following specifications: Character "H", one even parity bit, one start bit, one stop bit, and a b

Man-in-the-middle attacker, - Alice, Bob and Charlie have a secret key a=3,...

- Alice, Bob and Charlie have a secret key a=3, b=4, c=5, in that order. - They would like to find a common secret key using Diffie-Hellan key exchange protocol (with g=2, p=5).

Does ssl protect against eavesdropping, QUESTION (a) Consider the follo...

QUESTION (a) Consider the following authentication options A. Using password B. Using pin and fingerprint Which option A or B provides stronger security and why? (b

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd