COIT20262: Advanced Network Security- Analysis of Protocols- Report Writing Assignment

Responsive Centered Red Button

Need Help with this Question or something similar to this? We got you! Just fill out the order form (follow the link below), and your paper will be assigned to an expert to help you ASAP.

Internal Code: TV242
Report Writing Assignment:
Task:
Question 1. Analysis of Protocols with Wireshark
Objective: Gain a good understanding of common Internet protocols as well as using packet capture software (Wireshark)
The file a01-assignment-1-question-1-capture.pcap on Moodle contains packets captured in an exchange between several computers.
The capture was performed in an internet where all subnets used a /24 mask. The capture was performed on interface eth1 on a computer with the following details:
security
Use the file and the above information to answer the following sub-questions. Do not try to guess answers; use only the above information, the capture file and your knowledge of networking and security to find the answers.
(a) Several applications were used on several different computers. Complete the table to summarise the applications in use in the network. The columns are:
1. Application name or protocol, e.g. Web, SSH, ?, where ? means cannot determine from the capture.
2. Transport protocol. TCP, UDP, ICMP or other.
3. Client Port(s). Use a range, e.g. 1-10, if the client changes ports for each connection.
4. Server Port, Client IP, Server IP.
5. Time of use. The time when the application is in use. Round to the nearest second. Use a range, e.g. 0-4 seconds.
The first row includes example values of selected columns. Complete (or edit) and add further rows as necessary.
security1
(b) Complete the address table below to show known address information of computers/interfaces in the network. Some information in the table may not be known (e.g. cannot be determined from the capture). Use a question mark “?“ in the table if the information is not known. Use only the information in the question and the capture file to determine the answers (do not guess).
security2
(c) Some of the computers in the network have domain names as well as IP addresses. List the IP address and domain name of each computer with a domain name, and give the packet number where you found the domain name.
(d) Consider the 1st TCP connection in the capture (which starts at packet number 3 in the capture file). Draw a message sequence diagram that illustrates all packets in that TCP connection. A message sequence diagram uses vertical lines to represent events that happen at a computer over time (time is increasing as the line goes down). Addresses of the computers/software are given at the top of the vertical lines. Horizontal or sloped arrows are used to show messages (packets) being sent between computers. Each arrow should be labelled with the protocol, packet type and important information of the message. Examples of message sequence diagrams are given in workshops. Note that you do not need to show the packet times, and the diagram does not have to be to scale.
(e) Briefly explain how a TCP connection starts (or opens), and how it completes (or closes), using the 1st TCP connection from the capture (and your message sequence diagram above) as an example.
(f) Some of the computers in the network are running a web server. Choose one of the computers and then list which files exist on the web server, and which files do not exist on the web server. Explain how you know the files (that is, refer to the packet number(s) in the capture).
(g) What is the password? [0 marks – this is challenge, but worth no marks. Don’t tell other students the answer if you find it.]

How to create Testimonial Carousel using Bootstrap5

Clients' Reviews about Our Services