NetworkForensics2lab

pdf

School

University of Akron *

*We aren’t endorsed by this school

Course

281

Subject

Computer Science

Date

Dec 6, 2023

Type

pdf

Pages

8

Report

Uploaded by MasterEnergy7404

Lab 2 Bentley- 1 Lab 2- Wireshark Analysis Shakyra Depree Bentley The University of Akron Network Forensics 1 Professor: Stanley Smith Date: 11 October 2023
Lab 2 Bentley- 2 Purpose: The purpose of this Lab 2- Wireshark is the Scope: The scope of this lab is to become familiar with Wireshark. Starting with understanding how it the application operates, then capturing file samples in looking into the protocol, finishing the proper layer in the OSI model, and demonstrating the process to determine the OUI for the Source & Destination. That is the scope of Lab 2- Wireshark. Limitations: The limitations of this lab would be not having access to Wireshark to complete the lab. Another limitation for this lab is not having access to a computer to create Lab 2. Those are the limitations I found in Lab 2- Wireshark Analysis.
Lab 2 Bentley- 3 Lab Assignment : 1. Install Wireshark and provide/include a screen capture of the " About Wireshark " found under the Help option on the Wireshark menu bar. 2. Select a " sample " capture file to complete the lab questions and enter the full name and description of the file contents. 3. Choose the Capture File Properties (Statistics) and interpret the results of the output [ provide a screen capture of the output ]. 4. Select the Protocol Hierarchy (Statistics) and interpret the results of the output [ provide a screen capture of the output ]. 5. Choose the IP Protocol Types (Statistics) and interpret the results of the output [ provide a screen capture of the output ].
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Lab 2 Bentley- 4 6. Select and interpret a sample of network traffic that represents the OSI Layer 7 Activity [ provide a screen capture of the sample ]. 7. Select and interpret a sample of network traffic that represents the OSI Layer 4 Activity [ provide a screen capture of the sample ]. 8. Select and interpret a sample of network traffic that represents the OSI Layer 3 Activity [ provide a screen capture of the sample ]. 9. Select and interpret a sample of network traffic that represents the OSI Layer 2 Activity [ provide a screen capture of the sample ]. 10. Briefly summarize the purpose and explain the process to obtain the OUI for a MAC Address. a. The purpose of obtaining the OUI for the MAC Address is to uniquely identify the company or manufacturer that made a network equipment, an OUI (Organizationally Unique Identifier) for a MAC (Media Access Control) address is required. To guarantee that MAC addresses are globally unique, OUIs are necessary. The process of discovering the OUI from the MAC address is the first 3 octets of the MAC address are the OUI. 11. Select a sample of network traffic and explain why it represents the Source & Destination MAC Addresses [ provide a screen capture of the output ]. 12. Demonstrate and show the process to determine the OUI for the Source & Destination MAC Addresses listed in #11. 13. Select a sample of network traffic and explain why it represents the Source & Destination IP Addresses [ provide a screen capture of the output ]. 14. Demonstrate and show the process to determine the Domain Registration for the Source & Destination IP Addresses listed in #13.
Lab 2 Bentley- 5 15. Select a sample of network traffic and explain why it represents the Source & Destination Port Numbers [ provide a screen capture of the output ]. 16. Demonstrate and show the process to determine the well-known ports, registered ports, or other for the Source & Destination Port Numbers listed in #15.
Lab 2 Bentley- 6 Network Forensics Acquisition Process : Network Forensics Analysis/Examination :
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Lab 2 Bentley- 7 Glossary of Terms: 1. Destination IP Address- 2. Destination MAC Address 3. MAC Address- 4. OUI- 5. Source IP Address 6.
Lab 2 Bentley- 8 References: Davidoff, Sherri, and Jonathan Ham. Network Forensics: Tracking Hackers Through Cyberspace . Prentice Hall, 2012.