NetworkForensics2lab (1)

pdf

School

University of Akron *

*We aren’t endorsed by this school

Course

281

Subject

Computer Science

Date

Dec 6, 2023

Type

pdf

Pages

9

Report

Uploaded by MasterEnergy7404

Lab 2 Bentley- 1 Lab 2- Wireshark Analysis Shakyra Depree Bentley The University of Akron Network Forensics 1 Professor: Stanley Smith Date: 11 October 2023
Lab 2 Bentley- 2 Purpose: The purpose of this Lab 2- Wireshark is the Scope: The scope of this lab is to become familiar with Wireshark. Starting with understanding how the application operates, then capturing file samples in looking into the protocol, finishing the proper layer in the OSI model, and demonstrating the process to determine the OUI for the Source & Destination. That is the scope of Lab 2- Wireshark. Limitations: The limitations of this lab would be not having access to Wireshark to complete the lab. Another limitation for this lab is not having access to a computer to create Lab 2. Those are the limitations I found in Lab 2- Wireshark Analysis.
Lab 2 Bentley- 3 Lab Assignment : 1. Install Wireshark and provide/include a screen capture of the " About Wireshark " found under the Help option on the Wireshark menu bar. 2. Select a " sample " capture file to complete the lab questions and enter the full name and description of the file contents. a. The sample used is C:\User\sdepr\Downloads\WiresharkMasterclass_Lessoon9_ ExtractingFiles.pcapng 3. Choose the Capture File Properties (Statistics) and interpret the results of the output [ provide a screen capture of the output ]. a.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Lab 2 Bentley- 4 4. Select the Protocol Hierarchy (Statistics) and interpret the results of the output [ provide a screen capture of the output ]. a. 5. Choose the IP Protocol Types (Statistics) and interpret the results of the output [ provide a screen capture of the output ]. a. 6. Select and interpret a sample of network traffic that represents the OSI Layer 7 Activity [ provide a screen capture of the sample ]. a. 7. Select and interpret a sample of network traffic that represents the OSI Layer 4 Activity [ provide a screen capture of the sample ].
Lab 2 Bentley- 5 a. 8. Select and interpret a sample of network traffic that represents the OSI Layer 3 Activity [ provide a screen capture of the sample ]. a. 9. Select and interpret a sample of network traffic that represents the OSI Layer 2 Activity [ provide a screen capture of the sample ]. a. 10. Briefly summarize the purpose and explain the process to obtain the OUI for a MAC Address. a. The purpose of obtaining the OUI for the MAC Address is to uniquely identify the company or manufacturer that made network equipment, an OUI (Organizationally Unique Identifier) for a MAC (Media Access Control) address is required. To guarantee that MAC addresses are globally unique, OUIs are
Lab 2 Bentley- 6 necessary. The process of discovering the OUI from the MAC address is the first 3 octets of the MAC address are the OUI. 11. Select a sample of network traffic and explain why it represents the Source & Destination MAC Addresses [ provide a screen capture of the output ]. a. 12. Demonstrate and show the process to determine the OUI for the Source & Destination MAC Addresses listed in #11. a. 13. Select a sample of network traffic and explain why it represents the Source & Destination IP Addresses [ provide a screen capture of the output ]. 14. Demonstrate and show the process to determine the Domain Registration for the Source & Destination IP Addresses listed in #13. 15. Select a sample of network traffic and explain why it represents the Source & Destination Port Numbers [ provide a screen capture of the output ]. 16. Demonstrate and show the process to determine the well-known ports, registered ports, or other for the Source & Destination Port Numbers listed in #15.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Lab 2 Bentley- 7 Network Forensics Acquisition Process : Network Forensics Analysis/Examination :
Lab 2 Bentley- 8 Glossary of Terms: 1. Destination IP Address- 2. Destination MAC Address 3. MAC Address- A unique identifier assigned to network devices like computers, switches, and routers. These addresses are usually assigned by the manufacturer and are represented as six groups of two hexadecimal digits. 4. OUI- 5. Source IP Address 6.
Lab 2 Bentley- 9 References: Davidoff, Sherri, and Jonathan Ham. Network Forensics: Tracking Hackers Through Cyberspace . Prentice Hall, 2012.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help