Week1LabReport

.docx

School

American Public University *

*We aren’t endorsed by this school

Course

422

Subject

Electrical Engineering

Date

Feb 20, 2024

Type

docx

Pages

2

Uploaded by Coder1984

Report
Lab 1 -Performing Reconnaissance and Probing using Common Tools ISSC422 American Military University Professor Remy Long
Part 1 Step 11 @ OnDemand Workbench - Google Chrome O X @ dcm toolwire. com/tra\nmg/Jsp/odw/frameset _jbl_ft_4tab_vm.jsp Capturing from Student [Wireshark 1.10. 5 (SVN Rev 54262 from /trunk-1. 10)] File Edit View Go Capture Analyze Statistics Telephonx Tools |Internals Help 8. Type cmd and press Enter to open a command prompt. 9. At the prompt, type ping oc@4am g BXXZ Ae¢sDT L QAef #§Emx » 172.30.0.10 and press Enter. | Expression... Clear Apply Save | 10. At the prompt, type exit and Destination Protocol Length Info e i : Broadcast 42 who has 172.30.0.107 2 0.00460800 6e:33:76:5d:6b:e4 9e:ea:29:b5:d6:3d ARP 60 172.30.0.10 is at 6e:3: Though your data will not match 3 0.00464400172.30.0.2 172.30.0.10 ICMP 74 echo (ping) request i the following figure, you should 4 0.00967800 6e:33:76:5d:6b:e4 Broadcast ARP 60 who has 172.30.0.27 T still see that Wireshark has 5 0.00970700 9e:ea:29:b5:d6:3d 6e:33:76:5d:6b:e4 ARP 42 172.30.0.2 is at 9e:ea captured the Ping traffic as 6 0.01447300172.30.0.10 172.30.0.2 ICMP 74 echo (ping) reply ic packets using the ICMP protocol 7 1.02287800172.30.0.2 172.30.0.10 ICMP 74 echo (ping) request i (Internet Control Message 8 1.02432300172.30.0.10 172.30.0.2 ICMP 74 echo (ping) reply ic Protocol). 9 2.03856900172.30.0.2 172.30.0.10 ICMP 74 echo (ping) request ¢ 10 2.03942200172.30.0.10 172:30.0.2 ICMP 74 echo (ping) reply ic | Figure 5 Capturing ICMP 11 3.05415600172.30.0.2 172.30.0.10 1CMP 74 echo (ping) request 1ic packets 12 3.05514300172.30.0.10 172.30.0.2 1CMP 74 echo (ping) reply ic 11. Make a screen capture 13 4.91741000 fe80: :bc9e:45ff:fed ff02::fb MDNS 101 standard query 0x0000 showing the Wireshark traffic 4.91741900172.30.0.11 224.0.0.25 MDNS 81 standard query 0x0000 that you captured and paste it into your Lab Report file. . (2 Closedne Wi snarowindow: # Frame 1: 42 bytes on wire (336 bits), 42 bytes captured (336 bits) on interface 0 13. When prompted, click Stop + Ethernet II, Src: 9e:ea:29:b5:d6:3d (9e:ea:29:b5:d6:3d), Dst: Broadcast (ff:ff:ff:ff:ff:ff) + Address Resolution Protocol (request) and Quit without Saving to close the application without saving the packet capture. 0000 ff ff ff ff ff ff 9e ea 29 b5 d6 3d 08 06 00 01 ........ 5 0010 08 00 06 04 00 01 9e ea 29 b5 d6 3d ac 1e 00 02 ........ p Y 0020 00 00 00 00 00 00 ac 1e 00 0a ........ .o N . Double-click the NetWitness Investigator icon on the VvWorkstation desktop to open the application. v 7:16 AM 12/7/2017 RR A m & D 10:16 AM % 12/7/2017
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help