Wireshark

.docx

School

Kennesaw State University *

*We aren’t endorsed by this school

Course

3423

Subject

Electrical Engineering

Date

Apr 3, 2024

Type

docx

Pages

8

Uploaded by amir0098

Wireshark Research Description: This lab requires that you do some “hands-on” research regarding the protocols used in the Wireshark captures provided to determine what is happening in the capture. For IT pros, research means going on the web and doing searches to determine how to use IT tools, such as Wireshark. Keep in mind that research and documentation is a big part of what you will do in the real world in your career. You will have to explain to others your findings and propose solutions. “Hands on” means using your brain, too! You may collaborate with other students in your class if you like, just make sure to turn in your own work. Use the capture files “Project Wireshark PCAP Files” in the Lab#5 Module in D2L (you will have to unzip the zip files to extract the individual capture files) to answer the following question . 1
Part I – HTTP 1. Review the first capture file (Project Part I-a) and determine what is happening with the HTTP traffic. a. Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture) i. Source 145.254.160.237 is accessing a webpage and downloading data. It’s requesting info from port 80 or HTTP. I also see a few google ads being sent through from the destination back to the source. They’re using a firefox browser.Take a screenshot of the actual packets within the capture file that you observed this behavior. 2
2. Review the second capture file (Project Part I-b) and determine what is happening with the HTTP traffic in this capture. c. How is the traffic different from the first capture? Describe the traffic: what packets are involved and what is happening? (Include source, destination, time of capture) i. Looks like source 192.168.1.140 is downloading an image from destination 174.143.213.184. The following conversation shows where the packets are being sent and confirmed. a. Take a screenshot of the actual packets within the capture file that you observed. 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help