Lab 18 Q & A

.docx

School

Santa Fe College *

*We aren’t endorsed by this school

Course

CET1600

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

2

Uploaded by BaronTurtleMaster3907

Report
1. Highlight which kind of pod the lab was done in NetLab: Network Security Security+ 2. Provide the lab # in NetLab. Lab #: 18 3. What is the name of the lab in NetLab you completed? Name of the Lab : Wireless Networking Attack and Mitigation Techniques Provide about 100-150 words as an answer for each question. Make sure to explain specific terminology from the lab and what protocols or configurations should be used to be more secure. Each question s answer should have new information (i.e. don t just restate the same thing in each). 4. Provide one screenshot from the lab. Explain with specific details how this screenshot captures the purpose of the lab. Make sure you reference the information in the screenshot specifically (may want to circle or highlight relevant information in it). In the provided image, our focus is on network analysis, utilizing Wireshark as a pivotal tool. Our primary objective is the thorough examination of network traffic patterns, particularly emphasizing FTP (File Transfer Protocol) traffic. This examination has unveiled the presence of anonymous usernames and passwords, prompting our action to bolster network security through the implementation of comprehensive mitigation measures. These measures aim not only to uncover compromised users but also to mitigate lurking threats within the network's intricate fabric. Our overarching mission encompasses two primary facets: first, tracking enigmatic and potentially harmful users within the network, and second, expelling them to restore the network's integrity and safeguard its security. 5. What did you learn in completing the lab? If you don't feel you learned anything, explain how it would be useful to someone who hasn't done something similar. Make sure to provide specifics examples (i.e. if providing a Linux command, make sure to provide the command and explain what the command does). airdecap-ng: At the heart of this exercise is the "airdecap-ng" command. It serves as the gateway to decrypting and analyzing encrypted network traffic. This command is the first step towards unraveling the concealed information within captured packets.
-w 6B:33:6C:33:21: The "-w" flag stands as a crucial parameter in this command. It provides a pathway to specify the WEP key essential for decryption. In this particular instance, the cryptic code "6B:33:6C:33:21" serves as the key that unlocks the encrypted data, allowing us to reveal the concealed contents. ~/Desktop/captures/WEP.cap: Another fundamental element in this command is the file path designation. Here, we pinpoint the exact location of the captured network traffic file that awaits decryption. This file resides at "~/Desktop/captures/WEP.cap" within your file system, holding a treasure trove of encrypted information. 6. What did you have to research to better understand the lab? Explain what you researched and what you learned from it (provide specifics such as providing the Linux command and explanation of what it does). If you didn’t have to research anything, research something related to the lab you are interested in and explain what you learned from it making sure to provide specifics. After this exercise, I delved back into my study of Kali Linux's command structure, specifically focusing on the decryption of various file types. My objective was not only to decrypt these files but also to demonstrate the decryption process comprehensively. I also revisited Wireshark to extract the necessary insights needed to better understand and successfully complete the exercise. Throughout this endeavor, I showcased the step-by-step approach I took to reach the exercise's conclusion. This involved decrypting files associated with anonymous accounts and deciphering different types of passwords. Emphasis was also placed on the importance of securely decrypting these files, ensuring data integrity and confidentiality. In essence, my post-exercise efforts were geared towards reinforcing my understanding of Kali Linux commands for file decryption, while also highlighting the meticulous process of decryption and analysis through Wireshark to effectively tackle the exercise's objectives.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help