Lab 18 Q & A
.docx
keyboard_arrow_up
School
Santa Fe College *
*We aren’t endorsed by this school
Course
CET1600
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
2
Uploaded by BaronTurtleMaster3907
1.
Highlight which kind of pod the lab was done in NetLab:
Network Security
Security+
2.
Provide the lab # in NetLab.
Lab #:
18
3.
What is the name of the lab in NetLab you completed?
Name of the Lab
:
Wireless Networking Attack and Mitigation Techniques
Provide about 100-150 words as an answer for each question.
Make sure to explain specific
terminology from the lab and what protocols or configurations should be used to be more secure.
Each question
’
s answer should have new information (i.e. don
’
t just restate the same thing in
each).
4.
Provide one screenshot from the lab. Explain with specific details how this
screenshot captures the purpose of the lab. Make sure you reference the
information in the screenshot specifically (may want to circle or highlight relevant
information in it).
In the provided image, our focus is on network analysis, utilizing Wireshark as a pivotal tool.
Our primary objective is the thorough examination of network traffic patterns, particularly
emphasizing FTP (File Transfer Protocol) traffic.
This examination has unveiled the presence of anonymous usernames and passwords,
prompting our action to bolster network security through the implementation of
comprehensive mitigation measures. These measures aim not only to uncover compromised
users but also to mitigate lurking threats within the network's intricate fabric.
Our overarching mission encompasses two primary facets: first, tracking enigmatic and
potentially harmful users within the network, and second, expelling them to restore the
network's integrity and safeguard its security.
5.
What did you learn in completing the lab? If you don't feel you learned anything,
explain how it would be useful to someone who hasn't done something similar. Make
sure to provide specifics examples (i.e. if providing a Linux command, make sure to
provide the command and explain what the command does).
airdecap-ng: At the heart of this exercise is the "airdecap-ng" command. It serves as the gateway
to decrypting and analyzing encrypted network traffic. This command is the first step towards
unraveling the concealed information within captured packets.
-w 6B:33:6C:33:21: The "-w" flag stands as a crucial parameter in this command. It provides a
pathway to specify the WEP key essential for decryption. In this particular instance, the cryptic
code "6B:33:6C:33:21" serves as the key that unlocks the encrypted data, allowing us to reveal
the concealed contents.
~/Desktop/captures/WEP.cap: Another fundamental element in this command is the file path
designation. Here, we pinpoint the exact location of the captured network traffic file that awaits
decryption. This file resides at "~/Desktop/captures/WEP.cap" within your file system, holding a
treasure trove of encrypted information.
6.
What did you have to research to better understand the lab?
Explain what you
researched and what you learned from it (provide specifics such as providing the
Linux command and explanation of what it does).
If you didn’t have to research
anything, research something related to the lab you are interested in and explain
what you learned from it making sure to provide specifics.
After this exercise, I delved back into my study of Kali Linux's command structure, specifically
focusing on the decryption of various file types. My objective was not only to decrypt these files
but also to demonstrate the decryption process comprehensively. I also revisited Wireshark to
extract the necessary insights needed to better understand and successfully complete the exercise.
Throughout this endeavor, I showcased the step-by-step approach I took to reach the exercise's
conclusion. This involved decrypting files associated with anonymous accounts and deciphering
different types of passwords. Emphasis was also placed on the importance of securely decrypting
these files, ensuring data integrity and confidentiality.
In essence, my post-exercise efforts were geared towards reinforcing my understanding of Kali
Linux commands for file decryption, while also highlighting the meticulous process of
decryption and analysis through Wireshark to effectively tackle the exercise's objectives.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help