Webpages.sou.edu
Labs for Network Forensics1. In the Research Lab, create network traffic between two computers that includes a file transfer, capture the packets. Document your steps using screenshots and written explanations, include the commands used and the steps taken. Use a hub or use a switch configured for port mirroring2. Read and document one RFC, present a brief summary of your information to the class.3. Use Wireshark to investigate packets that were captured in lab 1.Find the flowExport flowFind the fileExport the fileProvide documentation of process in the form of screenshots and written explanation4. Repeat lab 3 using the command line tools explained in the slides5. Using the HackMe.pcap file answer the follow the investigation in the slides. Document your process using your own screenshots and written explanation.Bonus: Using the Research lab, create your own wireless flow and capture the own conversation (legally!!!) and follow the process documented in lab 5 with your new tools. ................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related download
- chapter 7 computer networks the internet and the world
- section 1 create a peer to peer network using two computers
- building a small star network k to 8
- la3 computer network communication
- connecting multiple computers to two
- chaper 8 networking and telecommunications
- chapter 6 it infrastructure and platforms
- appendix b network basics