Course Hero Logo

Basic Wireshark Lab.docx - PART 1 1. Screenshot of the...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 8 out of 9 pages.

PART 11.Screenshot of the Wireshark with SRC port and DST port2.Screenshot of the Ping Sweep1
3.Screenshot of the Windows 7 Services Scan4.Screenshot of the index webpage of the Kali box (10.0.2.15)2
5.Screenshot ofthe pictures directory of the Kali webserver3
6.Screenshot ofWireshark following the HTTP stream.4
BASIC WIRESHARK LAB REPORTBYGBEMISOLA BAKAREATTHE DEPARTMENT OF CYBERSECURITYGRAND CANYON UNIVERSITY, ARIZONA, UNITED STATESCOURSE: CYBER WARFARE AND APPLICATION5
TABLE OF CONTENTS1.0 Overview…………………………………………………………………………………72.0 Summary…………………………………………………………………………………72.1 Why Using Wireshark? …………………………………………………………...72.2 Indicators of Attack by Using Wireshark …………………………………………72.3 Ports and Protocols ………………………………………………………………..8References …………………………………………………………………………………….96
1.0 OverviewA lot of operations were performed in this basic Wireshark lab. The IP addresses of the Kalibox and Windows 7 of the machines were determined by Linux terminal commands. On the terminal,the IP address of Kali Box was checked by runningifconfigcommand. The resulted IP address wasused to further determine the number of hosts running on the virtual box and their corresponding IP

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 9 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Summer
Professor
N/A
Tags
IP address, Transmission Control Protocol

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture