Question: 2) Using your own Wireshark tool, perform the following exercises. Start your Wireshark and then open the web browser and navigate to this website: testfire.net

2) Using your own Wireshark tool, perform the following exercises. Start your Wireshark and then open the web browser and navigate to this website: testfire.net and try to pick out the login credentials, using guest and guest as the username and password. Stop your capture and locate these credentials in the trace information. What filter did you use: __________________________ Actual Packets Captured and Displayed: Captured:____________ Displayed:_________________

3) Conduct MiTM attack using all three virtual machine Windows XP, Metaslpoitable2 and Kali to run the tools Ettercap and driftnet to capture the images being sent/received. Describe what protocols are being used to accomplish this attack and are there any ways to prevented?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!