Question: Answer the following questions: 1 ) What Protocol was used to send the Echo ( ping ) request? 2 ) What is the source IP

Answer the following questions:
1) What Protocol was used to send the Echo (ping) request?
2) What is the source IP address listed on that Echo (ping) request entry?
3) What is the destination IP address listed on that Echo (ping) request entry?
4) What is the ttl (Time to Live) value on that Echo (ping) request entry?
Web Browsing Operation
Click the Kali Linux dragon icon in the upper left-hand corner of the screen
Type Firefox and select the Firefox web browser application
Enter amazon.com in the URL address bar and press enter
Gather Data on Web Browsing Operation
Click back on the Wireshark application and press the red stop button to stop the packet capture
process (this prevents the packet capture from continuing to capture more data making it
difficult to browse the data we already collected)
Click the search glass icon in Wireshark (located below the Statistics menu item)
A new search bar should appear
Locate and click the drop-down button with Display filter and select String
In the search field next to String, type amazon.com and click Find
Answer the following question:
5) What Protocol was used for the entry containing amazon.com?
Click the Cancel button next to the Find button
In the main search field with the text Apply a display filter ... type tcp and press enter
(*NOTE- tcp must be lowercase*)
The search field should be green if you entered tcp correctly
If the search field is red, check your spelling and make sure you only entered the letters tcp
The packet capture results are now filtered to only display packets related to the TCP protocol
Scroll to the top of the results and locate the first 3 TCP packets, click on the first entry
Answer the following questions:
6) What is unique about the first 3 TCP packets (Hint: look in the Info column for a process
initiated by the TCP protocol that we discussed in lecture and looked at diagrams of the
process)?
7) What is the source IP and port? (Hint: this can found unlabeled in the Info column and in
the middle window labeled specifically as Src for source and Dst for destination
8) What is the destination IP and port?
Gather More Data on Web Browsing Operation
University of North Georgia
CYBR 2050 Lab 2
Total points: 100 points
Click on any of the entries with TCP listed as the Protocol
In the middle window, click the arrow next to the word Transmission Control Protocol to
expand more details about that packet
Answer the following questions:
9) What version of TLS is being used as the protocol for the other packets? (Hint: look for
TLS and identify the version used represented by the letter v followed by a number)
10) What is the sequence number? (Hint: listed as Seq in the Info column and Sequence
number if you expand out the details section)
11) What is the acknowledgement number? (Hint: listed as Ack in the Info column and
Acknowledgement number if you expand out the details section)
12) What did you find most interesting about the Wireshark application? Provide at least 5
sentences about your experience with the Wireshark application.
13) What do you find to be the most challenging aspect of using the Wireshark application?
(3 or more sentences)
14) How could the Wireshark application be useful to a Cybersecurity Professional? (3 or
more sentences)
15) How could the Wireshark application be useful to a Hacker? (3 or more sentences)
Close all applications
After you have collected the data needed to answer all the questions, make sure you close all
open applications
To shut down Kali Linux, click the power icon in the upper right-hand corner and select Shut
Down
Submit your answers in D2L with each question numbered as seen in D2L
Student Submission requirements:
Please ensure you use the same numbering scheme as the questions above to receive full credit for
each of your answers and submit to D2L. Your submission must include your answe

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!