EXTRACTING IMAGES FROM A PACKET CAPTURE A skill of importance as an incident responder or threat...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
EXTRACTING IMAGES FROM A PACKET CAPTURE A skill of importance as an incident responder or threat hunter is the ability to examine traffic and make sense of the contents of that traffic. One such component of analysis may be the images contained in traffic. This short exercise will demonstrate your ability to use the Wireshark packet analyzer tool to examine some previously captured traffic (pcap or .cap) and to then extract images contained in that traffic. 1. Launch the Wireshark application. 2. Download the packet capture file (http_with_jpegs.cap.gz) from your Moodle course. 3. From Wireshark, open the downloaded capture file. 4. Being told that the images to be inspected are ones found in web traffic, you can filter the traffic using the appropriate encapsulation filter. This will abbreviate the amount of traffic to analyze. 5. Find the transmission between 10.1.1.1 and 10.1.1.101 that contains 624 bytes on the wire and is identified as (JPEG JFIF image). Select the sequence number and then locate the JPEG File Interchange Format section in the details pane below. b. Export the packet bytes into a file named A.jpg 6. Find the transmission between 10.1.1.1 and 10.1.1.101 that is approximately 6.78 seconds into the capture and contains 824 bytes on the wire and is identified as (JPEG JFIF image). a. Select the sequence number and then locate the JPEG File Interchange Format section in the details pane below. b. Export the packet bytes into a file named B.jpg 7. Find the transmission between 10.1.1.1 and 10.1.1.101 that is approximately 11.1 seconds into the capture and contains 1445 bytes on the wire and is identified as (JPEG JFIF image). a. Select the sequence number and then locate the JPEG File Interchange Format section in the details pane below. b. Export the packet bytes into a file named C.jpg 8. Upload the three images that you have extracted as your submission for this assignment. SEC-160: Security Admin I Instructor: Debra McCusker EXTRACTING IMAGES FROM A PACKET CAPTURE A skill of importance as an incident responder or threat hunter is the ability to examine traffic and make sense of the contents of that traffic. One such component of analysis may be the images contained in traffic. This short exercise will demonstrate your ability to use the Wireshark packet analyzer tool to examine some previously captured traffic (pcap or .cap) and to then extract images contained in that traffic. 1. Launch the Wireshark application. 2. Download the packet capture file (http_with_jpegs.cap.gz) from your Moodle course. 3. From Wireshark, open the downloaded capture file. 4. Being told that the images to be inspected are ones found in web traffic, you can filter the traffic using the appropriate encapsulation filter. This will abbreviate the amount of traffic to analyze. 5. Find the transmission between 10.1.1.1 and 10.1.1.101 that contains 624 bytes on the wire and is identified as (JPEG JFIF image). Select the sequence number and then locate the JPEG File Interchange Format section in the details pane below. b. Export the packet bytes into a file named A.jpg 6. Find the transmission between 10.1.1.1 and 10.1.1.101 that is approximately 6.78 seconds into the capture and contains 824 bytes on the wire and is identified as (JPEG JFIF image). a. Select the sequence number and then locate the JPEG File Interchange Format section in the details pane below. b. Export the packet bytes into a file named B.jpg 7. Find the transmission between 10.1.1.1 and 10.1.1.101 that is approximately 11.1 seconds into the capture and contains 1445 bytes on the wire and is identified as (JPEG JFIF image). a. Select the sequence number and then locate the JPEG File Interchange Format section in the details pane below. b. Export the packet bytes into a file named C.jpg 8. Upload the three images that you have extracted as your submission for this assignment. SEC-160: Security Admin I Instructor: Debra McCusker
Expert Answer:
Related Book For
Accounting Information Systems
ISBN: 978-0133428537
13th edition
Authors: Marshall B. Romney, Paul J. Steinbart
Posted Date:
Students also viewed these algorithms questions
-
The impact of telework on organisational performance, behaviour, and culture: evidence from business services industry based on employees' perceptions 1. Introduction Challenges raised by the...
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
1. Prepare a schedule of cost of goods manufactured for Denim Bones for the year ended December 31, 2024. 2. Prepare an income statement for Denim Bones for the year ended December 31, 2024. 3. How...
-
At January 1 and December 31 2005, Candyland Corporation has the following securities outstanding:? 1,000,000,000 shares 5% convertible bonds, $1.000 face amount (issued at 100) convertible into 30...
-
Use the accompanying graph to answer these questions.a. Suppose demand is D and supply is S0. If a price ceiling of $6 is imposed, what are the resulting shortage and full economic price? b. Suppose...
-
An 1100-kg car stops at a red light, going from \(85 \mathrm{~km} / \mathrm{h}\) to stationary in 20 s. (a) What is the impulse delivered to the car? (b) What is the average vector sum of forces...
-
The T-accounts for Equipment and the related Accumulated Depreciation Equipment for Ada Company at the end of 2014 are shown here. In addition, Ada Companys income statement reported a loss on...
-
How do you print the first value in a tuple called aVar?
-
Suppose the DLX architecture is modified such that each instruction's excursions takes 8 clock cycles, where the ALU is slow and the execute phase needs more 3 clock cycles (E1, E2, and E3) and data...
-
what is the purpose of a financial statement?
-
Calculate the capital structure? Where on the company financial history sheet did you find this info or where did you get the info to input ? Cast of Capital Estimated 96 Capital Funding Return Req'd...
-
How does diversification impact the potential for investment gains?
-
When a significant finding is noted early during a review of the accounts payable function, which next course of action is best for communicating the issue?
-
Using the accounts listed below create an income statement create the operating cash flow for the year Income Statement Accounts for the Year Ending 2017 Cost of Goods Sold $1,429,000 Interest...
-
Chandrima was thinking of a way out desperately. At least she needs a break! For the last two weeks, she has been working hard to settle some office issues and worked up to ten-eleven hours a day in...
-
Ex. (17): the vector field F = x i-zj + yz k is defined over the volume of the cuboid given by 0x a,0 y b, 0zc, enclosing the surface S. Evaluate the surface integral ff, F. ds?
-
Use Table to create a questionnaire checklist that can be used to evaluate controls for each of the basic activities in the production cycle (product design, planning and scheduling, production...
-
Obtain a copy of Generally Accepted Privacy Principles from the AICPAs web site (You will find it by following this path: Under Interest Areas choose Information Management and Technology Assurance...
-
Figure 12-20 depicts the activities performed in the revenue cycle by the Newton Hardware Company. a. Identify at least 3 weaknesses in Newton Hardwares revenue cycle. Explain the resulting threat...
-
On December 1, 2023, Rebecca Ward, a single taxpayer, comes to you for tax advice. At the end of every year, she donates \($5,000\) to charity. She has no other itemized deductions. This year, she...
-
Following is a list of information for Peter and Amy Jones for the current tax year. Peter and Amy are married and have three children, Aubrynne, Bryson, and Caden. They live at 100 Main Street,...
-
Kelly and Chanelle Chambers, ages 47 and 45, are married and live at 584 Thoreau Drive, Boston, MA 59483. Kellys Social Security number is 111-11-1111 and Chanelles is 222-22-2222. The Chambers have...
Study smarter with the SolutionInn App