Question: In this project you will get hands on experience as a low-level security hacker. You will be digging through previously captured packet traces to recover


In this project you will get hands on experience as a low-level security hacker. You will be digging through previously captured packet traces to recover a password. Overvew In the world of network security, it is very likely that you will find yourself peering at a collection of raw packets (a file of which is typically called a packet trace). Packet traces are often used for network forensics, analyzing (or reverse engineering) protocols, and (as you will soon find out) debugging and trouble shooting during network development. The purpose of this portion of the assignment is to get you comfortable looking at packet traces. Your job is to use a packet analyzer to go through a trace file that is attached below to answer the following questions. - Which applications are currently in use? - List the sites for which there are DNS requests. - What web pages were visited during the period of the trace? - What is the password used, over which protocol was it transmitted? To poke through the trace file, you are going to want to enlist the help of Ethereal or tcpdump. Ethereal is attached to this assignemnt if you need a copy of it. I highly recommend that you use etherel because it has much more comprehensive functionality for decoding packets. Hints: Hints: - Use filtering. Each of the questions above can be answered easily if you know which filter string to pass your packet parsing tool. You will want to segregate different protocols by port. A list of which ports are used which application type can be found on any unix machine in the file /etc/services - The password was entered using a standard Internet service that operates in plaintext and is still commonly used today (albeit normally over ssl). Deliverables Write a document that answers the questions: - Which applications are currently in use? - List the sites for which there are DNS requests. - What web pages were visited during the period of the trace? - What is the password used, over which protocol was it transmitted? If you do not want to use the programs below you can use any programs you choose but make sure that you list the inform,ation required above
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
