Question: LAN ( depending on how your LAN is configured ) . For this activity, you can capture your own SMTP and POP packets using Wireshark,
LAN depending on how your LAN is configured
For this activity, you can capture your own SMTP and POP packets using Wireshark, or use two files that we've created by capturing SMTP and POP packets. We'll assume you're going to use our files. If you'd like to capture your own packets, read HandsOn Activity B in Chapter and use your twotier email client to create and send an email message instead of your Web browser. If you'd like to use our files, go to the website for this book and download the two files: SMTP Capture.pkt and POP Capture.pktSee below after FIGURE POP packets in Wireshark
Part : SMTP
Start Wireshark and either capture your SMTP packets or open the file called SMTP Capture.pkt
We used the email software on our client computer to send an email message to our email server. Figure shows the packets we captured that were sent to and from the client computer called and the server to send this message from the client to the server. The first few packets are called the handshake, as the client connects to the server and the server acknowledges it is ready to receive a new email message.
Packet is the start of the email message that identifies the sender The next packet from the client packet provides the recipient address and then the email message starts with the DATA command packet and is spread over several packets and because it is too large to fit in one Ethernet frame. Remember that the senders transport layer breaks up large messages into several smaller TCP segments for transmission and the receiver's transport layer reassembles the segments back into the one SMTP message.
Packet contains the first part of the message that the user wrote. It's not that easy to read, but by looking in the bottom window, you can see what the sender wrote.
Deliverables
List the information in the SMTP header to from, date, subject, message ID#
Look through the packets to read the user's message. List the user's actual name not his or her email address his or her birth date, and his or her SSN
Some experts believe that sending an email message is like sending a postcard. Why? How secure is SMTP email? How could security be improved?
Part : POP
Start Wireshark and either capture your SMTP packets or open the file called POP Capture.pktNote: Depending on the version of Wireshark you are using, the file extension may be pkt or pcap.
We used the email software on our client computer to read an email message that was our email server. Figure shows the packets we captured that were sent to and from the client computer called and the server to send an email message from the server to the client. The first few packets are called the handshake, as the client logs in to the server and the server accepts the login
Packet is the POP STAT command status that asks the server to show the number of email messages in the user's mailbox. The server responds in packet and tells the client there is one message.
Packet is the POP LIST command that asks the server to send the client a summary of email messages,
Packet is the POP LIST command that asks the server to send the client a summary of email messages, which it does in packet
Packet is the POP RETR command retrieve that asks the server to send message to the client. Packets and contain the email message. It's not that easy to read, but by looking in the bottom window for packet you can see what the sender wrote. You can also expand the POP packet in the middle packet detail window by clicking on the box in front of it which is easier to read.
Deliverable Instructions
You must answer every question for full credit.
You must submit your assignment using the same sample format for credit.
Packets through are the login process. Can you read the user id and passwords? Why or why not?
Look through the packets to read the user's message. List the user's actual name not his or her email address his or her birthdate, and his or her SSN
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
