Question: PCAP Analysis and ZIP File Reconstruction Instructions Objective: Analyze the provided PCAP file, identify network activities, reconstruct and decrypt an encrypted ZIP file, and perform
PCAP Analysis and ZIP File Reconstruction Instructions
Objective: Analyze the provided PCAP file, identify network activities, reconstruct and decrypt an encrypted ZIP file, and perform a series of tasks requiring documentation of your process and results.
Step : PCAP File Analysis
Locate Ping Sessions:
Identify a successful Ping session and record:
Source and destination IP addresses.
Packet number from the PCAP.
A screenshot of the packet details in Wireshark.
Identify an unsuccessful Ping session and record:
Source and destination IP addresses.
Packet number from the PCAP.A screenshot of the packet details in Wireshark.
Locate FTP Session:
Extract the password used during the FTP session from the PCAP file.
Extract the parts of the zipped file from the FTP session in the PCAP file.
Step : ZIP File Reconstruction
Reassemble the ZIP File:
Use the extracted file parts and determine their correct order.
Reassemble the ZIP file.
Hint: There are possible combinations unless you know how to examine contents. Use critical thinking and see if there are ways to figure out how to reduce the possible combinations. Minimum of combinations if you can figure it out!
Decrypt the ZIP File:
Use the FTP password:
Apply the ROT cipher.
Take the result to theNET BBCiphertoolLinks to an external site.and follow the instructions to generate the ZIP password.
Open the ZIP file using the decrypted password.
Step : Excel Workbook Analysis
Access the Workbook:
Extract the Excel Workbook from the decrypted ZIP file.
Follow Instructions:
Complete the data entry and formula tasks as per the instructions on the first and second sheets of the workbook.
Clearly document the formula you used to generate the required data.
Step : Create and Hash a Byte Binary File
Generate a Byte Binary File:
Create atxtfile with content derived from the spreadsheet data.
Ensure the file size is bytes total size.
Hash the binary File:
Use a hashing tool or command to generate the hash of the bytetxtfile
Verify that the resulting hash contains the hexadecimal sequenceDEAD
Record the hash value and the exact commands used.
Step : Documentation
Prepare a detailed document that includes:
PCAP Analysis:
Successful and unsuccessful Ping details:
Source and destination IPs.
Packet numbers.
Screenshots for each type of Ping.
ZIP Reconstruction:
Briefly explain the process you followed to reconstruct and decrypt the ZIP file.
Spreadsheet Data:
Specify the formula used in the spreadsheet.
File Hashing:
Include:
The byte binary file hash value.
The commands used to generate the hash.
Supporting Materials:
Attach the following to your submission:
Documentation file PDF or Word format
byte binary file.
Completed Excel spreadsheet.
Screenshots used in your documentation.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
