Question: Please read carfully!!! Packet Capture Analysis Download packet cap here http://www.filedropper.com/packetcap Identify any suspicious activity in the packet capture. You are to answer the questions

Please read carfully!!!

Packet Capture Analysis

Download packet cap here http://www.filedropper.com/packetcap

Identify any suspicious activity in the packet capture. You are to answer the questions below, in as much detail as possible. If there's a 'mole' in the organization we want to know, and what, if anything, might have been stolen or compromised.

Here are the details regarding the network:

Employee

Title

IP address

Server

Server

172.16.235.131

Philo Farnsworth

President

172.16.235.129

James Garrett

Network Admin

172.16.235.130

Allen Beard

Vice President

172.16.235.128

Questions

1. What is occurring in packets 21-26? Is it evidence of an intrusion? Provide an interpretation of what is occurring, and the possible uses of the information gained. If theres nothing suspicious, tell me so, and explain why its normal traffic.

2. Is the activity occurring in packets 75-95 evidence of an intrusion? Provide a detailed interpretation of what is occurring, and the possible uses of the information gained. What ports are involved? What information would be gained, and how would it be used by an attacker? What tool did the attacker use? (Covered in a video.) Note there are several questions here to be answered.

3. Is the activity starting in packet 101 evidence of an intrusion? (Hint: Select the packet, right-click, Follow->TCP Stream). Provide a detailed interpretation of what is occurring, and the possible consequences. THERE IS A LOT GOING ON. TELL ME WHAT HAPPENED!

4. Is the activity starting in packet 507 evidence of an intrusion? (Note: this is a TCP stream so you can select the first packet, right click your mouse, select "Follow -> TCP Stream", and Wireshark will extract those packets and form a single readable stream.) Provide a detailed interpretation of what is occurring, and the possible consequences. THERE IS A LOT GOING ON. TELL ME WHAT HAPPENED!

5. Is the activity starting in packet 661 evidence of an intrusion? (Note: this is a TCP stream so you can select the packet, right click your mouse, select "Follow TCP Stream", and Wireshark will extract those packets and form a single readable stream.) Provide a detailed interpretation of what is occurring, and the possible consequences. Look for human readable text (a lot of what you see are formatting commands.). What text was added? To what file? What was the purpose of adding the text to this file, and who might see it? (there are a lot of questions to answer there).

6. Is the activity starting in packet 804-805 abnormal? Why or why not?

7. Is the activity starting in 1713 through 1719 a sign of an attack? Why or why not?

8. Is the activity starting in packet 2367 a sign of an attack (Note: if its sign of an attack, tell me why. If you cant tell, tell me why you cant). (Use Follow TCP Stream).

9. Is the activity starting in packet 2519 (to the end of the packet capture) evidence of an intrusion or attack? Provide a detailed description of what is occurring, and the possible consequences. What did the attacker do?

10. Who was the attacker, and were his skills low, moderate, or high? Defend your answer based on the evidence. How much is Philo Farnsworths salary?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!