Attachment # 00000814 - Wireshark_Doc.docx
Wireshark_Doc.docx (14.31 KB)
Raw Preview of Attachment:
(refer to the detailed question and attachment below)
BSIT 310 - Wireshark (formerly Ethereal) Exercise The objective of this exercise is to allow you to explore capturing passwords using Wireshark. Wireshark is a free network protocol analyzer for UNIX and windows. WinPcap (which comes with Wireshark) allows users to capture raw packets from within Windows. If you are using this in a UNIX/LINUX environment, read through the directions at the Wireshark site. 1. Download and install the correct Wireshark installer for your operating system from Wireshark.org. When installing, accept all defaults, including the installation of WinPcap, and accept the user agreement. Launch Wireshark after installation. 2. Launch a web browser, and bring up http://www.testfire.net (aka Altoro Mutual) 3. Return to the open Wireshark app. Look at the Capture Section. Make note of the interface shown. From the Capture Menu, select Capture Options. From the Capture Options frame configure these parameters:  Capture packets in promiscuous mode (OFF)  Update list of packets in real time (OFF)  All Name resolution selections (OFF) [If you complete the exercise, and get no packets, try another interface] 4. After completing the configuration, click Start to begin capturing packets. 5. At the Web site, click on Sign In at the top, and type in johndoe as the user name, and tweety as the password. Click on Login. 6. Once you get the error page on the webmail site, go back to the Wireshark Capture window, and click Stop. It's a little icon, fourth from the left. 7. Notice the large amount of data captured by the sniffer. The top window shows each packet that was transmitted, the middle window provides details about the packet, and the bottom window shows the packet contents. 8. To determine whether Wireshark can actually capture a password, click Edit on the Menu bar, and then click Find Packet. 9. In the Find Packet Dialog box, click the String option button. Enter johndoe in the text box, click on Packet Details in the Search In area, then click on Find 10. Wireshark highlights the first packet in the top window that matches the search string; it displays information about that packet in the middle window, and displays the contents of the packet in the bottom window. 11. Can you determine the plaintext of the password entered for johndoe?

Dicussion Question 1

Question # 00005548 Posted By: JKM Updated on: 12/17/2013 11:02 AM Due on: 12/18/2013
Subject Computer Science Topic Networking Tutorials:
Question
Dot Image

Select and respond to one of the following. If you use additional resources, remember to list them at the end of the posting.

  • Perform a limited risk management activity on your personal computer. Conduct an asset identification (hardware, software, devices, etc. ), threat identification, vulnerability appraisal, risk assessment and risk mitigation. Under each category, describe the elements that pertain to your system. What major vulnerabilities did you find? How can you mitigate the risks?
  • Your author discusses some of the issues associated with rogue access points. Find a least one article that focuses on a defense against rogue access points, and provide a summary as well as a link to the article. In addition, consider that many phones can now act as wifi access points. Would the defense you've summarized work with a wifi rogue access point?
  • Complete the network / password scanning lab using Wireshark (attached here). See the details in the attached document. Post your findings to the forum.
Dot Image
Tutorials for this Question
  1. Tutorial # 00005397 Posted By: neil2103 Posted on: 12/18/2013 03:26 PM
    Puchased By: 3
    Tutorial Preview
    The solution of Management of risk...
    Attachments
    Management_of_risk.docx (16.63 KB)
Whatsapp Lisa