Answered You can hire a professional tutor to get the answer.

QUESTION

Create/build a network or get access to a network that has at least two local (host) machines (any OS, machines may be real or virtual) and one...

Create/build a network or get access to a network that has at least two local (host) machines (any OS, machines may be real or virtual) and one switch/router on it. The switch/router maybe real or virtual (for example a VirtualBox networking connection). You may use any combination of real/virtual networks and real/virtual equipment that you have access to the packets on. You may use any Operating Systems you desire. Your locally created network may be connected to the Internet, but a maximum of only ONE Internet up-link connection is allowed.

In addition to sniffing packets, another learning goal of this task assignment is for students to gain hands-on exposure to creating their own network rather than just attaching to the Internet.

10 Point VM BONUS: For having a local virtual machine as one or more of the hosts (with data sender, data receiver, or WireShark analyzer installed on it) in your project network.

A learning goal of the bonus is to encourage students to apply the course concepts in the virtual and cloud computing worlds (including virtual ports, connections, virtual cabling, switches, etc.) in addition to applying to real world equipment.

Second: Install Wireshark (wireshark.org) or equivalent.

Third: Using WireShark (or equivalent) perform 3 tasks from items 0 through 10.

The learning goal of this assignment tasks is to help students move up from Operating System provided terminal tools (such as ping, traceroute and tracecert that confirm basic network connectivity) to more advanced professional level network analysis tools.

0) Using the computer language of your choice, create an email application that sends a simple text email every few seconds. You can think of your email application as a malicious "spammer." Then using WireShark, find and show that the email(s) was sent and discover the IP address of the spammer. Hint: Consider using WireShark to look for Simple Mail Transfer Protocol (SMTP) packets or port 25 or even searching for known text (your NPU student ID) in the email. Note: Some third party email systems may view your automated email as spam and filter it out. Hence, you might not be able to see both the transmit and the receive sides.

1) Discover & sniff the contents of a standard website textbox in any non-encrypted web site. Note: If you have a private web server (perhaps by installing a Linux LAMP or WAMP server system) you may use it instead of a public web site.

2) Discover/sniff/hack cookies

     Example: Show that a cookie was made.

     Note: You can manually delete it before going to the web page. If you wish and if you have your own web server, you may create your own cookie writer.

3) Create a specific site or IP address or Machine filter within WireShark and show that it is functioning.

4) Create a HTTP, TCP or UDP protocol or port filter and show that it is functioning (before and after)

5) Track a DHCP handshake and show its progress

6) Track an Encryption/SSL handshake set-up. Note: You do not have read (break) the encrypted text, just show that you found it and/or captured a copy of it.

7) Use WireShark to show traffic in-between two machines.

8) Configure FTP between two machines and then use WireShark to watch as a file is transferred or the FTP session is set up.

9) Use Wireshark to trouble shoot a network

Please document the test trouble you created and show how you found it through traffic analysis. Example 1: You have a 3 machine Y topology network where you caused a link failure by pulling the plug. Example 2: You change a firewall setting to block a specific type of traffic.

10) Custom. You may request permission from the instructor to investigate another capability/feature of Wireshark.

Fourth: Write a proper assignment results report. Your report you must include:

(a) A proper introduction including:

A logical description and diagram of the network configuration; a photograph of the locally created network hardware equipment arrangement is desirable.

Description of equipment, hosts, cabling and ports used

Description of where WireShark was located,

Description of various IP addresses and their functions/applications

(b) Individual sections for each task including: Task description, and written step-by-step text instructions and screen captures showing how you performed each of the tasks you selected.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question