Rate this Solution

wireshark Lab
Description: This project requires that you work in a group (or as an individual) to do some research regarding the protocols used in the Wireshark captures provided to try and determine what is happening in the capture. Keep in mind that documentation is a big part of what you will do in the real world in your career. You will have to explain to others your findings and propose solutions. “Hands on” means using your brain, too!
Use the capture files in the Project Work Module in D2L (you will have to unzip the zip files to extract the individual capture files) to answer the following questions:
Part I – HTTP
1. Review the first capture file (Project Part I-a) and determine what is happening with the HTTP traffic.
a. Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture)
b. Take a screenshot of the actual packets within the capture file that you observed this behavior.
2. Review the second capture file (Project Part I-b) and determine what is happening with the HTTP traffic in this capture.
c. How is the traffic different from the first capture? Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture)
a. Take a screenshot of the actual packets within the capture file that you observed.
Part II – PPP
3. Review the third capture file (Project Part II-a) and determine what is happening with the PPP traffic in this capture.
a. Research one of the protocols relating to PPP and describe it here.
b. Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture)
c. Take a screenshot of the actual packets within the capture file that you observed this behavior.
4. Review the third capture file (Project Part II-b) and determine what is happening with the PPP traffic that you are investigating in this capture. What else is involved?
a. Research one of the protocols relating to PPP and describe it here.
d. Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture)
e. Take a screenshot of the actual packets within the capture file that you observed this behavior.
5. Review the third capture file (Project Part II-c) and determine what is happening with the PPP traffic in this capture. What else is involved?
a. Research one of the protocols relating to PPP and describe it here.
f. Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture)

g. Take a screenshot of the actual packets within the capture file that you observed this behavior.

Part III – 802.11

6. Review the first capture file (Nokia) and determine what is happening with the 802.11 traffic. Hint: use the Analyze/Conversation Filter

d. Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture)
e. Take a screenshot of the actual packets within the capture file that you observed this behavior.
7. Review the second capture file (wpa) and determine what is happening with the WPA traffic in this capture. (password is “Induction”). Hint: Use Edit->preferences, Protocol IEEE 802.11, decryption with “Induction”); Look at the packets prior to and after decryption. Use this
https://wiki.wireshark.org/HowToDecrypt802.11 . You are STILL required to answer the following questions in your own words and provide a screenshot!
f. What do you different once you have decrypted the packets? What is decrypted and what is happening? (include source, destination, time of capture)
h. Take a screenshot of the actual packets within the capture file that you observed.
Part IV – Ipv6 – Ipv4
8. Review the third capture file (toredo) and determine what is happening with the Ipv4-IPv6 traffic in this capture.
a. Research Toredo for encapsulation relating to Ipv6 using the content links in the course and describe it here.
i. Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture) (Hint: look at all Ipv6 packets that have Toredo in their details)
j. Take a screenshot of the actual packets within the capture file that you observed this behavior.
9. Review the fourth capture file (6to4) and determine what is happening with the Ipv4- IPv6 traffic in this capture. What else is involved?
a. Research 6to4 protocol using the content links in the course relating to 6to4 and describe it here.
k. Describe the traffic: what packets are involved and what is happening? (include source, destination, time of capture)
l. Take a screenshot of the actual packets within the capture file that you observed this behavior.
10. How do the two different methods differ?
11. Are there any other transitioning methods for IPv6 that you came across in your research that are noteworthy?
Group Members: (List your group Members Here if you worked in a group)
Task List: (List the tasks that were performed in this project and which team members were involved in this task, plus the % of their contribution to the project

Select Subject :
Grade Level :
Dead Line :
Upload File :
No Of Pages :
Expected Cost :
Write Messages :
Response Email :

Leave a Reply

Your email address will not be published.