SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
uestion 1: Network Security (a) A security analyst team has the capture1.pcap, capture2.pcap and
capture3.pcap files which are network traffic captures of different network segments. They need to
identify potential attacks in these files. You are asked to assist them in their task by doing the
following: i. [15 marks] Examine these pcap files to determine the attacks within these files using
Wireshark; keep in mind, each file has only one attack. Justify your answers including the
description of those identified attacks and some screenshots of parts in the traffic (the pcap files)
which refer to the attacks if necessary. ii. [5 marks] It is important for security analysts to
understand suspicious activity in pcap files. This is often done by reproducing attacks. Setup and
execute the attack identified in capture3.pcap. Provide a screenshot of network traffic caused by
your attack in Wireshark. Note: your pcap and the provided pcap files are not expected to be
identical. You are not expected to reproduce the pcap content line by line, but it has to be the
same attack.

Weitere ähnliche Inhalte

Ähnlich wie uestion 1 Network Security a A security analyst team has .pdf

network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
ashutosh rai
 
The Finest Penetration Testing Framework for Software-Defined Networks
The Finest Penetration Testing Framework for Software-Defined NetworksThe Finest Penetration Testing Framework for Software-Defined Networks
The Finest Penetration Testing Framework for Software-Defined Networks
Priyanka Aash
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
MOHD ARISH
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
IJNSA Journal
 

Ähnlich wie uestion 1 Network Security a A security analyst team has .pdf (20)

Network Management (CEN166) Project Presentation By Matthew Utin
Network Management (CEN166) Project Presentation By Matthew UtinNetwork Management (CEN166) Project Presentation By Matthew Utin
Network Management (CEN166) Project Presentation By Matthew Utin
 
Gand crab ransomware analysis
Gand crab ransomware analysisGand crab ransomware analysis
Gand crab ransomware analysis
 
ENPM808 Independent Study Final Report - amaster 2019
ENPM808 Independent Study Final Report - amaster 2019ENPM808 Independent Study Final Report - amaster 2019
ENPM808 Independent Study Final Report - amaster 2019
 
An introduction to_ns_nam_and_o_tcl_scripting
An introduction to_ns_nam_and_o_tcl_scriptingAn introduction to_ns_nam_and_o_tcl_scripting
An introduction to_ns_nam_and_o_tcl_scripting
 
Network Monitoring with Wireshark
Network Monitoring with WiresharkNetwork Monitoring with Wireshark
Network Monitoring with Wireshark
 
bakalarska_praca
bakalarska_pracabakalarska_praca
bakalarska_praca
 
Network simulator 2 a simulation tool for linux
Network simulator 2 a simulation tool for linuxNetwork simulator 2 a simulation tool for linux
Network simulator 2 a simulation tool for linux
 
Ns3
Ns3Ns3
Ns3
 
BackTrack5 - Linux
BackTrack5 - LinuxBackTrack5 - Linux
BackTrack5 - Linux
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 
Group presentation ii
Group presentation iiGroup presentation ii
Group presentation ii
 
The EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systemsThe EternalBlue Exploit: how it works and affects systems
The EternalBlue Exploit: how it works and affects systems
 
ASE2023_SCPatcher_Presentation_V5.pptx
ASE2023_SCPatcher_Presentation_V5.pptxASE2023_SCPatcher_Presentation_V5.pptx
ASE2023_SCPatcher_Presentation_V5.pptx
 
The Finest Penetration Testing Framework for Software-Defined Networks
The Finest Penetration Testing Framework for Software-Defined NetworksThe Finest Penetration Testing Framework for Software-Defined Networks
The Finest Penetration Testing Framework for Software-Defined Networks
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
Black Energy18 - Russian botnet package analysis
Black Energy18 - Russian botnet package analysisBlack Energy18 - Russian botnet package analysis
Black Energy18 - Russian botnet package analysis
 
G3t R00t at IUT
G3t R00t at IUTG3t R00t at IUT
G3t R00t at IUT
 
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...SOURCE CODE ANALYSIS TO REMOVE SECURITY  VULNERABILITIES IN JAVA SOCKET PROGR...
SOURCE CODE ANALYSIS TO REMOVE SECURITY VULNERABILITIES IN JAVA SOCKET PROGR...
 

Mehr von info824030

UHealth is a health insurance provider based in Australia F.pdf
UHealth is a health insurance provider based in Australia F.pdfUHealth is a health insurance provider based in Australia F.pdf
UHealth is a health insurance provider based in Australia F.pdf
info824030
 
Ubjeclives Kotilin syntax and basies Uacer inpul and cu.pdf
Ubjeclives  Kotilin syntax and basies  Uacer inpul and cu.pdfUbjeclives  Kotilin syntax and basies  Uacer inpul and cu.pdf
Ubjeclives Kotilin syntax and basies Uacer inpul and cu.pdf
info824030
 

Mehr von info824030 (20)

Un ejemplo de un efecto ________ de la inversin extranjera .pdf
Un ejemplo de un efecto ________ de la inversin extranjera .pdfUn ejemplo de un efecto ________ de la inversin extranjera .pdf
Un ejemplo de un efecto ________ de la inversin extranjera .pdf
 
Un ejemplo de comunidad es A Un individuo de algas gigante.pdf
Un ejemplo de comunidad es  A Un individuo de algas gigante.pdfUn ejemplo de comunidad es  A Un individuo de algas gigante.pdf
Un ejemplo de comunidad es A Un individuo de algas gigante.pdf
 
Un cruce monohbrido considera la herencia de un solo rasgo.pdf
Un cruce monohbrido considera la herencia de un solo rasgo.pdfUn cruce monohbrido considera la herencia de un solo rasgo.pdf
Un cruce monohbrido considera la herencia de un solo rasgo.pdf
 
Un cientfico investigador que trabaja para una startup de c.pdf
Un cientfico investigador que trabaja para una startup de c.pdfUn cientfico investigador que trabaja para una startup de c.pdf
Un cientfico investigador que trabaja para una startup de c.pdf
 
Un cientfico observa varios fsiles en el lecho de un ro .pdf
Un cientfico observa varios fsiles en el lecho de un ro .pdfUn cientfico observa varios fsiles en el lecho de un ro .pdf
Un cientfico observa varios fsiles en el lecho de un ro .pdf
 
Un cientfico observa a un depredador buscando presas crpti.pdf
Un cientfico observa a un depredador buscando presas crpti.pdfUn cientfico observa a un depredador buscando presas crpti.pdf
Un cientfico observa a un depredador buscando presas crpti.pdf
 
Un cambio en las trayectorias promedio de los ciclones de la.pdf
Un cambio en las trayectorias promedio de los ciclones de la.pdfUn cambio en las trayectorias promedio de los ciclones de la.pdf
Un cambio en las trayectorias promedio de los ciclones de la.pdf
 
Uber Competing Globally 1 ISSUES faced by Uber in November.pdf
Uber Competing Globally 1 ISSUES faced by Uber in November.pdfUber Competing Globally 1 ISSUES faced by Uber in November.pdf
Uber Competing Globally 1 ISSUES faced by Uber in November.pdf
 
Un anlisis de regresin mltiple de 3 factores A dotacin.pdf
Un anlisis de regresin mltiple de 3 factores A dotacin.pdfUn anlisis de regresin mltiple de 3 factores A dotacin.pdf
Un anlisis de regresin mltiple de 3 factores A dotacin.pdf
 
Ulusal renci Birliinin yllk toplantsna katlmak zere her y.pdf
Ulusal renci Birliinin yllk toplantsna katlmak zere her y.pdfUlusal renci Birliinin yllk toplantsna katlmak zere her y.pdf
Ulusal renci Birliinin yllk toplantsna katlmak zere her y.pdf
 
UHealth is a health insurance provider based in Australia F.pdf
UHealth is a health insurance provider based in Australia F.pdfUHealth is a health insurance provider based in Australia F.pdf
UHealth is a health insurance provider based in Australia F.pdf
 
Two genes Dumb d and Anxious a are recessive genes rou.pdf
Two genes Dumb d and Anxious a are recessive genes rou.pdfTwo genes Dumb d and Anxious a are recessive genes rou.pdf
Two genes Dumb d and Anxious a are recessive genes rou.pdf
 
Uick the following link to view exports data from ERED Then.pdf
Uick the following link to view exports data from ERED Then.pdfUick the following link to view exports data from ERED Then.pdf
Uick the following link to view exports data from ERED Then.pdf
 
Two high school field hockey players have unofficial college.pdf
Two high school field hockey players have unofficial college.pdfTwo high school field hockey players have unofficial college.pdf
Two high school field hockey players have unofficial college.pdf
 
Two years ago Elliot funded a revocable grantor trust The .pdf
Two years ago Elliot funded a revocable grantor trust The .pdfTwo years ago Elliot funded a revocable grantor trust The .pdf
Two years ago Elliot funded a revocable grantor trust The .pdf
 
Two housemates are fed up of doing the washing up and want t.pdf
Two housemates are fed up of doing the washing up and want t.pdfTwo housemates are fed up of doing the washing up and want t.pdf
Two housemates are fed up of doing the washing up and want t.pdf
 
Two fair sixsided dice are rolled Assume these are distin.pdf
Two fair sixsided dice are rolled Assume these are distin.pdfTwo fair sixsided dice are rolled Assume these are distin.pdf
Two fair sixsided dice are rolled Assume these are distin.pdf
 
Two people use the following procedure to split 1 dollar Pe.pdf
Two people use the following procedure to split 1 dollar Pe.pdfTwo people use the following procedure to split 1 dollar Pe.pdf
Two people use the following procedure to split 1 dollar Pe.pdf
 
Ubjeclives Kotilin syntax and basies Uacer inpul and cu.pdf
Ubjeclives  Kotilin syntax and basies  Uacer inpul and cu.pdfUbjeclives  Kotilin syntax and basies  Uacer inpul and cu.pdf
Ubjeclives Kotilin syntax and basies Uacer inpul and cu.pdf
 
Two students Vanessa and Mika from different high schools.pdf
Two students Vanessa and Mika from different high schools.pdfTwo students Vanessa and Mika from different high schools.pdf
Two students Vanessa and Mika from different high schools.pdf
 

Kürzlich hochgeladen

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Kürzlich hochgeladen (20)

This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

uestion 1 Network Security a A security analyst team has .pdf

  • 1. uestion 1: Network Security (a) A security analyst team has the capture1.pcap, capture2.pcap and capture3.pcap files which are network traffic captures of different network segments. They need to identify potential attacks in these files. You are asked to assist them in their task by doing the following: i. [15 marks] Examine these pcap files to determine the attacks within these files using Wireshark; keep in mind, each file has only one attack. Justify your answers including the description of those identified attacks and some screenshots of parts in the traffic (the pcap files) which refer to the attacks if necessary. ii. [5 marks] It is important for security analysts to understand suspicious activity in pcap files. This is often done by reproducing attacks. Setup and execute the attack identified in capture3.pcap. Provide a screenshot of network traffic caused by your attack in Wireshark. Note: your pcap and the provided pcap files are not expected to be identical. You are not expected to reproduce the pcap content line by line, but it has to be the same attack.