Objective:
Given a scenario, use the appropriate tool to assess
organizational security.
Resources:
- See PowerPoint presentations: 4.1.4 Packet Capture and Replay Tools.pptx, Lab – Wireshark.pptx, Lab – TCPDump.pptx
Assignment:
- Begin reading the 4.1.4 Packet Capture and Replay Tools.pptx presentation. This lesson will introduce you to three powerful tools for network traffic capture and analysis.
- Next, read and follow the instructions in both of the Lab presentations. We will have time to work on these labs in tomorrow’s class meeting.
- When you have completed both the labs, answer the questions and upload the required capture.txt file into the Assignment form posted in the Google Classroom.
- These labs are self paced, but do your best to complete them by the end of the day on Tuesday, September 21st.
Assigned: September 20th, 2021
Teacher Pacing Due Date: September 21st, 2021
Objective:
Students will continue preparing for proficiency in cyber security with an introduction to the basics of packet analysis in the Wireshark application.
Links:
Topics Discussed:
- Kali Linux
- Wireshark
- Packet Analysis
- Wireshark Configuration
Assignment:
- Continue working with Wireshark. This powerful packet collection and analysis tool is free to download and is pre-installed in the Kali Linux distribution.
- Watch Professor Messer’s Using Protocol Analyzers video to get a more in-depth introduction to the features of Wireshark.
- Review the good Professor’s Wireless Packet Analysis video and read Lifewire.com’s How to Use Wireshark: A Complete Tutorial to get a better idea of how the Wireshark interface works, and a few tips on how you can configure the Wireshark GUI to meet your specific needs and preferences.
- Note: Our Virtualbox installs of Kali use emulated network interfaces, which means that our wireless interface will not work like the one Professor Messer demonstrates in his video.
- Wireshark will, however, be able to analyze the packets being sent over the emulated hard-line network interface. Try running a packet capture on your en0 network interface and see what you can see! Run a packet capture, then visit a few websites, then filter the port 80 traffic to get an idea of what kind of information can be gathered by an analysis of the packets. We will discuss the results tomorrow.
Assigned: March 6th, 2019
Teacher Pacing Due Date: March 7th, 2019
Objective:
Students will continue preparing for proficiency in cyber security with an introduction to the basics of packet analysis in the Wireshark application.
Links:
Topics Discussed:
- Kali Linux
- Wireshark
- Packet Analysis
- Wireshark Configuration
Assignment:
- Today we will start working with Wireshark – a powerful packet collection and analysis tool that is free to download and pre-installed in the Kali Linux distribution.
- Watch Professor Messer’s Wireless Packet Analysis video and read Lifewire.com’s How to Use Wireshark: A Complete Tutorial to get a basic idea of how the Wireshark interface works, and a few tips on how you can configure the Wireshark GUI to meet your specific needs and preferences.
- We will be using this and other videos to gain a familiarity with the Wireshark environment, and look at the methods and construction of network packets, so we can begin to develop “the eye” for packet formation and transmission anomalies.
Assigned: March 5th, 2019
Teacher Pacing Due Date: March 6th, 2019
Objective:
Students will continue preparing for proficiency in cyber security with an introduction to the basics of packet analysis in the Wireshark application.
Links:
Topics Discussed:
- Kali Linux
- Wireshark
- Packet Analysis
- Wireshark Configuration
Assignment:
- Today we are going to start working with Wireshark – a powerful packet collection and analysis tool that is free to download and pre-installed in the Kali Linux distribution.
- Watch Hansang Bee’s Intro and About the Wireshark Environment video to get a basic idea of how the Wireshark interface works, and a few tips on how you can configure the Wireshark GUI to meet your specific needs and preferences.
- We will be using this and other videos to gain a familiarity with the Wireshark environment, and look at the methods and construction of network packets, so we can begin to develop “the eye” for packet formation and transmission anomalies.
Assigned: February 28th, 2018
Teacher Pacing Due Date: March 2nd, 2018
It's dangerous to go alone!