SlideShare a Scribd company logo
1 of 4
ISC 3523 Research Methods
Answer:
Introduction:
The aim of this report is performing the lab on Kali-Hunt VM and Win-Hunt VM. The pcap
file will be analysed. For the analysis tools like Network miner, Wireshark and Snort will be
used and the given questions will be answered along with screenshots. From the analysis
the story of captured file will be written as well as the captured file will be run through
snort so that any triggered alerts can be triggered.
Description Of The Selected Tools:
For doing the analysis Network Miner will be used which is an open source Network
Forensics Analysis Tool for Windows OS however the tools is also accessible for operating
systems like FreeBSD, MAC OS X. The tool can be utilized as a packet capturing tool, passive
network sniffer for detecting the sessions, operating systems, open ports and host names
etc. that too without even putting any kind of traffic on the network (Adebayo, Olawale
Surajudeen, et al., 2020). Network Miner can also parse the PCAP file for off line analysis as
well as for regenerating or reassembling the certificates and transmitted files from the
PCAP files. The tool can make the things easy for performing advanced network traffic
analysis through providing extracted artifacts in the intuitive user interface (Sanders, Chris,
2017). The way the data is presented can not only make the process of analysis simpler but
also it is helpful for saving valuable time for the forensic investigator or analyst.
Along with Netminer Wireshark tool will be also used which is also a free and open source
tool that can analyse the coming traffic in the network in real time for the Mac, Windows,
Linux and Unix based systems (Kaur, Prabhjot, and Neeti Misra, 2019). The tool can also
capture data packets which are passing by the interface of the network such as SDRs, LANs
or Ethernet as well as it can also translate the data in to valuable information for the IT
professionals as well as cyber security teams. The tool can provide a series of various
display filters for transforming every packets which are captured in to a readable format. It
can provide allowance the users for identifying the causes of issues existed in network
security as well as even discover the potential cyber criminal activities. When a packet
sniffer is used in the promiscuous mode the users can make analysis of the network traffic
regarding of the destination (Pansari, Nikunj, and Ajay Agarwal, 2020). It provides the
power to the IT professionals in performing a quick and through diagnosis of the security of
the network.
Lastly Snort tool will be used for finding if any triggered alerts can be triggered. The tool can
be used a straight packet sniffing tool, a packet logger or like a full blown intrusion
detection system for network.
Open And Loading Captured File:
Captured file in Wireshark:
:
Performing Analysis On The Captured File:
Question a)
Answer: 505.69 seconds
Question b)
Answer: 2449
Question c)
Answer: 811157 bytes
Question d)
Answer: ARP, Browser, DHCP, DNS, FTP, FTP-DATA, HTTP, MDNS, NBNS, SSLv2, SSLv3, TCP,
TiVoConnect, UDP
Question e)
Answer: 94 - 115
Question f)
Answer: TCP SYN-ACK Handshaking protocol
Question g)
Answer: Yes, Yahoo/AOL
Question h)
Answer: Name of host computer: KAUFMANUPSTAIRS; IP address: 172.16.1.35
Question i)
Answer: WINDOWS XP
Question j)
Answer: cisco
Question k)
Answer: DVR 8525, KAUFMANUPSTAIRS, Cisco-LI (main router), 2WireInc (modem),
Linksys G
Question l)
Answer: No
Question m)
Answer: DVR(Tivo) , 2 modems
Story:
-r command is telling the Snort tool to read a single pcap
-c command is telling Snort to load the configuration file
Running The Captured File Through Snort:
cd Desktop/Snort/bin
snort -r C:UsersAdministratorDesktop[3523_Lab2_Capture_file.pcap] -c
172.16.2.2sharedfilesSnortetcsnort.conf
Conclusion:
Thus, it can be concluded from the report that in this paper the pcap file has been analysed
using windows VM. For that tools like Network Miner, Wireshark and Snort has been used.
The screenshots for the analysis have also been provided and the lab questions have also
been answered.
Bibliography:
Adebayo, Olawale Surajudeen, et al. "Analysis and Classification of some Selected Social
media Apps Vulnerability. Springer. Book collection of International conference on
Information and Communication. Part of the Communications in Computer and Information
Science book series." (2020).
Susianto, Didi, and Anisa Rachmawati. "Implementasi Dan Analisis Jaringan Menggunakan
Wireshark, Cain And Abels, Network Minner." Jurnal Cendikia 16.2 Oktober (2018): 120-
125.
Sanders, Chris. Practical Packet Analysis, 3E: Using Wireshark to Solve Real-World Network
Problems. No Starch Press, 2017.
RAUT, Mrs JUITA TUSHAR. "PERFORMANCE BASED COMPARATIVE ASSESSMENT OF
DIFFERENTSECURITY TOOLS FOR WEB APPLICATION." (2020).
Kaur, Prabhjot, and Neeti Misra. "A Methodical Review on Network Traffic Monitoring &
Analysis Tools." A Journal of Composition Theory 12.9 (2019): 1964-1968.
Zain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in
SSL-Protected Channel." Security and Communication Networks 2019 (2019).
Letavay, Viliam, Jan Pluskal, and Ond?ej Ryšavý. "Network Forensic Analysis for Lawful
Enforcement on Steroids, Distributed and Scalable." Proceedings of the 6th Conference on
the Engineering of Computer Based Systems. 2019.
Pansari, Nikunj, and Ajay Agarwal. "A Comparative Study of Analysis and Investigation using
Digital Forensics." International Journal of Linguistics and Computational Applications
(IJLCA) 7.2 (2020).

More Related Content

Similar to ISC 3523 Research Methods.docx

A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESIRJET Journal
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1MOHD ARISH
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCSITiaesprime
 
Internet Relay Chat Forensics
Internet Relay Chat ForensicsInternet Relay Chat Forensics
Internet Relay Chat ForensicsIJSRD
 
J_McConnell_LabReconnaissance
J_McConnell_LabReconnaissanceJ_McConnell_LabReconnaissance
J_McConnell_LabReconnaissanceJuanita McConnell
 
BackTrack5 - Linux
BackTrack5 - LinuxBackTrack5 - Linux
BackTrack5 - Linuxmariuszantal
 
Cyber&digital forensics report
Cyber&digital forensics reportCyber&digital forensics report
Cyber&digital forensics reportyash sawarkar
 
Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPCSCJournals
 
Network Monitoring with Wireshark
Network Monitoring with WiresharkNetwork Monitoring with Wireshark
Network Monitoring with WiresharkSiddharth Coontoor
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET Journal
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)Wail Hassan
 
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
A Study Of Open Ports As Security Vulnerabilities In Common User ComputersA Study Of Open Ports As Security Vulnerabilities In Common User Computers
A Study Of Open Ports As Security Vulnerabilities In Common User ComputersJoshua Gorinson
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...IJNSA Journal
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptxImXaib
 
_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 AssignmentLaura Aviles
 
Packet Forging over LAN
Packet Forging over LANPacket Forging over LAN
Packet Forging over LANABHIJEET SINGH
 

Similar to ISC 3523 Research Methods.docx (20)

A REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURESA REVIEW ON NMAP AND ITS FEATURES
A REVIEW ON NMAP AND ITS FEATURES
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidence
 
Internet Relay Chat Forensics
Internet Relay Chat ForensicsInternet Relay Chat Forensics
Internet Relay Chat Forensics
 
J_McConnell_LabReconnaissance
J_McConnell_LabReconnaissanceJ_McConnell_LabReconnaissance
J_McConnell_LabReconnaissance
 
BackTrack5 - Linux
BackTrack5 - LinuxBackTrack5 - Linux
BackTrack5 - Linux
 
Network Miner Network forensics
Network Miner Network forensicsNetwork Miner Network forensics
Network Miner Network forensics
 
Cyber&digital forensics report
Cyber&digital forensics reportCyber&digital forensics report
Cyber&digital forensics report
 
Network Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISPNetwork Security: Experiment of Network Health Analysis At An ISP
Network Security: Experiment of Network Health Analysis At An ISP
 
Network Monitoring with Wireshark
Network Monitoring with WiresharkNetwork Monitoring with Wireshark
Network Monitoring with Wireshark
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
 
Module 7 (sniffers)
Module 7 (sniffers)Module 7 (sniffers)
Module 7 (sniffers)
 
Sectools
SectoolsSectools
Sectools
 
aaa
aaaaaa
aaa
 
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
A Study Of Open Ports As Security Vulnerabilities In Common User ComputersA Study Of Open Ports As Security Vulnerabilities In Common User Computers
A Study Of Open Ports As Security Vulnerabilities In Common User Computers
 
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...
 
Tools.pptx
Tools.pptxTools.pptx
Tools.pptx
 
_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment_lauraaviles_05082015_Week 2 Assignment
_lauraaviles_05082015_Week 2 Assignment
 
Packet Forging over LAN
Packet Forging over LANPacket Forging over LAN
Packet Forging over LAN
 
Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 

More from stirlingvwriters

Speak to the idea of feminism from your perspective and.docx
Speak to the idea of feminism from your perspective and.docxSpeak to the idea of feminism from your perspective and.docx
Speak to the idea of feminism from your perspective and.docxstirlingvwriters
 
What is the logic behind How.docx
What is the logic behind How.docxWhat is the logic behind How.docx
What is the logic behind How.docxstirlingvwriters
 
Thinking about password identify two that you believe are.docx
Thinking about password identify two that you believe are.docxThinking about password identify two that you believe are.docx
Thinking about password identify two that you believe are.docxstirlingvwriters
 
The student will demonstrate and articulate proficiency in.docx
The student will demonstrate and articulate proficiency in.docxThe student will demonstrate and articulate proficiency in.docx
The student will demonstrate and articulate proficiency in.docxstirlingvwriters
 
To help lay the foundation for your study of postmodern.docx
To help lay the foundation for your study of postmodern.docxTo help lay the foundation for your study of postmodern.docx
To help lay the foundation for your study of postmodern.docxstirlingvwriters
 
TITLE Digital marketing before and after pandemic Sections that.docx
TITLE Digital marketing before and after pandemic Sections that.docxTITLE Digital marketing before and after pandemic Sections that.docx
TITLE Digital marketing before and after pandemic Sections that.docxstirlingvwriters
 
This assignment focuses on Marxist students will educate.docx
This assignment focuses on Marxist students will educate.docxThis assignment focuses on Marxist students will educate.docx
This assignment focuses on Marxist students will educate.docxstirlingvwriters
 
There are many possible sources of literature for.docx
There are many possible sources of literature for.docxThere are many possible sources of literature for.docx
There are many possible sources of literature for.docxstirlingvwriters
 
You enter your project team meeting with Mike and Tiffany.docx
You enter your project team meeting with Mike and Tiffany.docxYou enter your project team meeting with Mike and Tiffany.docx
You enter your project team meeting with Mike and Tiffany.docxstirlingvwriters
 
Write a minimum of 200 words response to each post.docx
Write a minimum of 200 words response to each post.docxWrite a minimum of 200 words response to each post.docx
Write a minimum of 200 words response to each post.docxstirlingvwriters
 
View the video on Law at Discuss various.docx
View the video on Law at Discuss various.docxView the video on Law at Discuss various.docx
View the video on Law at Discuss various.docxstirlingvwriters
 
Your software has gone live and is in the production.docx
Your software has gone live and is in the production.docxYour software has gone live and is in the production.docx
Your software has gone live and is in the production.docxstirlingvwriters
 
This learning was a cornucopia of enrichment with regard.docx
This learning was a cornucopia of enrichment with regard.docxThis learning was a cornucopia of enrichment with regard.docx
This learning was a cornucopia of enrichment with regard.docxstirlingvwriters
 
This is a school community relations My chosen school.docx
This is a school community relations My chosen school.docxThis is a school community relations My chosen school.docx
This is a school community relations My chosen school.docxstirlingvwriters
 
Write 3 Only one resource is I.docx
Write 3 Only one resource is I.docxWrite 3 Only one resource is I.docx
Write 3 Only one resource is I.docxstirlingvwriters
 
Sociology researches social issues through the use of theoretical.docx
Sociology researches social issues through the use of theoretical.docxSociology researches social issues through the use of theoretical.docx
Sociology researches social issues through the use of theoretical.docxstirlingvwriters
 
Step Listen to the Trail of Tears.docx
Step Listen to the Trail of Tears.docxStep Listen to the Trail of Tears.docx
Step Listen to the Trail of Tears.docxstirlingvwriters
 
You are the newly hired Director of Risk Management for.docx
You are the newly hired Director of Risk Management for.docxYou are the newly hired Director of Risk Management for.docx
You are the newly hired Director of Risk Management for.docxstirlingvwriters
 

More from stirlingvwriters (20)

Speak to the idea of feminism from your perspective and.docx
Speak to the idea of feminism from your perspective and.docxSpeak to the idea of feminism from your perspective and.docx
Speak to the idea of feminism from your perspective and.docx
 
What is the logic behind How.docx
What is the logic behind How.docxWhat is the logic behind How.docx
What is the logic behind How.docx
 
Thinking about password identify two that you believe are.docx
Thinking about password identify two that you believe are.docxThinking about password identify two that you believe are.docx
Thinking about password identify two that you believe are.docx
 
The student will demonstrate and articulate proficiency in.docx
The student will demonstrate and articulate proficiency in.docxThe student will demonstrate and articulate proficiency in.docx
The student will demonstrate and articulate proficiency in.docx
 
To help lay the foundation for your study of postmodern.docx
To help lay the foundation for your study of postmodern.docxTo help lay the foundation for your study of postmodern.docx
To help lay the foundation for your study of postmodern.docx
 
TITLE Digital marketing before and after pandemic Sections that.docx
TITLE Digital marketing before and after pandemic Sections that.docxTITLE Digital marketing before and after pandemic Sections that.docx
TITLE Digital marketing before and after pandemic Sections that.docx
 
This assignment focuses on Marxist students will educate.docx
This assignment focuses on Marxist students will educate.docxThis assignment focuses on Marxist students will educate.docx
This assignment focuses on Marxist students will educate.docx
 
Upton Souls of Black.docx
Upton Souls of Black.docxUpton Souls of Black.docx
Upton Souls of Black.docx
 
What is a In this.docx
What is a In this.docxWhat is a In this.docx
What is a In this.docx
 
There are many possible sources of literature for.docx
There are many possible sources of literature for.docxThere are many possible sources of literature for.docx
There are many possible sources of literature for.docx
 
You enter your project team meeting with Mike and Tiffany.docx
You enter your project team meeting with Mike and Tiffany.docxYou enter your project team meeting with Mike and Tiffany.docx
You enter your project team meeting with Mike and Tiffany.docx
 
Write a minimum of 200 words response to each post.docx
Write a minimum of 200 words response to each post.docxWrite a minimum of 200 words response to each post.docx
Write a minimum of 200 words response to each post.docx
 
View the video on Law at Discuss various.docx
View the video on Law at Discuss various.docxView the video on Law at Discuss various.docx
View the video on Law at Discuss various.docx
 
Your software has gone live and is in the production.docx
Your software has gone live and is in the production.docxYour software has gone live and is in the production.docx
Your software has gone live and is in the production.docx
 
This learning was a cornucopia of enrichment with regard.docx
This learning was a cornucopia of enrichment with regard.docxThis learning was a cornucopia of enrichment with regard.docx
This learning was a cornucopia of enrichment with regard.docx
 
This is a school community relations My chosen school.docx
This is a school community relations My chosen school.docxThis is a school community relations My chosen school.docx
This is a school community relations My chosen school.docx
 
Write 3 Only one resource is I.docx
Write 3 Only one resource is I.docxWrite 3 Only one resource is I.docx
Write 3 Only one resource is I.docx
 
Sociology researches social issues through the use of theoretical.docx
Sociology researches social issues through the use of theoretical.docxSociology researches social issues through the use of theoretical.docx
Sociology researches social issues through the use of theoretical.docx
 
Step Listen to the Trail of Tears.docx
Step Listen to the Trail of Tears.docxStep Listen to the Trail of Tears.docx
Step Listen to the Trail of Tears.docx
 
You are the newly hired Director of Risk Management for.docx
You are the newly hired Director of Risk Management for.docxYou are the newly hired Director of Risk Management for.docx
You are the newly hired Director of Risk Management for.docx
 

Recently uploaded

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 

Recently uploaded (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 

ISC 3523 Research Methods.docx

  • 1. ISC 3523 Research Methods Answer: Introduction: The aim of this report is performing the lab on Kali-Hunt VM and Win-Hunt VM. The pcap file will be analysed. For the analysis tools like Network miner, Wireshark and Snort will be used and the given questions will be answered along with screenshots. From the analysis the story of captured file will be written as well as the captured file will be run through snort so that any triggered alerts can be triggered. Description Of The Selected Tools: For doing the analysis Network Miner will be used which is an open source Network Forensics Analysis Tool for Windows OS however the tools is also accessible for operating systems like FreeBSD, MAC OS X. The tool can be utilized as a packet capturing tool, passive network sniffer for detecting the sessions, operating systems, open ports and host names etc. that too without even putting any kind of traffic on the network (Adebayo, Olawale Surajudeen, et al., 2020). Network Miner can also parse the PCAP file for off line analysis as well as for regenerating or reassembling the certificates and transmitted files from the PCAP files. The tool can make the things easy for performing advanced network traffic analysis through providing extracted artifacts in the intuitive user interface (Sanders, Chris, 2017). The way the data is presented can not only make the process of analysis simpler but also it is helpful for saving valuable time for the forensic investigator or analyst. Along with Netminer Wireshark tool will be also used which is also a free and open source tool that can analyse the coming traffic in the network in real time for the Mac, Windows, Linux and Unix based systems (Kaur, Prabhjot, and Neeti Misra, 2019). The tool can also capture data packets which are passing by the interface of the network such as SDRs, LANs or Ethernet as well as it can also translate the data in to valuable information for the IT professionals as well as cyber security teams. The tool can provide a series of various display filters for transforming every packets which are captured in to a readable format. It can provide allowance the users for identifying the causes of issues existed in network security as well as even discover the potential cyber criminal activities. When a packet sniffer is used in the promiscuous mode the users can make analysis of the network traffic
  • 2. regarding of the destination (Pansari, Nikunj, and Ajay Agarwal, 2020). It provides the power to the IT professionals in performing a quick and through diagnosis of the security of the network. Lastly Snort tool will be used for finding if any triggered alerts can be triggered. The tool can be used a straight packet sniffing tool, a packet logger or like a full blown intrusion detection system for network. Open And Loading Captured File: Captured file in Wireshark: : Performing Analysis On The Captured File: Question a) Answer: 505.69 seconds Question b) Answer: 2449 Question c) Answer: 811157 bytes Question d) Answer: ARP, Browser, DHCP, DNS, FTP, FTP-DATA, HTTP, MDNS, NBNS, SSLv2, SSLv3, TCP, TiVoConnect, UDP Question e) Answer: 94 - 115 Question f) Answer: TCP SYN-ACK Handshaking protocol Question g)
  • 3. Answer: Yes, Yahoo/AOL Question h) Answer: Name of host computer: KAUFMANUPSTAIRS; IP address: 172.16.1.35 Question i) Answer: WINDOWS XP Question j) Answer: cisco Question k) Answer: DVR 8525, KAUFMANUPSTAIRS, Cisco-LI (main router), 2WireInc (modem), Linksys G Question l) Answer: No Question m) Answer: DVR(Tivo) , 2 modems Story: -r command is telling the Snort tool to read a single pcap -c command is telling Snort to load the configuration file Running The Captured File Through Snort: cd Desktop/Snort/bin snort -r C:UsersAdministratorDesktop[3523_Lab2_Capture_file.pcap] -c 172.16.2.2sharedfilesSnortetcsnort.conf Conclusion: Thus, it can be concluded from the report that in this paper the pcap file has been analysed
  • 4. using windows VM. For that tools like Network Miner, Wireshark and Snort has been used. The screenshots for the analysis have also been provided and the lab questions have also been answered. Bibliography: Adebayo, Olawale Surajudeen, et al. "Analysis and Classification of some Selected Social media Apps Vulnerability. Springer. Book collection of International conference on Information and Communication. Part of the Communications in Computer and Information Science book series." (2020). Susianto, Didi, and Anisa Rachmawati. "Implementasi Dan Analisis Jaringan Menggunakan Wireshark, Cain And Abels, Network Minner." Jurnal Cendikia 16.2 Oktober (2018): 120- 125. Sanders, Chris. Practical Packet Analysis, 3E: Using Wireshark to Solve Real-World Network Problems. No Starch Press, 2017. RAUT, Mrs JUITA TUSHAR. "PERFORMANCE BASED COMPARATIVE ASSESSMENT OF DIFFERENTSECURITY TOOLS FOR WEB APPLICATION." (2020). Kaur, Prabhjot, and Neeti Misra. "A Methodical Review on Network Traffic Monitoring & Analysis Tools." A Journal of Composition Theory 12.9 (2019): 1964-1968. Zain ul Abideen, Muhammad, Shahzad Saleem, and Madiha Ejaz. "VPN Traffic Detection in SSL-Protected Channel." Security and Communication Networks 2019 (2019). Letavay, Viliam, Jan Pluskal, and Ond?ej Ryšavý. "Network Forensic Analysis for Lawful Enforcement on Steroids, Distributed and Scalable." Proceedings of the 6th Conference on the Engineering of Computer Based Systems. 2019. Pansari, Nikunj, and Ajay Agarwal. "A Comparative Study of Analysis and Investigation using Digital Forensics." International Journal of Linguistics and Computational Applications (IJLCA) 7.2 (2020).