Question

We consider Host-A initiates a failed TCP session to Host-B if the following two conditions are...

We consider Host-A initiates a failed TCP session to Host-B if the following two conditions are satisfied: 1. Host-A sends a SYN packet to Host-B (to initiate a new TCP session); 2. Host-B sends no packet to Host-A or only RST packet(s) (for this session). For all IRC clients observed in this trace, does any of them initiate more than 10 failed connections? If so, please show their IP addresses and evidence. What commands are needed in WIRESHARK to complete this task.

0 0
Add a comment Improve this question Transcribed image text
Answer #1
Usage: wireshark [options] ... [ <infile> ]

Capture interface:
  -i <interface>           name or idx of interface (def: first non-loopback)
  -f <capfilter|predef:>   packet filter in libpcap filter syntax or
                           predef:filtername - predefined filtername from GUI
  -s <snaplen>             packet snapshot length (def: 262144)
  -p                       don’t capture in promiscuous mode
  -k                       start capturing immediately (def: do nothing)
  -S                       update packet display when new packets are captured
  -l                       turn on automatic scrolling while -S is in use
  -I                       capture in monitor mode, if available
  -B <buffer size>         size of kernel buffer (def: 2MB)
  -y <link type>           link layer type (def: first appropriate)
  --time-stamp-type <type> timestamp method for interface
  -D                       print list of interfaces and exit
  -L                       print list of link-layer types of iface and exit
  --list-time-stamp-types  print list of timestamp types for iface and exit

Capture stop conditions:
  -c <packet count>        stop after n packets (def: infinite)
  -a <autostop cond.> ...  duration:NUM - stop after NUM seconds
                           filesize:NUM - stop this file after NUM KB
                              files:NUM - stop after NUM files
Capture output:
  -b <ringbuffer opt.> ... duration:NUM - switch to next file after NUM secs
                           filesize:NUM - switch to next file after NUM KB
                              files:NUM - ringbuffer: replace after NUM files
RPCAP options:
  -A <user>:<password>     use RPCAP password authentication
Input file:
  -r <infile>              set the filename to read from (no pipes or stdin!)

Processing:
  -R <read filter>         packet filter in Wireshark display filter syntax
  -n                       disable all name resolutions (def: all enabled)
  -N <name resolve flags>  enable specific name resolution(s): "mnNtdv"
  -d <layer_type>==<selector>,<decode_as_protocol> ...
                           "Decode As”, see the man page for details
                           Example: tcp.port==8888,http
  --disable-protocol <proto_name>
                           disable dissection of proto_name
  --enable-heuristic <short_name>
                           enable dissection of heuristic protocol
  --disable-heuristic <short_name>
                           disable dissection of heuristic protocol

User interface:
  -C <config profile>      start with specified configuration profile
  -Y <display filter>      start with the given display filter
  -g <packet number>       go to specified packet number after "-r"
  -J <jump filter>         jump to the first packet matching the (display)
                           filter
  -j                       search backwards for a matching packet after "-J"
  -m <font>                set the font name used for most text
  -t a|ad|d|dd|e|r|u|ud    output format of time stamps (def: r: rel. to first)
  -u s|hms                 output format of seconds (def: s: seconds)
  -X <key>:<value>         eXtension options, see man page for details
  -z <statistics>          show various statistics, see man page for details

Output:
  -w <outfile|->           set the output filename (or '-' for stdout)

Miscellaneous:
  -h                       display this help and exit
  -v                       display version info and exit
  -P <key>:<path>          persconf:path - personal configuration files
                           persdata:path - personal data files
  -o <name>:<value> ...    override preference or recent setting
  -K <keytab>              keytab file to use for kerberos decryption
Add a comment
Know the answer?
Add Answer to:
We consider Host-A initiates a failed TCP session to Host-B if the following two conditions are...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Networking problem help Consider the following TCP session between hosts A and host B on a...

    Networking problem help Consider the following TCP session between hosts A and host B on a perfect channel: A has a file of size 2.5MSS to send to B. A desires to send segments of alternating sizes MSS and MSS/2 (sequence number = 0 for the first segment of size MSS). B also has a file of size 2.5MSS to send to A. B desires to send segments of alternating sizes MSS/2 and MSS (sequence number = 0 for the...

  • Consider the following network. IP and Ethernet addresses are marked for all interfaces. Assume a client...

    Consider the following network. IP and Ethernet addresses are marked for all interfaces. Assume a client on host A sends a TCP connection request message to a web server on host B. Show all the headers in the packet on link 1 and on link 2, assuming the addressing indicated on the figure. Include IP source and destination addresses, Ethernet source and destination addressees, and TCP source and destination port numbers. Use port numbers that make sense for the given...

  • How to solve Exercises 1? Project Goal The project will give you some hands-on experience with...

    How to solve Exercises 1? Project Goal The project will give you some hands-on experience with Nmap. Nmap is a network tool that allows you to scan live hosts and services (open ports), thus, creating a "map" of the network. You will be using Zenmap, a graphical user interface (GUID of Nmap, to investigate several basic types of networl scanning techniques. You can work in teams of two students or alone. Setup: Installing&Using Zenmap Visit nmap.org/download.html to download and install...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT