Question

Software Security (This question needs Wireshark). Locate a series of packets that establish a TCP connection....

Software Security

(This question needs Wireshark). Locate a series of packets that establish a TCP connection. To answer this question, install Wireshark (https://www.wireshark.org/download.html) and run the attached Wireshark capture file c12.pcap.

Attachment Download (Download Button At Top Right of Webpage): https://www.dropbox.com/s/irbewpv09a7saf7/c12.pcap?dl=0

a. Which packets perform the 3-way handshake? Identify them by packet number.

b. Identify the connection’s source and destination port numbers. Identify the application associated with this connection.

c. Identify a packet, by number, that “acks” data transmitted on this connection. What is the ACK number provided in that packet?

d. Identify the packet, by number, that sent some of the data “acked” by the packet in the previous question. What is the SEQ number provided in that packet? How many bytes of data were carried in that packet?

0 0
Add a comment Improve this question Transcribed image text
Request Professional Answer

Request Answer!

We need at least 10 more requests to produce the answer.

0 / 10 have requested this problem solution

The more requests, the faster the answer.

Request! (Login Required)


All students who have requested the answer will be notified once they are available.
Know the answer?
Add Answer to:
Software Security (This question needs Wireshark). Locate a series of packets that establish a TCP connection....
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Similar Homework Help Questions
  • In the Wireshark Capture. In frame 126, follow the TCP stream. What is the request that...

    In the Wireshark Capture. In frame 126, follow the TCP stream. What is the request that is made to the server? What response does the server give back? Based on these messages and others you can see in the packet capture, what would you say is going on? Is this an attack? If so, what type of attack might it be? No. Time source Destination Protocol Length Info 74 52148 80 SYN] Seq-0 win 29200 Len-0 Mss 1460 SACK PERM...

  • TCP computer networks

    Assume that a station X wants to send 15 packets of data to station Y using TCP Tahoe. Assuming that:1) The size of each packet sent is 1000 Bytes (ignore all the headers from layers below).2) Station X chooses 43 as an initial sequence number.3) Station Y chooses 2 as an initial sequence number.4) The data of the first packet is included in the final packet of the handshake process.5) The sender window size is 5 packets.6) The receiver window...

  • (1) Assume that a station X wants to send 15 packets of data to station Y...

    (1) Assume that a station X wants to send 15 packets of data to station Y using TCP Tahoe. Assuming that: 1) The size of each packet sent is 1000 Bytes (ignore all the headers from layers below). 2) Station X chooses 43 as an initial sequence number. 3) Station Y chooses 2 as an initial sequence number. 4) The data of the first packet is included in the final packet of the handshake process. 5) The sender window size...

  • Q1) Assume that a station X wants to send 15 packets of data to station Y...

    Q1) Assume that a station X wants to send 15 packets of data to station Y using TCP Tahoe. Assuming that: 1)The size of each packet sent is 1000 Bytes (ignore all the headers from layers below). 2)Station X chooses 43 as an initial sequence number. 3)Station Y chooses 2 as an initial sequence number. 4)The data of the first packet is included in the final packet of the handshake process. 5)The sender window size is 5 packets. 6)The receiver...

  • PLEASE HELP WITH THESE COMPUTER NETWORK QUESTIONS THESE INCLUDE MCQS AND CALCULATIONS With reference to the...

    PLEASE HELP WITH THESE COMPUTER NETWORK QUESTIONS THESE INCLUDE MCQS AND CALCULATIONS With reference to the Go-Back-N and Selective repeat protocols, what does the window value signify? The packets that have already been ACKed The packets sent but remain unACKed The sequence numbers available and not yet sent The sequence numbers of packets not yet available None of the above 1 points    QUESTION 2 Which of the following is NOT a component of the TCP congestion control algorithm? Slow...

  • Question 13 5 pts Based on the provided Wireshark Capture File and information contained in Frame...

    Question 13 5 pts Based on the provided Wireshark Capture File and information contained in Frame # 12: What is the IPv4 address for the destination of the Layer 3 datagram (based on the particular Layer 3 datagram mentioned in instructions of this quiz)? 10.129.61.67 216.58.216.238 134.124.1.234 107.23.244.231 Question 14 5 pts Based on the provided Wireshark Capture File and information contained in Frame # 12: What is the IPv4 address of the source of the Layer 3 datagram (based...

  • Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID...

    Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID Port number UDP HTTP ( ) a ( ) b ( ) c ( ) d 2 points Question 35 Mail server port number is usually 8080 80 2525 25 ( ) a ( ) b ( ) c ( ) d 2 points Question 36 TCP Head length indicates ( ) The size of the segment ( ) The capacity of data that...

  • - Network security QUESTION 17 We assume that a LAN network includes 7 hosts (A, B,...

    - Network security QUESTION 17 We assume that a LAN network includes 7 hosts (A, B, C, D, E. Fand G) which are connected by a switch. The contents of the switch's CAM table is as follows: (Port 1. Host A) - (Port 2. Host B) - (Port 3. Host - Port 4, Host D) - Port S. Hosta-Port 6, Host F) - (Port 7. HostG), Also, we assume that there is/are one or many host(s) that has/have sent fake...

  • In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions...

    In this lab, we’ll investigate the 802.11 wireless network protocol. Follow the instructions and answers questions 7 - 10. http://gaia.cs.umass.edu/wireshark-labs/wireshark-traces.zip In this lab, we'll investigate the 802.11 wireless network protocol. Before beginning this lab, you might want to re-read Section 6.3 in the text. Since we l1 be delving a bit deeper into 802.11 than is covered in the text, you might want to check out "A Technical Tutorial on the 802.11Protocol," by Pablo Brenner (Breezecom Communications) http://www.sss-mag.com/pdf802_11tut.pdf, and "Understanding...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT