Question

In wireshark: What is the result of using a capture filter of host 10.0.10.12?

In wireshark: What is the result of using a capture filter of host 10.0.10.12?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Capture filters are limited and are set before starting a packet capture.They cannot be altered during the capture.They reduce the size of raw packet capture.The given question captures only the traffic to or from host address 10.0.10.12.Any other traffic cannot be determined.

Add a comment
Know the answer?
Add Answer to:
In wireshark: What is the result of using a capture filter of host 10.0.10.12?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Write a wireshark capture filter expression that captures packets containing IP datagrams between two hosts with...

    Write a wireshark capture filter expression that captures packets containing IP datagrams between two hosts with IP addresses 10.0.1.11 and 10.0.1.12, both on interface eth1 .

  • 7. Hands-on practice: WireShark (10 pt., 5 pt. each) Install Wireshark on your own computer and...

    7. Hands-on practice: WireShark (10 pt., 5 pt. each) Install Wireshark on your own computer and obtain a screen shot similar to Figure 1.28 on page 78 of K&R. Hint: You may want to set “display filter” to filter out non-HTTP traffic. a. Capture a HTTP GET request packet. Expand the section of “Hypertext Transfer Protocol” for details. Report the connection type. b. Capture a HTTP response packet with “OK”. Expand the section of “Hypertext Transfer Protocol” for details. Report...

  • QUESTION 3 It is entirely possible to look at the Packet payload using both Wireshark and...

    QUESTION 3 It is entirely possible to look at the Packet payload using both Wireshark and Snort. For Wireshark, the payload can be search from the packet listed in the capture file while for Snort one can use Content field in the rule to look for a given Hex string or text string in the payload. O True False

  • In the Wireshark Capture. In frame 126, follow the TCP stream. What is the request that...

    In the Wireshark Capture. In frame 126, follow the TCP stream. What is the request that is made to the server? What response does the server give back? Based on these messages and others you can see in the packet capture, what would you say is going on? Is this an attack? If so, what type of attack might it be? No. Time source Destination Protocol Length Info 74 52148 80 SYN] Seq-0 win 29200 Len-0 Mss 1460 SACK PERM...

  • Close all the browsers Open the Wireshark application Start your capture by clicking the start button...

    Close all the browsers Open the Wireshark application Start your capture by clicking the start button Open IE (Internet Explorer), go to the udc website and click there on a couple of links to capture data in Wireshark, and identify the following from the application layer Request line Request command Request URL Pick a request header name and find corresponding value on your own Http version Response line Response status code and description Pick a response header name and find...

  • 9) Start a Wireshark capture session on Host1 on port F0/0 10) On Host1, begin a...

    9) Start a Wireshark capture session on Host1 on port F0/0 10) On Host1, begin a telnet session to 10.251.0.254. Host1#: telnet 10.251.0.254 11) When prompted for a username & password, type cisco for both 12) After successfully authenticating into Router1, issue the exit command to close the session. 13) Stop the capture session from Host1. Discuss how telnet traffic being sent in clear text is a security issue and suggest ways to mitigate that risk.

  • At this stage, you should be a Wireshark expert. Thus, we are not going to spell...

    At this stage, you should be a Wireshark expert. Thus, we are not going to spell out the steps as explicitly as in earlier labs. In particular, we are not going to provide example screenshots for all the steps. 1.   Start capturing packets in Wireshark and then do something that will cause your host to send and receive several UDP packets (Note that DNS is using UDP for communications. You can use nslookup commands in Lab 4 to generate DNS...

  • Question 13 5 pts Based on the provided Wireshark Capture File and information contained in Frame...

    Question 13 5 pts Based on the provided Wireshark Capture File and information contained in Frame # 12: What is the IPv4 address for the destination of the Layer 3 datagram (based on the particular Layer 3 datagram mentioned in instructions of this quiz)? 10.129.61.67 216.58.216.238 134.124.1.234 107.23.244.231 Question 14 5 pts Based on the provided Wireshark Capture File and information contained in Frame # 12: What is the IPv4 address of the source of the Layer 3 datagram (based...

  • The goal of this first lab was primarily to introduce you to Wireshark. The following questions...

    The goal of this first lab was primarily to introduce you to Wireshark. The following questions will demonstrate that you’ve been able to get Wireshark up and running, and have explored some of its capabilities. Answer the following questions, based on your Wireshark experimentation: 1. List up to 10 different protocols that appear in the protocol column in the unfiltered packet-listing window in step 7 Step 7: After your browser has displayed the INTRO-wireshark-file1.html page, stop Wireshark packet capture by...

  • Lab 7.4 Installing and Configuring an SSH Client The Wireshark capture of the SSH session performed...

    Lab 7.4 Installing and Configuring an SSH Client The Wireshark capture of the SSH session performed in this lab shows that __________________. the entire session was encrypted the entire session was unencrypted the negotiation of cryptographic protocols was unencrypted and the rest of the session was encrypted only the authentication password was encrypted In this lab, __________________ was used. SSHv1 SSHv2 SSHv3 SSHv4 In this lab, the port that Windows 10 VM used was __________________. 21 80 22 dynamically assigned...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT