| 81 | | === |
| | 81 | === Analysing === |
| | 82 | |
| | 83 | Download the sample packet capture files from here. Open them from wireshak to analyse them. Go to '''File>Open''' and select tha pcap file to be open. |
| | 84 | |
| | 85 | '''Telnet.pcap''' |
| | 86 | - Wht is the Username and Password? |
| | 87 | - What did the User do after log in? |
| | 88 | Open the file. Filter all the telnet traffic. Go to Analyse>Follow>TCP Stream. |
| | 89 | |
| | 90 | '''massivesyn.pcap''' |
| | 91 | - Is this an attack? If so what type of an attack? |
| | 92 | Open the file, Go to Statistics>Coversation. Check for the Type of packet, Sourse IP and the duration |
| | 93 | |
| | 94 | '''chat.dump''' |
| | 95 | |
| | 96 | Open the file. Go to Analyse>Follow>TCP Stream. |
| | 97 | |
| | 98 | - What are the email addresses of the chatters? |
| | 99 | - What were they planning to do? |
| | 100 | |
| | 101 | '''ftp.pcap''' |
| | 102 | |
| | 103 | Open the file. Statistics>Coversation. Click TCP. Check the Statistics. Go to Analyse>Follow>TCP Stream |
| | 104 | |
| | 105 | - What is the IP address of the FTP server and the Client? |
| | 106 | - What is the error code 530? |
| | 107 | |
| | 108 | '''foobar.pcap''' |
| | 109 | |
| | 110 | Open the file. Statistics>Coversation and check for source and destination IP and port. Go to Statistics>Protocol Hierarchy |
| | 111 | |
| | 112 | - What is the protocol use TCP 6346? |
| | 113 | - What could be this scenario? |
| | 114 | |
| | 115 | '''convertinfo.pcap''' |
| | 116 | |
| | 117 | Open the file. Statistics>Coversation and check for packet length. |
| | 118 | |
| | 119 | - Ids this a normal icmp packet? |
| | 120 | |
| | 121 | '''sip.pcap''' |