Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Identify the IP addresses for the Kali Linux and Windows 10 VMs.
By gaining an understanding of the basic protocol analyzer (Wireshark), students will be able to set up and read basic digital traffic, including:
Gaining a foundational understanding of logging.
Identifying the source and destination IPs.
Translating IP addresses into websites.
Identifying ports and protocols.
Creating a timeline of events.
View the “2-2 Wireshark Lab” video, located in Class Resources. In this lab, you will explore some basic Wireshark and Linux commands.
Part 1:
Complete the following Wireshark tasks and capture screenshots of each task result:
Identify the IP addresses for the Kali Linux and Windows 10 VMs.
On the Kali Linux VM, start a Wireshark packet capture and show all network traffic.
Add an ICMP filter and ping the Windows 10 VM.
Add an IP Address filter with the Windows 10 VM IP Address and run an Nmap Service Scan on the Windows 10 VM IP Address.
Research and apply two additional filters to demonstrate their effect on the capture.
Save the captured packets to a file.
Close the capture session and then load the capture file that you saved.
Part 2:
Write a 250- to 500-word summary and include the following:
Your Kali IP address
The Windows IP Address
The command used to change directory
The command that moves a file
The command that removes a file
The command that creates a new directory
An explanation for why a timestamp is important on Wireshark, as well as other logging tools
A list of 10 well-known ports and associated protocols
A brief explanation of the difference between a port and a protocol
Description of how Wireshark can be used to identify events that indicate an attack is in progress or has happened
Place all screenshots in a Microsoft Word document and submit it to the assignment. When submitting screenshots as part of your assignment, you must always include a full image of your desktop window; this includes the date and time in the lower right-hand corner of the Windows desktop or the upper-right corner of the macOS desktop.
While APA style is not required for the body of this assignment, solid academic writing is expected, and documentation of sources should be presented using APA formatting guidelines, which can be found in the APA Style Guide, located in the Student Success Center.
This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance.
Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)
NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.
NB: All your data is kept safe from the public.
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount