Lab 8 - Report file

docx

School

Saint Leo University *

*We aren’t endorsed by this school

Course

452

Subject

Communications

Date

Apr 3, 2024

Type

docx

Pages

14

Uploaded by hnmathewson

Report
Lab 7: Decoding an FTP Protocol Session for Forensic Evidence Hannah Mathewson Computer Forensics COM-452-OL01 Professor James Jones March 3, 2024
Section 1: Hands-On Demonstration Part 1: Explore an FTP Transaction in Wireshark 7.) Make a screen capture showing the filtered Wireshark results and paste it into your Lab Report file. 12.) In the Lab Report file, document each item in the following list: Answer: Required list of Wireshark FTP details; IP address for the FTP client; 172.16.177.132 IP address for the FTP server; 172.16.177.157 MAC layer address of the FTP client; 00:0c:29:16:cd:f3 Mac layer address of the FTP server; 00:0c:29:39:12:b2 Source FTP port number and destination FTP port number: Source port: 1423 and Destination port: 21
Part 2: Explore an FTP Transaction in NetWitness 9.) In the Lab Report file, document each item in the following list: Answer: The user accounts and passwords used to connect to the FTP server User: badguy Password: you will never guess this !! User: anonymous Password: mozilla@example.com Names of the text files that were transferred via FTP badnotes1.txt and badnotes2.txt. Total size of the FTP file transfer; 5.71KB Directory of the FTP files server where the two text files are located /home/badguy/
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Section 2: Applied Learning Part 1: Explore an FTP Transaction in Wireshark 2.) On the vWorkstation desktop, create a new Bitmap image and save the file as yourname_Image.
17.) Make a screen capture showing of the following details and paste it into the Lab Report file. You will need to use multiple screen captures.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Part 2: Explore an FTP Transaction in NetWitness
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Section 3: Lab Challenge and Analysis Part 1: Analysis and Discussion 1.) Both Netwitness and Wireshark would be good tools to help the groups. You will be able to see if anyone has tried to login and what username they used. If someone who should not have been login downloads or shares a file and can see the file and how big it is. I already had section 1 closed when I saw this question. Part 2: Tools and Commands 1.) The ftpcapture.pcap file reviewed in section 1 includes two password attempts. Name both 311 password required for anonymous 311 password required for badguy Part 3: Challenge Exercise 1.) Using wireshark make a screen capture showing the FTP server types in the ftpcapture.pcap file. If you completed section 2 make a screen capture showing the FTP server type used in that Wireshark file.