Perimeters and defense
Network Traffic Analysis (Exercise 4.17)
Duration: 15-30 minutes
This lab is about using tools to capture packets on the network and analyze them in a useful way. Being able to see network traffic makes it possible to troubleshoot problems as well as to secure the networks.
Report:
- Using TCP dump how do you view communications to and from TCP?
- How about FTP?
- Using Wireshark, what similarities do you observe in the details of different packets?
- What is the google.com IP?
- List all protocols viewed and the corresponding source and destination information.
- Why would the information in a packet be useful to a hacker or to a network administrator?
Network Traffic Analysis (Exercise 4.18)
Duration: 30-40 minutes
This lab demonstrates using a VPN to keep the remote access process private and secure.
Students work in pairs —> controlling server+controlling client
Report:
- Summarize your process of connecting to the server using VNC.
- Why is this mechanism secure?