Professional Documents
Culture Documents
Continuous Assessment 2
Required Resources
• PC / Laptop
• Latest version of Wireshark installed
• Internet access
Note: You are not required to use any virtual machines for this assessment.
Instructions
Create packet captures of five well known protocols of your choice. Four of the protocols must
contain unencrypted traffic and one protocol containing encrypted traffic.
For each of the five packet captures that you created document the following:
[20 marks for each capture]
Chosen Protocol
• Protocol name
• Brief description
Executive Summary
• Date/time of the activity
• What happened / protocol used
• Hosts / nodes involved
• The LAN segment used
• Broadcast address
Details
• Internal host IP address
• Internal host MAC address
• The host name of the internal host
• User account name / email address used if applicable
Indicators of operation
Describe the steps in the protocol conversation for your chosen protocol making sure to document,
for example:
• IP addresses
• Port numbers
• Total duration of conversation
• Operating systems used.
• Usernames
• URLs and domain names.
• Display unencrypted data such as usernames and passwords used where applicable
• Identify files downloaded where applicable
Note that the operation of each protocol will be different and not of all the items above will apply. If
you think there is anything important that is not listed above for your chosen protocol, please
document it.
Known weaknesses
For each of the protocols you have chosen research a known weakness, provide a link to the
weakness found, a brief description of the weakness and then document how to protect this
protocol from the weakness found.
You are free to use any of the suggested websites found in the course materials when researching
weaknesses.
Submission of Work
Document your work clearly and upload your work to Moodle using the provided link in the
Assessment section of your course page.