The aim of this report is performing the lab on Kali-Hunt VM and Win-Hunt VM. The pcap file will be analysed. For the analysis tools like Network miner, Wireshark and Snort will be used and the given questions will be answered along with screenshots. From the analysis the story of captured file will be written as well as the captured file will be run through snort so that any triggered alerts can be triggered.
For doing the analysis Network Miner will be used which is an open source Network Forensics Analysis Tool for Windows OS however the tools is also accessible for operating systems like FreeBSD, MAC OS X. The tool can be utilized as a packet capturing tool, passive network sniffer for detecting the sessions, operating systems, open ports and host names etc. that too without even putting any kind of traffic on the network (Adebayo, Olawale Surajudeen, et al., 2020). Network Miner can also parse the PCAP file for off line analysis as well as for regenerating or reassembling the certificates and transmitted files from the PCAP files. The tool can make the things easy for performing advanced network traffic analysis through providing extracted artifacts in the intuitive user interface (Sanders, Chris, 2017). The way the data is presented can not only make the process of analysis simpler but also it is helpful for saving valuable time for the forensic investigator or analyst.
Along with Netminer Wireshark tool will be also used which is also a free and open source tool that can analyse the coming traffic in the network in real time for the Mac, Windows, Linux and Unix based systems (Kaur, Prabhjot, and Neeti Misra, 2019). The tool can also capture data packets which are passing by the interface of the network such as SDRs, LANs or Ethernet as well as it can also translate the data in to valuable information for the IT professionals as well as cyber security teams. The tool can provide a series of various display filters for transforming every packets which are captured in to a readable format. It can provide allowance the users for identifying the causes of issues existed in network security as well as even discover the potential cyber criminal activities. When a packet sniffer is used in the promiscuous mode the users can make analysis of the network traffic regarding of the destination (Pansari, Nikunj, and Ajay Agarwal, 2020). It provides the power to the IT professionals in performing a quick and through diagnosis of the security of the network.
5N3734: Infection Control and Prevention, Assignment
Read More5N0784 Computer Aided Draughting 2D, Architectural Drawing & Renewable Energy Systems,
Read More5N1604 Computer Aided Draughting 2D (CAD),
Read More5N1604 Architectural Drawing/CAD/ Renewable Energy Systems,
Read MoreFeatures Of Partnership Working In Health And Social Care, Assignment,
Read MoreUNIT CMI 321: Compare the strengths and weaknesses of THREE (3) different methods for personal and professional development
Read MoreExplain the difference between shallow foundation and deep foundation?
Read MoreBriefly explain how people practitioners can be proactive in their approach to continued professional development (CPD),
Read MoreAnalyse the impact and resource requirements likely for growth strategies in a range of organisations.
Read MoreHSC Level 3 Unit 1 – Structure and Overview of the Health and Social Care Sector,
Read More