networking & wireless routers viii wireshark
DESCRIPTION
Networking & Wireless Routers VIII Wireshark. 20 Points TU Networking 3342 Dr. Thomas Hicks. ---------------------- Integrity Check ---------------------- As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any Of Your Labs. . Your Name _________________ - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/1.jpg)
1
Networking & Wireless Routers VIII
Wireshark
20 Points
TU Networking 3342Dr. Thomas Hicks
![Page 2: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/2.jpg)
2
---------------------- Integrity Check ----------------------
As You Well Know, It Is A Violation Of Academic IntegrityTo Fake The Results On Any Of Your Labs.
![Page 3: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/3.jpg)
Your Name
_________________
Name This Presentation:Tom-Hicks-7-Router-Wireless-Lab.pptx
{Substitute Your First & Last Names}
![Page 4: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/4.jpg)
4
Create File DataTransfer.txt
![Page 5: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/5.jpg)
5
Use Visual Studio To Create A File, Called DataTransfer.txtThe File Is To Contain Approximately 75 MB Of Letters A-Z In The
Following Format:Replace The Screen Capture Below With Yours!
![Page 6: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/6.jpg)
6
Use Visual Studio To Create A File, Called DataTransfer.TxtDisplay The File Size.
Replace The Screen Capture Below With Yours!
This Is Close Enough!
![Page 7: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/7.jpg)
7
You Will Need ThreeComputersFor This
Lab
![Page 8: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/8.jpg)
Name System 1, System 2, & Your System
CS-_??_ & CS-_??_ & CS-_??_
DataTransfer.txt
![Page 9: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/9.jpg)
9
Connect All Three Computers To Your
Router With A Wireless Adapter
![Page 10: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/10.jpg)
10
Configure Your D-Link N Access Point To The Proper Static IP
CS-1 to CS-4
CS-1 Static DNS = CS-1.cs.trinity.edu Static IP = 131.194.71.119 Router DNS = CS-8.cs.trinity.edu Router IP = 131.194.71.141 Router Gateway = 192.168.1.1 Wireless Adapter IP = 192.168.1.20
CS-2 Static DNS = CS-2.cs.trinity.edu Static IP = 131.194.71.120 Router DNS = CS-9.cs.trinity.edu Router IP = 131.194.71.142 Router Gateway = 192.168.1.1 Wireless Adapter IP = 192.168.1.21
CS-3 Static DNS = CS-3.cs.trinity.edu Static IP = 131.194.71.121 Router DNS = CS-10.cs.trinity.edu Router IP = 131.194.71.143 Router Gateway = 192.168.1.1 Wireless Adapter IP = 192.168.1.22
CS-4 Static DNS = CS-4.cs.trinity.edu Static IP = 131.194.71.179 Router DNS = CS-11.cs.trinity.edu Router IP = 131.194.71.146 Router Gateway = 192.168.1.1 Wireless Adapter IP = 192.168.1.23
![Page 11: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/11.jpg)
11
Configure Your D-Link N Access Point To The Proper Static IP
CS-5 to CS-7
CS-5 Static DNS = CS-5.cs.trinity.edu Static IP = 131.194.71.52 Router DNS = CS-12.cs.trinity.edu Router IP = 131.194.71.147 Router Gateway = 192.168.1.1 Wireless Adapter IP = 192.168.1.24
CS-6 Static DNS = CS-6.cs.trinity.edu Static IP = 131.194.71.167 Router DNS = CS-13.cs.trinity.edu Router IP = 131.194.71.148 Router Gateway = 192.168.1.1 Wireless Adapter IP = 192.168.1.25
CS-7 Static DNS = CS-7.cs.trinity.edu Static IP = 131.194.71.140 Router DNS = CS-14.cs.trinity.edu Router IP = 131.194.71.149 Router Gateway = 192.168.1.1 Wireless Adapter IP = 192.168.1.25
![Page 12: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/12.jpg)
12
Your System Wireless Access Point You May Use Any Device You Like
Identify & Add PhotoConnect It To Your Router!
Replace The Screen Capture Below With Yours!
Access Point : ______________________________________ Access Point = _?_ (D-Link USB DWA-130/ Belkin USB Wireless G F5D7050 / Netgear Wireless G PCI Card WG311NA / D-Link USB DWL-G132 / etc.)
Made By : __________________________________________ (D-Link, Belkin, Netgear, Linksys, etc.)
Attach A Photo Of The Device: (Do Internet Search!)
![Page 13: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/13.jpg)
13
System 1 Wireless Access Point You May Use Any Device You Like
Identify & Add PhotoConnect It To Your Router!
Replace The Screen Capture Below With Yours!
Access Point : ______________________________________ Access Point = _?_ (D-Link USB DWA-130/ Belkin USB Wireless G F5D7050 / Netgear Wireless G PCI Card WG311NA / D-Link USB DWL-G132 / etc.)
Made By : __________________________________________ (D-Link, Belkin, Netgear, Linksys, etc.)
Attach A Photo Of The Device: (Do Internet Search!)
![Page 14: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/14.jpg)
14
System 2 Wireless Access Point You May Use Any Device You Like
Identify & Add PhotoConnect It To Your Router!
Replace The Screen Capture Below With Yours!
Access Point : ______________________________________ Access Point = _?_ (D-Link USB DWA-130/ Belkin USB Wireless G F5D7050 / Netgear Wireless G PCI Card WG311NA / D-Link USB DWL-G132 / etc.)
Made By : __________________________________________ (D-Link, Belkin, Netgear, Linksys, etc.)
Attach A Photo Of The Device: (Do Internet Search!)
![Page 15: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/15.jpg)
15
Your Router Configuration From
Lab 8 Is Fine!
![Page 16: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/16.jpg)
16
Configure Your D-Link N Access Point To The Proper Static IP
CS-1 to CS-4
CS-1 Static DNS = CS-1.cs.trinity.edu Static IP = 131.194.71.119 Router DNS = CS-8.cs.trinity.edu Router IP = 131.194.71.141 Router Gateway = 192.168.1.1 Wireless Adapter IP = 192.168.1.20
CS-2 Static DNS = CS-2.cs.trinity.edu Static IP = 131.194.71.120 Router DNS = CS-9.cs.trinity.edu Router IP = 131.194.71.142 Router Gateway = 192.168.1.1 Wireless Adapter IP = 192.168.1.21
CS-3 Static DNS = CS-3.cs.trinity.edu Static IP = 131.194.71.121 Router DNS = CS-10.cs.trinity.edu Router IP = 131.194.71.143 Router Gateway = 192.168.1.1 Wireless Adapter IP = 192.168.1.22
CS-4 Static DNS = CS-4.cs.trinity.edu Static IP = 131.194.71.179 Router DNS = CS-11.cs.trinity.edu Router IP = 131.194.71.146 Router Gateway = 192.168.1.1 Wireless Adapter IP = 192.168.1.23
![Page 17: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/17.jpg)
17
Configure Your D-Link N Access Point To The Proper Static IP
CS-5 to CS-7
CS-5 Static DNS = CS-5.cs.trinity.edu Static IP = 131.194.71.52 Router DNS = CS-12.cs.trinity.edu Router IP = 131.194.71.147 Router Gateway = 192.168.1.1 Wireless Adapter IP = 192.168.1.24
CS-6 Static DNS = CS-6.cs.trinity.edu Static IP = 131.194.71.167 Router DNS = CS-13.cs.trinity.edu Router IP = 131.194.71.148 Router Gateway = 192.168.1.1 Wireless Adapter IP = 192.168.1.25
CS-7 Static DNS = CS-7.cs.trinity.edu Static IP = 131.194.71.140 Router DNS = CS-14.cs.trinity.edu Router IP = 131.194.71.149 Router Gateway = 192.168.1.1 Wireless Adapter IP = 192.168.1.25
![Page 18: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/18.jpg)
18
Co
DisableEthernet Cat-5Adapter On All Three Systems
![Page 19: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/19.jpg)
19
Disable All Access Points Except The WirelessOn Your System!
Replace The Screen Capture Below With Yours!
![Page 20: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/20.jpg)
20
Disable All Access Points Except The WirelessSystem 1!
Replace The Screen Capture Below With Yours!
![Page 21: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/21.jpg)
21
Disable All Access Points Except The WirelessOn System 2!
Replace The Screen Capture Below With Yours!
![Page 22: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/22.jpg)
22
Co
Install Wireshark
On Your System
![Page 23: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/23.jpg)
23
Remote Into Your SystemReplace The Screen Capture Below With Yours
![Page 24: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/24.jpg)
24
Co
Capture Packets Being Sent To Your System
Grab The Packets
![Page 25: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/25.jpg)
25
Put a Copy Of DataTransfer.txt In The Share Folder On System 1. Start WireShark. Copy DataTransfer.txt From The Share Folder Of
System 1 To Your Desktop Capture Using The Wireless Adapter
![Page 26: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/26.jpg)
26
Stop The Ethernet Card Capture. Sort By Source. Show Some Of The DataTransfer.txt FileReplace The Capture Below With Yours.
![Page 27: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/27.jpg)
27
Co
Capture Packets Being Sent From
Your System
Grab The Packets
![Page 28: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/28.jpg)
28
Open The Share Folder Of System 2. Start WireShark. Copy DataTransfer.txt From Your Desktop To The Share Folder Of System 2
Capture Using The Wireless Adapter
![Page 29: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/29.jpg)
29
Stop The Ethernet Card Capture. Sort By Source. Can You See Data Being Transferred Out?
If So, Add A Capture Below; If Not, Explain Below!
![Page 30: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/30.jpg)
30
Co
Capture Packets Transferred Between Two Other Systems
Grab The Packets
![Page 31: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/31.jpg)
31
Go To System 1. Open The Share Folder Of System 2. Start WireShark On Your System (No Longer Involved In the Transfer).
Copy DataTransfer.txt From System 2 To Desktop System 1 Capture Using The Wireless Adapter
![Page 32: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/32.jpg)
32
Stop The Ethernet Card Capture. Sort By Source. Can You See Data Being Transferred By Other Systems?
If So, Add A Capture Below; If Not, Explain Below!
![Page 33: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/33.jpg)
33
Co
EnableEthernet Cat-5Adapter On All Three Systems
Remove The WirelessAdapters
![Page 34: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/34.jpg)
34
Re-Enable The Cat-5 Adapter On Your SystemRemove The Wireless Adapter.
Replace The Screen Capture Below With Yours!
![Page 35: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/35.jpg)
35
Re-Enable The Cat-5 Adapter On System 1Remove The Wireless Adapter.
Replace The Screen Capture Below With Yours!
![Page 36: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/36.jpg)
36
Re-Enable The Cat-5 Adapter On System 2Remove The Wireless Adapter.
Replace The Screen Capture Below With Yours!
![Page 37: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/37.jpg)
37
Co
Ethernet Cat-5Capture
On Your System
![Page 38: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/38.jpg)
38
Start A Capture On Your System. Start A Browser On Your System. Navigate To Carme.cs.trinity.edu
Show The HTTP Traffic To Carme.Replace The Screen Capture Below With Yours.
![Page 39: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/39.jpg)
39
Plug Your System & System 1 Into The Same Switch. Start Wireshark On Your System. Take The Browser On System 1 To Carme . Do You
See Carme Browser Request From Other Systems? If So, Add A Capture Below; If Not, Explain Below!
![Page 40: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/40.jpg)
40
Co
Promiscuous Ethernet
Monitoring
![Page 41: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/41.jpg)
41
Promiscuous Monitoring Of Wireless Networks #1
![Page 42: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/42.jpg)
42
Promiscuous Monitoring Of Wireless Networks #2
![Page 43: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/43.jpg)
43
Questions #1
Explain : What Is The Difference Between Promiscuous And Non-Promiscuous Wireless Capture?________________________________________________ ________________________________________________ ________________________________________________ ________________________________________________ ________________________________________________ ________________________________________________
____ {T/F} Any Ethernet adapter can be used for promiscuous mode monitoring in a wired Ethernet network
____ {T/F} Any Wireless Ethernet adapter is equally good for strength, and other important statistics and indicators.
![Page 44: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/44.jpg)
44
Questions #2
____ {T/F} Standard drivers for wireless NICs support promiscuous mode ("RF Monitoring")
While the adapter can receive radio signals on a given frequency regardless of the destination MAC address in the packet, the packets that are not addressed to this adapter are _?_ by the driver, and there is no way to make the standard driver pass them to the network monitoring software.
_____ {T/F} A number of network monitoring software vendors make special RF monitoring drivers for all wireless adapters.
![Page 45: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/45.jpg)
45
Questions #3
In order to do promiscuous packet gathering, the user must obtained a supported wireless _?_, install the wireless monitoring program, replace the original driver by the special RF monitoring driver
List the Make, Model, and Vendor Of All Wireless Adapters Made Available To You By Dr. Hicks.__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
![Page 46: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/46.jpg)
46
Questions #4
The Real Question : [ "Is there a RF monitoring driver for my Wi-Fi card and operating system?"] Do An Internet Search For Each Of The Adapters Listed On The Previous Slide.
Adapter RF Monitoring Driver
_________________________________ _______ {Y/N}_________________________________ _______ {Y/N}_________________________________ _______ {Y/N}_________________________________ _______ {Y/N}_________________________________ _______ {Y/N}_________________________________ _______ {Y/N}_________________________________ _______ {Y/N}
![Page 47: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/47.jpg)
47
Questions #5
Software to do promiscuous packet gathering is called a W_?_ A_?_
Aside from the problems related to NIC drivers, wireless traffic is sometimes encrypted using WEP (an older standard) or WPA. A good WLAN Analyzer must be capable of _?_ encrypted network traffic on the fly utilizing a user-provided WEP or WPA-PSK key.
A WLAN analyzer may not be required if all you need to monitor is the traffic between the wireless stations and the Internet. Using a standard, non-wireless monitor on a M_?_ port would make it possible to capture the packets being sent and received through the access point. A network layout illustrating this method is shown below.
![Page 48: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/48.jpg)
48
Questions #6
Software to do promiscuous packet gathering is called a W_?_ A_?_
Aside from the problems related to NIC drivers, wireless traffic is sometimes encrypted using WEP (an older standard) or WPA. A good WLAN Analyzer must be capable of _?_ encrypted network traffic on the fly utilizing a user-provided WEP or WPA-PSK key.
A WLAN analyzer may not be required if all you need to monitor is the traffic between the wireless stations and the Internet. Using a standard, non-wireless monitor on a M_?_ port would make it possible to capture the packets being sent and received through the access point. A network layout illustrating this method is shown below.
![Page 49: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/49.jpg)
49
Co
Packet Monitoring Software
![Page 50: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/50.jpg)
50
Mirror Port Software
![Page 51: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/51.jpg)
51
Questions #7
"How can I see all of the subnet traffic using Network Monitor?". The most efficient way to do this is to attach your computer's ethernet connection directly to the "_?_" port on your switch.
On Cisco switches the mirroring port is called the _?_port and use a software program called a "Switched Port Analyzer".
____ {T/F} Almost all switches today come with one of these ports to allow system administrators to analyze network traffic using a packet sniffing product like Distinct Network Monitor.
![Page 52: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/52.jpg)
52
Questions #7
Why do you need to attach to the mirror port? Well, technically when a NIC driver is in promiscuous mode, it is able to see all of the traffic that is travelling on the wire it is attached to. However, that traffic may be in fact limited to its _?_ traffic and _?_ broadcast traffic in the case of a switched network.
As an administrator, the most efficient way for you to analyze traffic that is not visible from your computer is to capture it using the mirror or _?_port on your switch.
When this is not possible Distinct Network Monitor does offer one more option through its Agents. Using Agents you will be able to analyze traffic that is not visible from your computer.
![Page 53: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/53.jpg)
53
Co
Packet Monitoring Software
![Page 54: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/54.jpg)
54
Questions #8
Do an Internet Search - List at least half a dozen software products which enable packet monitoring on Windows systems. Include the Software Name and Price.
Software _____________________________ $_________URL____________________________________________
Software _____________________________ $_________URL____________________________________________
Software _____________________________ $_________URL____________________________________________
Software _____________________________ $_________URL____________________________________________
![Page 55: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/55.jpg)
55
Questions #9
Do an Internet Search - (cont)
Software _____________________________ $_________URL____________________________________________
Software _____________________________ $_________URL____________________________________________
Software _____________________________ $_________URL____________________________________________
Software _____________________________ $_________URL____________________________________________
![Page 56: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/56.jpg)
56
Questions #10
What Is Port Mirroring:_______________________________________________ _______________________________________________ _______________________________________________ _______________________________________________ _______________________________________________ _______________________________________________
![Page 57: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/57.jpg)
57
Port Mirroring On Inexpensive Linksys Switch?
![Page 58: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/58.jpg)
58
Co
Make Sure All Three Systems Are
Still Accessible via Remote Desktop
![Page 59: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/59.jpg)
59
Co
Extra Credit
![Page 60: Networking & Wireless Routers VIII Wireshark](https://reader036.vdocuments.net/reader036/viewer/2022062323/5681619f550346895dd15920/html5/thumbnails/60.jpg)
60
Extra CreditTransfer DataTransfer.txt From One Computer To Another Wirelessly. Use A Third Computer To Capture Packets In
Promiscuous Mode. Include Sufficient Screen Captures & Explanation To Duplicate Your Efforts (i.e. What Card, What Software, Where Download, How Do,
etc..