* The images will be attached to used in the paper.
The purpose of this WireShark Packet Capture lab report is to deep dive into the network packet analysis to track each packet on the network. Capturing
network packets in real-time, you will learn the real-time data communication from a source IP to a destination IP with each data packet communication
between these two nodes. Further, you will analyze the protocols being used in each data packet being transmitted between these communicating nodes.
The WireShark protocol analyzer further explores the packet header, IP header perimeters, and the dataframes to analyze the data communication between a
source to a destination. You can also examine the possibility of cyberattacks in packet captures being conducted by an adversary in a man-in-the-middle
(MITM) attack. SYN flood, and IP spoofing session hijacks are some of the cyberattacks that can be investigated by using the WireShark protocol analyzer.
You will capture the data packets in real-time and examine captured data packets for analysis.For this lab activity, you will capture network packets on your
home computer/network and analyze the captured packets. The WireShark computer/network protocol data packet capture report will include the captured
packet analysis and explanation of each packet communication, illustrating data communication between two IP addresses. Please do not scan any
This paper will be 3 pages not including cover or reference pages. should be a deliverable packet capture protocol analyzer report to your client who will learn
about their computer/network data communication to prepare for any potential attacks. While you are free to create a WireShark protocol analyzer report to
best present your findings to your clients, you will, at a minimum, include the following sections.
WireShark Protocol Scan Findings/Results
WireShark Protocol Scan Procedures conducted to capture the results
Protocol Capture Analysis on your findings
A list of lessons learned from WireShark Protocol scans
A list of recommendations to mitigate any potential vulnerabilities
A list of references for in-text citations