Assignment #2 DF
Assignment #2 DF
When viewing network logs, port information can give you clues to investigate. For example,
you might notice that a particular IP address is coming in frequently on an unusual port. A
receiving port above 1024, for example, should also raise a flag. You can check the Internet
Assigned Numbers Authority Web site (www.iana.org/assignments/port-numbers) for a list
of assigned port numbers
Using a network analysis tool such as Wireshark, you could generate a list of the top 10
Web sites users in your network are Visiting, you could also generate a list of the top 10
internal users. These network logs can show you patterns, such as an employee
transmitting data to or from a particular IP address frequently. Further investigation of the
IP address could show that this employee is accessing an online shopping site during
company time, for example. Using Wireshark program or any other network investigation
tool to answer the following questions.
Questions
While a fugitive in Mexico, Mr. X remotely infiltrates the Arctic Nuclear Fusion Research
Facility’s (ANFRF) lab subnet over the Interwebs. Virtually inside the facility (pivoting
through a compromised system), he conducts some noisy network reconnaissance. Sadly,
Mr. X is not yet very stealthy.
Unfortunately for Mr. X, the lab’s network is instrumented to capture all traffic (with full
content). The packet capture (EvidenceMrX.pcap) contains Mr. X’s activity. As the network
forensic investigator, your mission is to answer the following questions:
Deliverables:
• You are required to answer ALL the questions stated above and submit a report describing
the steps you took to solve the case.
• You can work in a group of maximum THREE (3) students.
• Upload a soft copy of your assignment report to the e-learning.
• Report cover page must include necessary details such as ID and name.