[phpBB Debug] PHP Warning: in file [ROOT]/ext/lmdi/autolinks/event/listener.php on line 237: Undefined array key 93
[phpBB Debug] PHP Warning: in file [ROOT]/ext/lmdi/autolinks/event/listener.php on line 237: Trying to access array offset on value of type null
Answer Happy • Look for the TLSv1.2 traffic. You can click on the Protocol column heading to sort the packets by Protocol. You should b
Page 1 of 1

Look for the TLSv1.2 traffic. You can click on the Protocol column heading to sort the packets by Protocol. You should b

Posted: Sun Jul 10, 2022 11:26 am
by answerhappygod
Look For The Tlsv1 2 Traffic You Can Click On The Protocol Column Heading To Sort The Packets By Protocol You Should B 1
Look For The Tlsv1 2 Traffic You Can Click On The Protocol Column Heading To Sort The Packets By Protocol You Should B 1 (10.56 KiB) Viewed 69 times
Look For The Tlsv1 2 Traffic You Can Click On The Protocol Column Heading To Sort The Packets By Protocol You Should B 2
Look For The Tlsv1 2 Traffic You Can Click On The Protocol Column Heading To Sort The Packets By Protocol You Should B 2 (17.58 KiB) Viewed 69 times
Look For The Tlsv1 2 Traffic You Can Click On The Protocol Column Heading To Sort The Packets By Protocol You Should B 3
Look For The Tlsv1 2 Traffic You Can Click On The Protocol Column Heading To Sort The Packets By Protocol You Should B 3 (18.45 KiB) Viewed 69 times
Look For The Tlsv1 2 Traffic You Can Click On The Protocol Column Heading To Sort The Packets By Protocol You Should B 4
Look For The Tlsv1 2 Traffic You Can Click On The Protocol Column Heading To Sort The Packets By Protocol You Should B 4 (29.94 KiB) Viewed 69 times
Look For The Tlsv1 2 Traffic You Can Click On The Protocol Column Heading To Sort The Packets By Protocol You Should B 5
Look For The Tlsv1 2 Traffic You Can Click On The Protocol Column Heading To Sort The Packets By Protocol You Should B 5 (31.27 KiB) Viewed 69 times
Look for the TLSv1.2 traffic. You can click on the Protocol column heading to sort the packets by Protocol. You should be able to find: • Client Hello-packet 26 • Server Hello (reply)-packet 29 • First Key exchange in packets 36 and 39 Bam 2 (10 points) What is my IP address? 192.168.1.154 Bem 3 (10 points) What Class is it? nem 4 (10 points) Is it a Private or Public IP address? om 5 (15 points) What company was I communicating with? (Hint - Google something like "whois xxx' replacing the xxx with the IP address)
Frame 26: 571 bytes on wire (4368 bits), 571 bytes captured (4568 bits) on Interface DevicePF (7F5C3C1E-4588-4CCB-8760-CSCC0978920), 140 Ethernet II, Sec: Intelor 39:64:96 (34:ead 99:6f:96), Dst: Verizon 09:04:88 (48:56:36:09 088) Internet Protocol Version 4, Sec: 192.168.1.154, Ost: 54.299.19.77 Transmission Control Protocol, Sec Port: 60778, Ost Port: 443, Seq: 1, Ack: 1, Len: 517 Source Fort: 60778 Incomplete, DATA (15))) [Next Sequence Number: 318 (relative sequence number)] Acknowledgment Number: 1 (relative act number) -32568 (PSH, ACK) Mindow 17520 window size: 17520) CODE(no window scaling vsed)] (Checksum Status: Unverified] Urgent Pointer: [Timestamps] [SEQ/ACK analysis] TCP payload (517 bytes) Transport Layer Security
Modde 11 Degre Cree-por Frame 29: 1514 bytes on wire (12112 bits), 1514 bytes captured (12112 bits) on interface DevicePF (FSCXCIE-A500-4CCB-8760-C5C97A892D), id e Ethernet II, Sec: Verizon 09:04:88 (48:56:36:09:0f88), Ost: IntelCor 39:64:96 (34:46:ad:99:696) Internet Protocol Version 4, Src: 54,209.19.77, Dit: 192.168.1.154 Transmission Control Protocol, Sec Port: 44), Ost Port: 68779, Seg: 1. Ack: 518, Len: 1400 Source Port:443 Destination Port: 60778 www [Stream index: 13 P [Conversation completeness: Incomplete, DATA (15)) [TCP CP Segment Len: 1460) Sequence Number: 1 Sequence Number (ra) (Next Sepurnce master Acknowledgment Number: 513 (relative sequence number) 1335852568 0101 www Flags: Window: 27872 Acknowledgment number() 2929948314 Header Length: 20 bytes (5) 10 (ACK) (relative sequence number) (relative ack number) [calculated window size: 27872) [window size scaling factor-2 (no window scaling used)) Checksum exc60 (unverified) (Checksun Status: Overified] Pinter: 0 [timestamps) TACK analysis (SEQ/ACK a TCP payload (1460 bytes) TCP segment data (1390 bytes) Transport Layer Security a a
Weshark Packet 36 Module 11 Diagram One 15pcang Frame 36: 154 bytes on wire (1232 bits), 154 bytes captured (1232 bits) on interface \Device\NPF_(7F5C3C1E-A508-4CCB-8760-CSCC097A892D), id e > Ethernet 11, Sec: Verizon 09:0f:88 (48:54:36:09:0f:88), Dst: Intelcor_59:6f:96 (34:e6:ad:59:6f:96) Internet Protocol Version 4, 5rc: 54.209.19.77, Dst: 192.168.1.154 Transmission Control Protocol, Sec Port: 443, Ost Port: 60778, Seq: 5557, Ack: 518, Len: 100 Source Port: 443 Destination Port: 69778 [Stream index: 11 [Conversation completeness: Incomplete, DATA (15)1 [TCP Segment Len: 100] Sequence Number: 5557 Sequence Number (raw): 1335458124 [Next Sequence Number: 5657 Acknowledgment Number: 518 Acknowledgment number (ra): 2929948314 0101 Header Length: 20 bytes (5) > Flags: 0x018 (PSH, ACK) Window: 27872 > [Timestamps] > [SEQ/ACK analysis] TCP payload (100 bytes) (relative sequence number) [Calculated window size: 27872] Window size scaling factor: -2 (no window scaling used)] Checksum: 0x5931 [unverified] [Checksun Status: Unverified] Urgent Pointer: 0 (relative sequence number)] (relative ack number) > Transport Layer Security > Transport Layer Security TCP seprent data (91 bytes) [2 Reassembled TCP Segrents (338 bytes): #34(247), #36(91)] Frame (154 bytes) Resembled TOP 338 bytes) Close Help x
Frame 39: 189 bytes on wire (1440 bits), 180 bytes captured (1440 bits) on Interface \DeviceUPF (7F5C3C1E AS08-4CCB-8760-C3CC0978920), 140 Ethernet II, Sec: Intelor 39:64:96 (34:e6:ad:59:6f:96), Dst: Verizon 09:04 88 (48:56:36:09 088) Internet Protocol Version 4, Sec 192.168.1.154, Ost: 54.209.19.77 Transmission Control Protocol, Sec Port: 60778, Ost Port: 443, Seq: 518, Ack: 5657, Len: 126 Source Port: 60778 Destination Port: 445 (Stream Ind (conversation completeness: Incomplete, DATA (15) DNB t Len Sequence mber (raw): 2929948314 t [Next Sequence M Mumber: 646 (relative sequence number)] 5657 (relative ack number) som 0000 0000 0010 44 04 se af $18 (relative sequence number) Flags: Mindow 17430 (ra): 1335458226 Header Length: 20 bytes (5) [Calculated window si 17420) (Window size scaling factor 2 (ne window scaling used)] Checksum ex5947 [unverified] [Checksun Status: Unverified] Urgent Pointer: [Timestamps) [SEQ/ACK analysis) TCP payload (126 bytes) >Transport Layer Security 199 Chudy 18 ACK) 5d 36 09 of 88 34 6 15 48 0 59 47 00 00 35 33 7 00 36 41 18 4241 4 bc 26 48 35 HJB 4 Yo E **) 6 -#-5. VOX P D.VG SA 3) d Hb E&SA q e [kje. X- Gol XỨNG ĐỂ H Close D 4:10 PM 7/9/2022