Share
Explore

Cisco networking Day 2 Activity

For this activity, store your results into a Word Document.
Save as Student Name Student ID.docx

At the End, upload to:

Here's a simplified 10-part lab guide for students to use Wireshark and Nmap for TCP network analysis. This guide assumes that the students have basic knowledge of networking concepts and are familiar with using their operating system's command line interface.
### Lab Guide: TCP Network Analysis using Wireshark and Nmap
#### Objective: To analyze TCP network connections between your computer and another computer on the lab network using Wireshark and Nmap.
#### Requirements: - A computer with Wireshark and Nmap installed. - IP addresses of the student's computer and another computer in the lab network.
#### Part 1: Introduction to Tools 1. **Activity**: Open Wireshark and Nmap on your computer. Familiarize yourself with the basic layout and features of both tools.
#### Part 2: Basic Network Scanning 2. **Activity**: Use Nmap to scan the other computer's IP address. Command: `nmap [target-IP]`. Document the open ports and services found.
#### Part 3: Capture TCP Packets 3. **Activity**: Start a Wireshark capture on your network interface. Filter the capture with `tcp` to view only TCP packets.
#### Part 4: Establishing a Connection 4. **Activity**: Initiate a TCP connection to the other computer (e.g., using a web browser or SSH). Capture this activity in Wireshark.
#### Part 5: Analyzing TCP Handshake 5. **Activity**: Identify and document the TCP three-way handshake in the Wireshark capture (SYN, SYN-ACK, ACK packets).
#### Part 6: Data Transfer Analysis 6. **Activity**: Perform a data transfer (like file download/upload) with the other computer. Capture and document the sequence of TCP packets in Wireshark.
#### Part 7: Identifying Flags and Options 7. **Activity**: In the Wireshark capture, identify different TCP flags (SYN, ACK, FIN, RST) and options used during the connection.
#### Part 8: Nmap Advanced Scanning 8. **Activity**: Use Nmap to perform a more detailed scan (e.g., `nmap -sV -p- [target-IP]`). Document the detailed results including service versions.
#### Part 9: Disconnection Process 9. **Activity**: Close the connection with the other computer. Capture the TCP termination sequence (FIN, ACK packets) in Wireshark.
#### Part 10: Report Preparation 10. **Activity**: Compile your findings, screenshots, and analysis into a Word Document. Structure the report to cover each part of this lab guide.
### Submission: Submit the Word Document with detailed documentation of each activity, including the command used, observations, and screenshots.
### Safety and Ethical Considerations: - Do not scan or connect to any computer or network without explicit permission. - Respect privacy and data protection regulations. - Use the tools and knowledge gained from this lab for educational purposes only.
This guide provides a structured approach for students to explore and understand TCP network connections using practical tools. It emphasizes hands-on learning and documentation, key aspects of network analysis.
Want to print your doc?
This is not the way.
Try clicking the ⋯ next to your doc name or using a keyboard shortcut (
CtrlP
) instead.