- Download and install Wireshark
- Download the sample.cap.zip file
- Unzip the capture file.
- Load it into Wireshark.
- Answer the following questions:
- Make a list of all the protocols in that capture.
- Briefly explain what all the protocols do (approximately one paragraph per protocol). Please do not copy and paste from Wikipedia or some other source. Instead, write in your own words.
- What is the source MAC address of the computer making a RIPv1 request at IP address 10.0.0.2?
- What’s happening with capture # 67? Explain.
- Are there any FTP or Telnet sessions? Why are FTP and Telnet considered insecure protocols?
- Are there any SSH sessions? How does Telnet relate to SSH? Tell us why SSH v2 is better?