0% found this document useful (0 votes)
15 views

Practical Exercise: Cyber Security

practice how to use wireshark

Uploaded by

MUHAMMAD AIMAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Practical Exercise: Cyber Security

practice how to use wireshark

Uploaded by

MUHAMMAD AIMAN
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

SESSION : SESI 1 2022/2023

DEPARTMENT : JTMK
ASSESSMENT : PRACTICAL EXERCISE 2

CODE COURSE: DFP40263

COURSE NAME: SECURE MOBILE COMPUTING

PROGRAMME : DDT SEMESTER 4

DATE : TIME :

INSTRUCTION TO CANDIDATES:
This assessment consist of:

Lab Instructions

Answer all the questions given.

NAME NO MATRIX
MUHAMAD HAIKAL BIN MOHD REZA @ MOHD RIZAL 19DDT20F2004
MUHAMMAD AIMAN BIN ZAMRI 19DDT20F2017

PROGRAMME : DDT

LECTURER : PUAN FATIMAH ZAHRA BT W. RAZALI

This paper contains 3 printed pages (including the front page)

Prepared by: Verified by:

(Lecturer) (Head of Department/Head of Programme/


Course Coordinator)

Date: Date:
14 Sept 2022
DEPARTMENT OF INFORMATION & COMMUNICATION TECHNOLOGY
PRACTICAL EXERCISE 2 | SESSION 12 2022/2023
2021/2022 100

COURSE CODE : DFP40263 COURSE NAME : SECURE MOBILE COMPUTING


NAME & REGISTRATION NO :

1. MUHAMAD HAIKAL BIN MOHD REZA @ MOHD RIZAL (19DDT20F2004)

2. MUHAMMAD AIMAN BIN ZAMRI (19DDT20F2017)

CLO 1: Manipulate the aspect of mobile computing, model and security principles using mobile
computing technology to develop applications. (P3, PLO3)
CLASS : DURATION : 2 hours

WiFi traffic sniffing is a method of adapting and optimizing transmit performance of a


telecommunication network by analyzing, predicting and regulating the behavior of data that transmitted over
that network. The methods are applied to all types of network including cellular telephone networks and
Internet. The main ideas behind WiFi traffic sniffing are good user performance and efficient use of network
resources by finding an optimized routing path based on existing or adapted configuration. The familiar mobile
packet sniffing tools is Wireshark. It is a typical network analysis tool designed to capture packets in the real
time. The current wireshark Android version can provide the mobile network diagnosis includes filters, color-
coding and other network traffic and packet inspection functions. It works on root device.

Exercice:
In groups of 2 members download, install and configure tools to sniff wireless traffic packet using
Wireshark application. (Reference: https://www.guru99.com/wireshark-passwords-sniffer.html). Use the
appropriate platform to discuss with your group members. Demonstrate the outcome to your lecturer at the
end of the class and submit the report in CIDOS.

Format Practical Exercise report:


P1. Introduction: Describe the logical and physical architectures of wireless network.
P2. Installation: State and explain step by step the installation sniffing tool of Wireshark.
P3. Steps: Construct step by step the process how you capture the packet information using Wireshark.
P4. Outcome: Display snipet where the password and username data through the sniffing process.

2
P1. introduction

For this practical exercise we use the wireless network, the access point is smartphone and we use lap

P2. Installation: State and explain step by step the installation sniffing tool of Wireshark

Step 1: Go to google and type wireshark pc download

Step 2 : click webpage download wireshark


Step 3 : In Stable Release click Windows Installer(64-bit)

Step 4 : After finish the download process, click open. Refer the picture below
Step 5 : Click yes to allow the installation of wireshark

Step 6 : Click next


Step 7 : Click Noted

Step 8 : Click next


Step 9 : click next refer to picture below

Step 10: Refer in the picture below which one to tick and after that click next
Step 11 : Click next

Step 12 : Click next


Step 13 : Click Install

Step 14 : waiting for loading to complete


Step 15 : click I agree

Step 16 : Click Install


Step 17 : waiting for loading to complete

Step 18 : Click Next


Step 19 : Click finish

Step 20 : There is popup about installation complete and then click next
Step 21 : Click finish

Step 22 : After the completed of installation there is popup to reboot the PC. Click finish to reboot. After that
wireshark application has been install.
P3: Step to capture the packet information using Wireshark.

Step 1: Open Wireshark and select the type of network that currently connected with your device. For example,
the type of network our device use is Wi-Fi.

The type of network that


your device connected
with.

Double click on type of network you connected with and it will show the interface of the Wireshark as shown
below.
Step 2: open your web browser and search for website that use HTTP protocol. For example, here, we use
www.techpanda.org .Login to the website by inserting username and password.

Insert password
and username at
the blank fill here

Click “submit”
button to proceed
to login.

Step 3: Back to your Wireshark application and click on stop button to stop capturing packet as shown below .

Here is the stop


capturing button

After you click the stop button, the button will grey out and Wireshark will stop capturing the packets as shown
below.
Then Wireshark will filter out and display the packet that use Hypertext Transfer Protocols (HTTP) only.
Click or double click to view
the plaintext
RUBRIC PRACTICAL EXERCISE 2
SECURE MOBILE COMPUTING DFP50123
PLO3/CLS3a : Practical Skills

PERFORMANCE LEVEL Weightage


Criteria (%) Standard Score
Excellent Good Moderate Poor
4 3 2 1
PRACTICAL SKILLS

1. Introduction Able to identify the Able to identify some Able to identify some of Unable to identify
20 /4*20
requirements with very of the requirements the requirements with the requirement or
clear descriptions with a clear descriptions but need with poor
description improvement descriptions
2. Installation Able to explain the Able to explain the Able to explain the Unable to explain the
installation steps using installation steps using installation steps using installation steps using 20 /4*20
appropriate tools and appropriate tools and appropriate tools and appropriate tools or
explain very well explain quite well explain but need without explanation
improvement
3. capturing process Able to construct Able to construct Able to construct Unable to construct
of packet password and username password and password and username password and 20 /4*20
information capturing process very username capturing capturing process with username capturing
clear with appropriate process clearly with some appropriate labels process or without
labels some appropriate but need improvement labels
labels
4. Outcome Able to display Able to display Able to display Unable to display
20 /4*20
appropriately very clear appropriately clear appropriately clear the outcome
outcome outcome outcome but need
improvement
5. Punctuality Able to demonstrate the Able to demonstrate the Able to demonstrate the Unable to
outcome in the given outcome in the given outcome in the given time but demonstrate the
time appropriately very time appropriately well need improvement outcome in the 20 /4*20
well given time

Total Score
100

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy