155k views
4 votes
Use the provided MS-Excel template to note entries for each .pcap file in Wireshark that are of interest, as well as your assessment of potential vulnerabilities. Such vulnerabilities might be due to plaintext data exchange between two machines, which might be exploitable by session hijacking, man-in-the-middle attacks, exploitation of commands/user accounts/passwords, or capture and replay of the data packets later to control devices or access remote connections.

User Robliv
by
4.9k points

1 Answer

5 votes

Answer:You should note entries for each PCAP file in Wireshark that are of interest as from ENCM 369 at ... file in Wireshark that are of interest, as well as your assessment of potential vulnerabilities. Such vulnerabilities might be due to plaintext data exchange between two machines, which might be exploitable by session hijacking, ...

Step-by-step explanation:

User Ankit Singh
by
5.4k points