1. The following questions relate to the capture file smtp.pcap:
a. From the time the DNS query is sent, how long does this entire SMTP transaction require?
b. What is the IP address of the sender?
c. What is the IP address of the SMTP server?
d. What is the email recipient’s email address?
e. The SMTP server requires the sender to authenticate. Are the sender’s credentials visible in the capture traffic? If so, what are the username and password? If not, what do you conclude about the email software used in this transaction?
f. What email client software (name and version) is the sender using?
g. What is the subject line of the email message?
h. Was the message sent successfully? How do you know?
i. How and when did the SMTP session end?
2. The following questions relate to the capture file http.pcap:
a. Which version of the HTTP protocol is used in these transactions?
b. What is the domain name of the Web server?
c. What browser and version does the client use in this capture?
d. What software and version is running on the Web server?
e. Does the client request that the session be kept alive? If so, explain the server’s response.
f. What other HTTP headers are included in the client’s initial request?
g. What other documents/files did the client request during this transaction?
h. Which side (client or server) initiated the session closure?
i. As we discussed in class, Web servers are under no obligation to support keepalive requests. Does the server honor any keepalive requests made at the beginning of this HTTP connection? Explain.
3. The following questions relate to the capture file ftp.pcap:
a. How long does this FTP transaction last?
b. What is the domain name of the server?
c. How many separate sessions are included in this capture? List the socket information for each session.
d. What credentials did the client supply to log into the server?
e. What system type does the server report?
f. List and briefly describe the features available on this server.
g. In frame 60 the client asks for a listing of the present working directory (PWD).
How large (in bytes) was the listing?
h. Does the client download any files? If yes, list them by name.
These solutions may offer step-by-step problem-solving explanations or good writing examples that include modern styles of formatting and construction of bibliographies out of text citations and references. Students may use these solutions for personal skill-building and practice. Unethical use is strictly forbidden.
By purchasing this solution you'll be able to access the following files: