0% found this document useful (0 votes)
8 views5 pages

Presentation 1

The document outlines various cybersecurity tasks including capturing HTTP traffic with Wireshark, applying filters for TCP packets, conducting brute force attacks using Burp Suite, experimenting with image formats in steganography, and using HTTrack for offline browsing. It also covers performing port scans with Nmap to identify open ports and analyzing DNS traffic. Additionally, it discusses the challenges of downloading authenticated pages with HTTrack and troubleshooting log files for errors.

Uploaded by

Mafnitha KK
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
8 views5 pages

Presentation 1

The document outlines various cybersecurity tasks including capturing HTTP traffic with Wireshark, applying filters for TCP packets, conducting brute force attacks using Burp Suite, experimenting with image formats in steganography, and using HTTrack for offline browsing. It also covers performing port scans with Nmap to identify open ports and analyzing DNS traffic. Additionally, it discusses the challenges of downloading authenticated pages with HTTrack and troubleshooting log files for errors.

Uploaded by

Mafnitha KK
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 5

1a)Set up a basic filter in Wireshark to capture only HTTP traffic.

Analyze the captured data to identify


any unencrypted information being transmitted.
(b) Apply filter would you use to display only TCP packets on port 80.

2.Apply brute force attack on a website using burpsuite, and infer the results.
1.Experiment with different image formats (JPEG, PNG,
BMP) and observe how Xiao steganography behaves with
each format. Document any variations in effectiveness.

2.Create a local copy of a website for offline browsing


using HTTrack. Analyze the log files generated by HTTrack
after a download. Identify any error messages or warnings
and troubleshoot the issues encountered during the
process.
1.Use Nmap to perform a basic port scan on a target IP address.
Identify open ports and their associated services. What can you infer
about the target's services based on the results

2. Apply brute force attack on a website using burpsuite, and infer the
results.
1 a)Use Wireshark to capture DNS traffic and analyze how DNS
resolution works.
• (b) Apply filter to exclude traffic from a specific IP address in
Wireshark .

2Use HTTrack to download a website that requires login credentials.


Demonstrate how to provide the login information to HTTrack and
explain the challenges of downloading authenticated pages

You might also like