0
0
Cybersecurityknowledge~10 mins

Network traffic analysis in Cybersecurity - Interactive Code Practice

Choose your learning style9 modes available
Practice - 5 Tasks
Answer the questions below
1fill in blank
easy

Complete the code to capture network packets using a common tool.

Cybersecurity
tcpdump -i [1]
Drag options to blanks, or click blank then click option'
A192.168.1.1
Bfile.txt
Ceth0
Dport 80
Attempts:
3 left
💡 Hint
Common Mistakes
Using a filename instead of an interface.
Using an IP address where interface name is required.
2fill in blank
medium

Complete the command to filter captured traffic by HTTP port.

Cybersecurity
tcpdump port [1]
Drag options to blanks, or click blank then click option'
A53
B22
C443
D80
Attempts:
3 left
💡 Hint
Common Mistakes
Choosing port 22 which is for SSH.
Choosing port 443 which is for HTTPS.
3fill in blank
hard

Fix the error in the command to save captured packets to a file.

Cybersecurity
tcpdump -w [1]
Drag options to blanks, or click blank then click option'
Acapture.pcap
Bcapture.txt
Ccapture.log
Dcapture.csv
Attempts:
3 left
💡 Hint
Common Mistakes
Using .txt or .log which are not valid capture formats.
Using .csv which is not suitable for packet data.
4fill in blank
hard

Fill both blanks to create a filter for TCP traffic from a specific IP.

Cybersecurity
tcpdump tcp and src [1] and dst port [2]
Drag options to blanks, or click blank then click option'
A192.168.0.10
B22
C80
Dudp
Attempts:
3 left
💡 Hint
Common Mistakes
Using UDP instead of TCP in the filter.
Mixing source IP and port numbers incorrectly.
5fill in blank
hard

Fill all three blanks to create a dictionary comprehension that maps IPs to packet sizes for packets larger than 100 bytes.

Cybersecurity
packet_counts = [1]: [2] for [3] in packets if len([3].data) > 100
Drag options to blanks, or click blank then click option'
Apkt.src_ip
Bpkt.size
Cpkt
Dpkt.dest_ip
Attempts:
3 left
💡 Hint
Common Mistakes
Using destination IP instead of source IP as key.
Using wrong variable names causing errors.