Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Computer Science Assignment help needed

Help required for the attached assignment.

In this project, students will get familiar with reading packet captures (PCAP) and some standard
man-in-the-middle techniques. This is where a malicious user puts themselves in the middle of a
conversation with another user and an application and eavesdrops on all the tra ic. Students will
familiarize themselves with Layer 2 – 7 network tra ic and how to analyze network tra ic using
Wireshark, a network protocol analyzer, and its libraries such as pyShark.

The assignment documentation and instructions are at the following link
to an
external site.

Part 1 PCAP is available at:
1.amazonaws.com/MITM/mitm_2025.pcapLinks to an external site.

Part 2 Programming Assignment is available
at: to an external site.

MITM/PCAP

Learning Goals of this Project:

Students will get familiar with packet capture (PCAP) reading and some common man in the middle
techniques. This is where a malicious user puts themselves in the middle of the conversation with
another user or application and eavesdrops on all the tra ic. Some papers which demonstrate this
concept are the following:

 Man-In-The-Middle Attack in Wireless and Computer Networking- A review

 Detection of man-in-the-middle attacks using physical layer wireless security techniques

 On the Feasibility of Large-Scale Infections of iOS Devices

Students will familiarize themselves with Layer 2 – 7 network tra ic and how to analyze network
tra ic using Wireshark, a network protocol analyzer, and its libraries such as pyShark.

 For more details about Wireshark you can visit

 For details about pyShark and tshark you can visit

Students will also familiarize themselves with application layer protocols such as HTTP and IRC.

 If you are not familiar with HTTP, we strongly recommend you learn about the protocol,
methods, and requests. You can find a good introduction at Mozilla’s developer
page and Sam Barros’ Medium page

 IRC was a very common protocol in the early 2000s. For its simplicity and e iciency it’s still
in use on multiple settings. Several Botnets use it for Command and Control (C&C) and

hacking groups still rely on IRC to exchange information. You can read more and get familiar
by reading this Medium article.

Finally, this is a graduate course. So it is expected that students will research and understand how
these network protocols work by reviewing their RFCs:

 RFC1459 (Internet Relay Chat Protocol):

 RFC2616 (Hypertext Transfer Protocol):

The final deliverables:

There are two deliverables for this project, each is under their own Gradescope assignment named
Man in the Middle – PCAP Analysis and Man in the Middle – Programming Assignment.

Man in the Middle – PCAP Analysis template A single JSON file named project_mitm.json. A
template can be found below. Please See Submission Details for more information. This
submission consists of Flag 1 to Flag 5.

Man in the Middle – Programming Assignment The modified pcapanalysis.py file with the three
new functions described under this submission consists of Flag 6 only. Please See Submission
Details for more information.

Important Reference Material:

 Youtube Video from our TA Renan showing how to install dependencies for Flag 6 and a
short example

 O icial Wireshark Guide

 Read the RFCs provided.

 If you have no experience with networking or application layer protocols, we STRONGLY
encourage you to research those topics. There are many great resources online like Google
and YouTube.

Submission:

Gradescope (autograded). Please See Submission Details for more information.

Requirements

Wireshark

Python3 – Download Python

 Pyshark Library –

 TShark –

Ensure you have nslookup installed on your OS (DNSUtils) (it should come default on any Windows,
MacOS or Linux environment)

Packet Capture – Part 1:

The packet capture can be downloaded at: canvas

Programming Assignment – Part 2:

The programming assignment .zip including pcapanalysis.py and the corresponding pcap can be
downloaded on canvas

Hint: You can watch the Youtube Video from our IA Renan showing how to install dependencies for
Flag 6

File submission instructions:

These are the instructions for how the Attorney General needs you to submit your findings.

File submission instructions:

This project needs to be submitted via Gradescope. Navigate to the course in Canvas and click
‘Gradescope’. On the Gradescope website, click ‘Project MITM and submit there. For this project
there is a limit of 10 submissions for both sections. Section 1 contains Flags 1-5 and Section 2
is the Programming Assignment which contains Flag 6.

Man in the Middle – WireShark Assignment – Max of 85 points

There is a limit of 10 submissions for this assignment.

Name your submission file: project_mitm.json. In addition, ensure you replace the placeholders
with the flags you retrieve from each relevant task.

Note: You can use Notepad++/TextEdit or Vim to create and edit this file. IMPORTANT: Do not use
LibreO ice, Word, or any similar document editor. Your submission must be in proper JSON format
with no special characters in order to pass the autograder; these document editors are likely to
introduce special characters that will make your submission fail the autograder.

Here is an example of the provided JSON file:

{

“task1.1”: “<copy flag 1 here>”,

“task1.2”: “<copy flag 2 here>”,

“task1.3”: “<copy flag 3 here>”,

“task1.4”: “<copy flag 4 here>”,

“task1.5”: “<copy flag 5 here>”,

“task2.1”: “<copy flag 6 here>”,

“task2.2”: “<copy flag 7 here>”,

“task2.3”: “<copy flag 8 here>”,

“task2.4”: “<copy flag 9 here>”,

“task3.1”: “<copy flag 10 here>”,

“task3.2”: “<copy flag 11 here>”,

“task3.3”: “<copy flag 12 here>”,

“task3.4”: “<copy flag 13 here>”,

“task4.1”: “<copy flag 14 here>”,

“task4.2”: “<copy flag 15 here>”,

“task4.3”: “<copy flag 16 here>”,

“task4.4”: “<copy flag 17 here>”,

“task4.5”: “<copy flag 18 here>”,

“task4.6”: “<copy flag 19 here>”,

“task5.1”: “<copy flag 20 here>”,

“task5.2”: “<copy flag 21 here>”,

“task5.3”: “<copy flag 22 here>”

}

And here is an example of how your submitted file should look: (Note: this is an example; none of
these values are correct.)

An example of what the submitted file content should look like:

{

“task1.1”: “something.something.something”,

“task1.2”: “BigBird,CookieMonster,OscarTheGrouch”,

“task1.3”: “#WOW”,

“task1.4”: “a12342342bcde393202013434”,

“task1.5”: “Atlantis”,

“task2.1”: “maliciousactor”,

“task2.2”: “somefile.extension”,

“task2.3”: “something”,

“task2.4”: “a123242342342342342934234”,

“task3.1”: “something.something”,

“task3.2”: “192.168.1.10”,

“task3.3”: “ns-something-something.something.something”,

“task3.4”: “abcdef1234567890953453434”,

“task4.1”: “192.168.8.7”,

“task4.2”: “something”,

“task4.3”: “something”,

“task4.4”: “something”,

“task4.5”: “something”,

“task4.6”: “12123123129413249121249aa”,

“task5.1”: “tr95843fkdspugr8euyre0gfd”,

“task5.2”: “something”,

“task5.3”: “58437594ejgfdiohr8e054309”

}

Man in the Middle – Programming Assignment – Max of 15 points

There is a limit of 10 submissions for this assignment.

To submit, name your submission file: pcapanalysis.py and wait for the code to execute. There are
only three tests. Your grade will be displayed within a few seconds or minutes depending on how
many submissions are being evaluated at the time

Submission Reminder

If you go over the submission limit you are responsible to activate the submission you want to
be graded. The TA’s will not do this for you.

Canvas will show no grades until we export them from gradescope to canvas. This will only be done
once all extensions are finalized.

Background and Setup

The Necrocryptors (TNC) is a hacking group known for multiple data leaks and has been active at
underground forums selling personally-identifiable information (PII) and credit card data stolen
from vulnerable websites.

Recently, TNC led a DDoS campaign against multiple targets in the United States, leading to a
Federal Investigation by the National Cyber Investigative Joint Task Force (NCIJTF). This
investigation was coordinated by the FBI Cyber Crime division and after months of undercover
investigation, NCIJTF was able to capture unencrypted communication between members of TNC.

While NCIJTF did not disclose how this communication was captured, we can infer that either it
came from an insider member of the organization or a sophisticated attack led by NCIJTF allowed
this communication to be captured.

In this project, you are playing the role of Mark, an FBI agent from the Cyber Crime division.

You walk into the o ice, just back from a nice vacation in the Bahamas, and pour some co ee from
the shared pot near your cubicle when you hear, “Mark! Great to see you are back! Come over to my
desk right now, we need to talk.” It’s your boss, Bill. You think to yourself, Geez! I just came back.
This guy doesn’t give me a break.

You take your co ee to Bill’s o ice, close the door and listen as Bill starts.

“Mark, I have a task for you. We finally got our hands on some incriminating evidence against TNC.
With this pile of evidence, the Attorney General is on my neck to bring those guys to justice. But we
need some strong evidence of criminal activity that can’t be disputed in court.”

“Okay…” My wife told me to take some extra days o , but no. I had to come back today…

“I’m sending the packet your way,” Bill says, “You have one week to analyze the data and find clear
evidence of criminal activity. The Attorney General sent us a list of things they are looking for. It’s all
on your desk.”

“Sounds good, boss. It’s great to be back.”

You leave his desk, take a sip of co ee and go back to your computer. No time to slowly get up to
speed, you think, but that’s OK. I’m excited to help take TNC down.

Flag 1 (5 points)

Your first task is to figure out where the hackers are spending their time and gather some evidence
for the Attorney General. This will also give you a good overview of Wireshark filters.

The Attorney General needs some evidence of The Necrocryptors’ associates and where the group
meets.
For this, you need to gather the following information:

Task 1.1

 Based on the provided packet capture (pcap) file, identify the server address used by the
hackers to communicate.

o Example: irc.someplace.net

o Points: 1

Task 1.2

 Based on the provided packet capture (pcap) file, identify the nicknames of the malicious
actors involved in the conversation. List the nicknames in the order they appear in the
conversation following the format below:

o Example: firstactor,secondactor,thirdactor

o Points: 1

Task 1.3

 Based on the provided packet capture (pcap) file, identify the channel the malicious actors
use to communicate. Remember, channel names always start with #, so include # in your
answer.

o Example: #WOW

o Points: 1

Task 1.4

 Based on the provided packet capture (pcap) file, identify the hash used by the malicious
actor to validate its identity.

o Example: a12342342bcde393202013434

o Points: 1

Task 1.5

 Based on the pcap file provided, analyze the network tra ic to determine the potential origin
country of the last identified malicious actor. Consider the IP addresses, any geolocation
data. Provide the name of the country

o Example: Atlantis

o Points: 1

Flag 2 (27 points)

Your second task will require you to recover a payload from the conversation. There are multiple
ways to do this. You can use Wireshark, pyShark or any other library available.

As part of the evidence gathering, the Attorney General needs concrete evidence of malicious
intent. For Task 2, you will need to review the conversation between members of TNC and gather
incriminating data from this conversation.

Task 2.1

 Based on the provided pcap file, identify which malicious actor initiated a private chat
during the conversation.

o Example:maliciousactor

o Points: 2

Task 2.2

 Based on the provided pcap file, identify the name of the file transferred by one hacker to
another via IRC DCC. (Including extension)

o Example:somefile.extension

o Points: 5

Task 2.3

 Based on the provided pcap file, determine the encryption method or algorithm used to
encrypt the file transferred between the hackers. (Just the 3-letter name)

o Example:something

o Points: 4

Task 2.4

 If you decrypt and run the file, you’ll get a unique hash based on your ID (I will provide).
What is the hash generated?

o Example:a123242342342342342934234

o Points: 16

Flag 3 (21 points)

The Attorney General lets you know that they think there is a web server in here that is phishy and is
spitting out long numbers and letters. The Necrocryptors hacking group is known to play tricks with
these values. The Attorney General needs the following information to track the folks operating the
website:

Task 3.1

 The site domain name (Record just the site’s domain name and the top-level-domain (TLD)
name, with the period. E.G: something.hostname.tld)

o Example: something.something.something

o Points: 2

Task 3.2

 What is the public IP address?

o Example: 192.168.1.10

o Points: 2

Task 3.3

 The primary nameserver for this domain (You may need to look outside the pcap for this
information. Think about tools that will give you the nameserver data for a specific domain)

o Example: ns-something-something.something.something

o Points: 6

Task 3.4

 The hash provided by entering your ID in the field (i.e. 9021042) (NOTE: The website is real
and safe to access)

o Example: abcdef1234567890953453434

o Points: 11

Flag 4 (27 points)

The Attorney General is impressed by you but says they believe the group is also using another
server to host a malicious file. It appears that one of the hackers recently accessed this server and
downloaded a file from it. As a last minute request, the Attorney General is asking you to investigate
what this file is, and where it is hosted.

Task 4.1

 What is the IP address for the server in question?

o Example: 192.168.8.7

o Points:2

Task 4.2

 What is the username used to log in the server?

o Example: something

o Points:4

Task 4.3

 What is the password used to log in the server?

o Example: something

o Points:4

Task 4.4

 One file is downloaded from the server, what is the file name?

o Example: something

o Points:3

Task 4.5

 What is the programming language used to create this file?

o Example: something

o Points:5

Task 4.6

 If you run this file you’ll get a Combined hash. What is the unique hash for your ID (i.e I will
provide)?

o Example: 12123123129413249121249aa

o Points:9

Flag 5 (5 points)

Exhausted from the prior exercises, the attorney general has two more exercises for you to prove
you belong here and that he shouldn’t fire you despite doing a good job. He mentions to you the
hackers are getting smart and they have a website called
that has absolutely nothing to do with Azure Firewalls but everything to do with web application
firewalls.

Task 5.1

 There is a flag labeled 5.1 that outputs a hash when you input in your ID (I will provide). Try to
find the page and recover the flag.

o Example: tr95843fkdspugr8euyre0gfd

o Points: 2

Task 5.2

 From the main page on the website, click the blue box that says “Download the Zip”. When
you do, it downloads a file that is zipped and encrypted with a password. You have to use
the tool “John the Ripper” to crack the encryption to find the password. What is the
password for your file?

o Hint: The password is seven numbers long

o Points: 1

Task 5.3

 When you use the password to unlock the file and unzip it, it contains a program. After you
run the program, what is the hash provided?

o Example: 58437594ejgfdiohr8e054309

o Points: 2

Suddenly, your phone rings. You see that the call is coming from Bill’ extension.You were ready to
head back home and watch Netflix. Here we go again…

“Mark, great job so far! I was thinking here. This will not be the last time you will be doing this
analysis on pcaps, so why don’t we start building a python class with several methods to automate
some of the work for next time?” “When you say we, you are saying, why dont I build this class
right?” you say.

“Of course not! I already created some skeleton code to help you out. You just need to build 3
functions now” Bill says.

“Oh, ok. Thank you Boss..”

As you hang up the call, Bill sends you via IM a zip file containing the python class and a attack pcap
from a past incident so you can create the functions and test.

Flag 6 (15 points)

For this task, you need to use the provided pcapanalysis.py and Flag6.pcap files to create three
functions. The snippet below shows where you need to code the functions and the expected output
on each variable n. You can create as many functions and variables you need, however the provided
functions need to return the expected output.

Function Skeleton

# TODO:

# Task 1: Return n being:

# n = Number of ICMP Packets

def icmp_count(self):

n = 0

# TODO: Implement me

return n

# TODO:

# Task 2: Return r,a, being:

# r = Number of ICMP Echo Requests

# a = ICMP Echo Reply

def icmp_request_reply(self):

r = 0

a = 0

# TODO: Implement me

return r,a

# TODO:

# Task 3: Return m,n, being:

# m = Most Common Destination MAC Address

# n = Number of Occurrences

def dest_mac(self):

m,n = 0,0

# TODO: Implement me

return m,n

if __name__ == ‘__main__’:

pcap_analysis = MITMProject()

icmp_count = pcap_analysis.icmp_count()

request,reply = pcap_analysis.icmp_request_reply()

dest_mac,occurences = pcap_analysis.dest_mac()

print(“Number of ICMP Packets : “, icmp_count)

print(“Number of ICMP Requests and Replies : “,request,reply)

print(“Most Common MAC Address and Number of Ocurrences: “, dest_mac,occurences)

To start, make sure that the package pyshark is installed on your system. Please review pyshark
Github page to install the package and its dependency (tshark) :
and When you open
pcapanalysis.py, make sure student_id is updated with your 9-digit id

# TODO: Change this to YOUR ID!!!

# This is your 9-digit ID

self.student_id = ‘ (I will provide)

Do not modify the import statements. All you need to complete this assignment is there. New
imports may be ignored by the autograder and your code will fail.

Deliverables:

Task 6.1

 Modify the def icmp_count(self): function so that it returns an integer, n, which represents
the number of ICMP packets in the flag6.pcap file.

 Points: 3

Task 6.2

 Modify the def icmp_request_reply(self): function to return r (the number of ICMP Echo
Requests as a integer) and a (the number of ICMP Echo Reply as an integer).

 Points: 5

Task 6.3

 Modify the def dest_mac(self): function to return m (the most common destination MAC
address as a string) and n (its number of occurrences as an integer).

 Points: 7

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Computer Science Wk 2 assignment

Please see attachment for instructions provide a one-page response to the following topic below utilizing supporting documentation obtained from your textbooks and the Internet.  Be sure to include an APA Reference Page Topic: Assess the various Access Control methods.

Discussion and Replies

Please see attachment for instructions.       In 250 words total, answer the questions below with 4 evidence base scholarly articles. APA format. Based on the readings for chapter 3 Information Security Fundamentals and chapter 3&4 Information Security: Design, Implementation, Measurement, and Compliance, Discuss the following. 1. What are

How can businesses benefit from incorporating AI Integration Services into their digital transformation strategies?

[url= Integration Services[/url] are transforming businesses by streamlining operations, enhancing customer experiences, and enabling data-driven decisions. By automating repetitive tasks, AI frees up resources for more strategic activities, improving productivity. AI tools like chatbots and recommendation engines offer personalized solutions, fostering customer loyalty. AI also helps businesses analyze large datasets

OSINT Project 2

 Download the attached detailed assignment description for this project. You should also review the rubric shown below for additional information about the requirements for the project and how your work will be graded. Please make sure that you use both the assignment description file AND the rubric when completing your work. 

OSINT Project

Instructions Download the attached detailed assignment description for this project. You should also review the rubric shown below for additional information about the requirements for the project and how your work will be graded. Please make sure that you use both the assignment description file AND the rubric when completing your

D 6 of 459

Follow the attach instructions to complete this work Questions: 1. How is technology increasingly used in healthcare beyond electronic health records (HER)?  Give some examples. 2. Would you personally participate in robot assisted/telesurgery as a patient or a medical professional?  Why or why not? Resources 20 Examples Of IoT Wearables

D 5 of 459

Follow the attach instructions to complete the work. Questions: 1. What are service robots and how are they used and categorized?  Give examples of each. 2. How would you leverage service robots to improve the availability, confidentiality, and integrity of a large (20MW+) data center? Resources Robots as a Platform

ITS 10 Help

Ethical Hacking help Login to your NDG Online account. Complete the following labs. Each lab is worth 40 points. NDG Online account Link- Log In | NDG Online Portal ([email protected] Password: Starballplayer23$ 1. NDG Ethical Hacking Lab 10: Web Pentesting 2. NDG Ethical Hacking Lab 11: Client Side Exploitations After

InfSec

 Blockchain technology will revolutionize cybersecurity

ITS 12 Help

Ethical HAcking Login to your NDG Online account. Complete the following labs. Each lab is worth 40 points. NDG Online account Link- Log In | NDG Online Portal ([email protected] Password: Starballplayer23$ 1. NDG Ethical Hacking Lab 08: Password Cracking with JTR and Hashcat 2. NDG Ethical Hacking Lab 17: Creating

ITS 13 Help

Ethical Hacking  Login to your NDG Online account. Complete the following labs. Each lab is worth 40 points. NDG Online account Link- Log In | NDG Online Portal ([email protected] Password: Starballplayer23$ 1. NDG Ethical Hacking Lab 06: Network Analysis 2. NDG Ethical Hacking Lab 07: Evading IDS Submit Your Lab

Replies

please see attachment for instructions   In 400 word total, replying to the 2 post below. Each reply must be 200 word.      N.B Post #1 Hello classmates,   I am active duty in the military and currently on Eastern Standard Time. I have 4 kids, I’ve been in

channing 4.25 r studio work

follow the insrtuction Group Project Mostafa Rezaei Big Data (Introduction to Data Science) General information The group project gives you the opportunity to practice many of the skills we learned in the class. It includes 5 steps: Step 1: Find and describe a data set Find a publicly available data

Computer Science English Homework

● Assignment to do For this assignment, research different tools that cloud storage service providers use to manage the vast arrays of drives in their environments. Also, research the current performance and trends of the types of hard drives in use: magnetic vs. SSD. Summarize your research in a 2-3

SQL Help13

Statements and query For the final project, you will be working with a Guitar Shop.  You will need the MySQL server and MySQL workbench installed, just as it has been throughout the class. You will also need the following file: Project Requirements: 1. Execute the attached create_my_guitar_shop.sql to create the

Computer Science WK1 Assignment

Please see attachment for instructions and PDF book     W1 Assignment Instructions:   In 2 pages, answer the questions below with 5 evidence base scholarly articles in APA format.  Recommend and expand upon Information Security & Risk Management. 1. What are some internal and external security threats when dealing