Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Computer Science Assignment help needed

Help required for the attached assignment.

In this project, students will get familiar with reading packet captures (PCAP) and some standard
man-in-the-middle techniques. This is where a malicious user puts themselves in the middle of a
conversation with another user and an application and eavesdrops on all the tra ic. Students will
familiarize themselves with Layer 2 – 7 network tra ic and how to analyze network tra ic using
Wireshark, a network protocol analyzer, and its libraries such as pyShark.

The assignment documentation and instructions are at the following link
to an
external site.

Part 1 PCAP is available at:
1.amazonaws.com/MITM/mitm_2025.pcapLinks to an external site.

Part 2 Programming Assignment is available
at: to an external site.

MITM/PCAP

Learning Goals of this Project:

Students will get familiar with packet capture (PCAP) reading and some common man in the middle
techniques. This is where a malicious user puts themselves in the middle of the conversation with
another user or application and eavesdrops on all the tra ic. Some papers which demonstrate this
concept are the following:

 Man-In-The-Middle Attack in Wireless and Computer Networking- A review

 Detection of man-in-the-middle attacks using physical layer wireless security techniques

 On the Feasibility of Large-Scale Infections of iOS Devices

Students will familiarize themselves with Layer 2 – 7 network tra ic and how to analyze network
tra ic using Wireshark, a network protocol analyzer, and its libraries such as pyShark.

 For more details about Wireshark you can visit

 For details about pyShark and tshark you can visit

Students will also familiarize themselves with application layer protocols such as HTTP and IRC.

 If you are not familiar with HTTP, we strongly recommend you learn about the protocol,
methods, and requests. You can find a good introduction at Mozilla’s developer
page and Sam Barros’ Medium page

 IRC was a very common protocol in the early 2000s. For its simplicity and e iciency it’s still
in use on multiple settings. Several Botnets use it for Command and Control (C&C) and

hacking groups still rely on IRC to exchange information. You can read more and get familiar
by reading this Medium article.

Finally, this is a graduate course. So it is expected that students will research and understand how
these network protocols work by reviewing their RFCs:

 RFC1459 (Internet Relay Chat Protocol):

 RFC2616 (Hypertext Transfer Protocol):

The final deliverables:

There are two deliverables for this project, each is under their own Gradescope assignment named
Man in the Middle – PCAP Analysis and Man in the Middle – Programming Assignment.

Man in the Middle – PCAP Analysis template A single JSON file named project_mitm.json. A
template can be found below. Please See Submission Details for more information. This
submission consists of Flag 1 to Flag 5.

Man in the Middle – Programming Assignment The modified pcapanalysis.py file with the three
new functions described under this submission consists of Flag 6 only. Please See Submission
Details for more information.

Important Reference Material:

 Youtube Video from our TA Renan showing how to install dependencies for Flag 6 and a
short example

 O icial Wireshark Guide

 Read the RFCs provided.

 If you have no experience with networking or application layer protocols, we STRONGLY
encourage you to research those topics. There are many great resources online like Google
and YouTube.

Submission:

Gradescope (autograded). Please See Submission Details for more information.

Requirements

Wireshark

Python3 – Download Python

 Pyshark Library –

 TShark –

Ensure you have nslookup installed on your OS (DNSUtils) (it should come default on any Windows,
MacOS or Linux environment)

Packet Capture – Part 1:

The packet capture can be downloaded at: canvas

Programming Assignment – Part 2:

The programming assignment .zip including pcapanalysis.py and the corresponding pcap can be
downloaded on canvas

Hint: You can watch the Youtube Video from our IA Renan showing how to install dependencies for
Flag 6

File submission instructions:

These are the instructions for how the Attorney General needs you to submit your findings.

File submission instructions:

This project needs to be submitted via Gradescope. Navigate to the course in Canvas and click
‘Gradescope’. On the Gradescope website, click ‘Project MITM and submit there. For this project
there is a limit of 10 submissions for both sections. Section 1 contains Flags 1-5 and Section 2
is the Programming Assignment which contains Flag 6.

Man in the Middle – WireShark Assignment – Max of 85 points

There is a limit of 10 submissions for this assignment.

Name your submission file: project_mitm.json. In addition, ensure you replace the placeholders
with the flags you retrieve from each relevant task.

Note: You can use Notepad++/TextEdit or Vim to create and edit this file. IMPORTANT: Do not use
LibreO ice, Word, or any similar document editor. Your submission must be in proper JSON format
with no special characters in order to pass the autograder; these document editors are likely to
introduce special characters that will make your submission fail the autograder.

Here is an example of the provided JSON file:

{

“task1.1”: “<copy flag 1 here>”,

“task1.2”: “<copy flag 2 here>”,

“task1.3”: “<copy flag 3 here>”,

“task1.4”: “<copy flag 4 here>”,

“task1.5”: “<copy flag 5 here>”,

“task2.1”: “<copy flag 6 here>”,

“task2.2”: “<copy flag 7 here>”,

“task2.3”: “<copy flag 8 here>”,

“task2.4”: “<copy flag 9 here>”,

“task3.1”: “<copy flag 10 here>”,

“task3.2”: “<copy flag 11 here>”,

“task3.3”: “<copy flag 12 here>”,

“task3.4”: “<copy flag 13 here>”,

“task4.1”: “<copy flag 14 here>”,

“task4.2”: “<copy flag 15 here>”,

“task4.3”: “<copy flag 16 here>”,

“task4.4”: “<copy flag 17 here>”,

“task4.5”: “<copy flag 18 here>”,

“task4.6”: “<copy flag 19 here>”,

“task5.1”: “<copy flag 20 here>”,

“task5.2”: “<copy flag 21 here>”,

“task5.3”: “<copy flag 22 here>”

}

And here is an example of how your submitted file should look: (Note: this is an example; none of
these values are correct.)

An example of what the submitted file content should look like:

{

“task1.1”: “something.something.something”,

“task1.2”: “BigBird,CookieMonster,OscarTheGrouch”,

“task1.3”: “#WOW”,

“task1.4”: “a12342342bcde393202013434”,

“task1.5”: “Atlantis”,

“task2.1”: “maliciousactor”,

“task2.2”: “somefile.extension”,

“task2.3”: “something”,

“task2.4”: “a123242342342342342934234”,

“task3.1”: “something.something”,

“task3.2”: “192.168.1.10”,

“task3.3”: “ns-something-something.something.something”,

“task3.4”: “abcdef1234567890953453434”,

“task4.1”: “192.168.8.7”,

“task4.2”: “something”,

“task4.3”: “something”,

“task4.4”: “something”,

“task4.5”: “something”,

“task4.6”: “12123123129413249121249aa”,

“task5.1”: “tr95843fkdspugr8euyre0gfd”,

“task5.2”: “something”,

“task5.3”: “58437594ejgfdiohr8e054309”

}

Man in the Middle – Programming Assignment – Max of 15 points

There is a limit of 10 submissions for this assignment.

To submit, name your submission file: pcapanalysis.py and wait for the code to execute. There are
only three tests. Your grade will be displayed within a few seconds or minutes depending on how
many submissions are being evaluated at the time

Submission Reminder

If you go over the submission limit you are responsible to activate the submission you want to
be graded. The TA’s will not do this for you.

Canvas will show no grades until we export them from gradescope to canvas. This will only be done
once all extensions are finalized.

Background and Setup

The Necrocryptors (TNC) is a hacking group known for multiple data leaks and has been active at
underground forums selling personally-identifiable information (PII) and credit card data stolen
from vulnerable websites.

Recently, TNC led a DDoS campaign against multiple targets in the United States, leading to a
Federal Investigation by the National Cyber Investigative Joint Task Force (NCIJTF). This
investigation was coordinated by the FBI Cyber Crime division and after months of undercover
investigation, NCIJTF was able to capture unencrypted communication between members of TNC.

While NCIJTF did not disclose how this communication was captured, we can infer that either it
came from an insider member of the organization or a sophisticated attack led by NCIJTF allowed
this communication to be captured.

In this project, you are playing the role of Mark, an FBI agent from the Cyber Crime division.

You walk into the o ice, just back from a nice vacation in the Bahamas, and pour some co ee from
the shared pot near your cubicle when you hear, “Mark! Great to see you are back! Come over to my
desk right now, we need to talk.” It’s your boss, Bill. You think to yourself, Geez! I just came back.
This guy doesn’t give me a break.

You take your co ee to Bill’s o ice, close the door and listen as Bill starts.

“Mark, I have a task for you. We finally got our hands on some incriminating evidence against TNC.
With this pile of evidence, the Attorney General is on my neck to bring those guys to justice. But we
need some strong evidence of criminal activity that can’t be disputed in court.”

“Okay…” My wife told me to take some extra days o , but no. I had to come back today…

“I’m sending the packet your way,” Bill says, “You have one week to analyze the data and find clear
evidence of criminal activity. The Attorney General sent us a list of things they are looking for. It’s all
on your desk.”

“Sounds good, boss. It’s great to be back.”

You leave his desk, take a sip of co ee and go back to your computer. No time to slowly get up to
speed, you think, but that’s OK. I’m excited to help take TNC down.

Flag 1 (5 points)

Your first task is to figure out where the hackers are spending their time and gather some evidence
for the Attorney General. This will also give you a good overview of Wireshark filters.

The Attorney General needs some evidence of The Necrocryptors’ associates and where the group
meets.
For this, you need to gather the following information:

Task 1.1

 Based on the provided packet capture (pcap) file, identify the server address used by the
hackers to communicate.

o Example: irc.someplace.net

o Points: 1

Task 1.2

 Based on the provided packet capture (pcap) file, identify the nicknames of the malicious
actors involved in the conversation. List the nicknames in the order they appear in the
conversation following the format below:

o Example: firstactor,secondactor,thirdactor

o Points: 1

Task 1.3

 Based on the provided packet capture (pcap) file, identify the channel the malicious actors
use to communicate. Remember, channel names always start with #, so include # in your
answer.

o Example: #WOW

o Points: 1

Task 1.4

 Based on the provided packet capture (pcap) file, identify the hash used by the malicious
actor to validate its identity.

o Example: a12342342bcde393202013434

o Points: 1

Task 1.5

 Based on the pcap file provided, analyze the network tra ic to determine the potential origin
country of the last identified malicious actor. Consider the IP addresses, any geolocation
data. Provide the name of the country

o Example: Atlantis

o Points: 1

Flag 2 (27 points)

Your second task will require you to recover a payload from the conversation. There are multiple
ways to do this. You can use Wireshark, pyShark or any other library available.

As part of the evidence gathering, the Attorney General needs concrete evidence of malicious
intent. For Task 2, you will need to review the conversation between members of TNC and gather
incriminating data from this conversation.

Task 2.1

 Based on the provided pcap file, identify which malicious actor initiated a private chat
during the conversation.

o Example:maliciousactor

o Points: 2

Task 2.2

 Based on the provided pcap file, identify the name of the file transferred by one hacker to
another via IRC DCC. (Including extension)

o Example:somefile.extension

o Points: 5

Task 2.3

 Based on the provided pcap file, determine the encryption method or algorithm used to
encrypt the file transferred between the hackers. (Just the 3-letter name)

o Example:something

o Points: 4

Task 2.4

 If you decrypt and run the file, you’ll get a unique hash based on your ID (I will provide).
What is the hash generated?

o Example:a123242342342342342934234

o Points: 16

Flag 3 (21 points)

The Attorney General lets you know that they think there is a web server in here that is phishy and is
spitting out long numbers and letters. The Necrocryptors hacking group is known to play tricks with
these values. The Attorney General needs the following information to track the folks operating the
website:

Task 3.1

 The site domain name (Record just the site’s domain name and the top-level-domain (TLD)
name, with the period. E.G: something.hostname.tld)

o Example: something.something.something

o Points: 2

Task 3.2

 What is the public IP address?

o Example: 192.168.1.10

o Points: 2

Task 3.3

 The primary nameserver for this domain (You may need to look outside the pcap for this
information. Think about tools that will give you the nameserver data for a specific domain)

o Example: ns-something-something.something.something

o Points: 6

Task 3.4

 The hash provided by entering your ID in the field (i.e. 9021042) (NOTE: The website is real
and safe to access)

o Example: abcdef1234567890953453434

o Points: 11

Flag 4 (27 points)

The Attorney General is impressed by you but says they believe the group is also using another
server to host a malicious file. It appears that one of the hackers recently accessed this server and
downloaded a file from it. As a last minute request, the Attorney General is asking you to investigate
what this file is, and where it is hosted.

Task 4.1

 What is the IP address for the server in question?

o Example: 192.168.8.7

o Points:2

Task 4.2

 What is the username used to log in the server?

o Example: something

o Points:4

Task 4.3

 What is the password used to log in the server?

o Example: something

o Points:4

Task 4.4

 One file is downloaded from the server, what is the file name?

o Example: something

o Points:3

Task 4.5

 What is the programming language used to create this file?

o Example: something

o Points:5

Task 4.6

 If you run this file you’ll get a Combined hash. What is the unique hash for your ID (i.e I will
provide)?

o Example: 12123123129413249121249aa

o Points:9

Flag 5 (5 points)

Exhausted from the prior exercises, the attorney general has two more exercises for you to prove
you belong here and that he shouldn’t fire you despite doing a good job. He mentions to you the
hackers are getting smart and they have a website called
that has absolutely nothing to do with Azure Firewalls but everything to do with web application
firewalls.

Task 5.1

 There is a flag labeled 5.1 that outputs a hash when you input in your ID (I will provide). Try to
find the page and recover the flag.

o Example: tr95843fkdspugr8euyre0gfd

o Points: 2

Task 5.2

 From the main page on the website, click the blue box that says “Download the Zip”. When
you do, it downloads a file that is zipped and encrypted with a password. You have to use
the tool “John the Ripper” to crack the encryption to find the password. What is the
password for your file?

o Hint: The password is seven numbers long

o Points: 1

Task 5.3

 When you use the password to unlock the file and unzip it, it contains a program. After you
run the program, what is the hash provided?

o Example: 58437594ejgfdiohr8e054309

o Points: 2

Suddenly, your phone rings. You see that the call is coming from Bill’ extension.You were ready to
head back home and watch Netflix. Here we go again…

“Mark, great job so far! I was thinking here. This will not be the last time you will be doing this
analysis on pcaps, so why don’t we start building a python class with several methods to automate
some of the work for next time?” “When you say we, you are saying, why dont I build this class
right?” you say.

“Of course not! I already created some skeleton code to help you out. You just need to build 3
functions now” Bill says.

“Oh, ok. Thank you Boss..”

As you hang up the call, Bill sends you via IM a zip file containing the python class and a attack pcap
from a past incident so you can create the functions and test.

Flag 6 (15 points)

For this task, you need to use the provided pcapanalysis.py and Flag6.pcap files to create three
functions. The snippet below shows where you need to code the functions and the expected output
on each variable n. You can create as many functions and variables you need, however the provided
functions need to return the expected output.

Function Skeleton

# TODO:

# Task 1: Return n being:

# n = Number of ICMP Packets

def icmp_count(self):

n = 0

# TODO: Implement me

return n

# TODO:

# Task 2: Return r,a, being:

# r = Number of ICMP Echo Requests

# a = ICMP Echo Reply

def icmp_request_reply(self):

r = 0

a = 0

# TODO: Implement me

return r,a

# TODO:

# Task 3: Return m,n, being:

# m = Most Common Destination MAC Address

# n = Number of Occurrences

def dest_mac(self):

m,n = 0,0

# TODO: Implement me

return m,n

if __name__ == ‘__main__’:

pcap_analysis = MITMProject()

icmp_count = pcap_analysis.icmp_count()

request,reply = pcap_analysis.icmp_request_reply()

dest_mac,occurences = pcap_analysis.dest_mac()

print(“Number of ICMP Packets : “, icmp_count)

print(“Number of ICMP Requests and Replies : “,request,reply)

print(“Most Common MAC Address and Number of Ocurrences: “, dest_mac,occurences)

To start, make sure that the package pyshark is installed on your system. Please review pyshark
Github page to install the package and its dependency (tshark) :
and When you open
pcapanalysis.py, make sure student_id is updated with your 9-digit id

# TODO: Change this to YOUR ID!!!

# This is your 9-digit ID

self.student_id = ‘ (I will provide)

Do not modify the import statements. All you need to complete this assignment is there. New
imports may be ignored by the autograder and your code will fail.

Deliverables:

Task 6.1

 Modify the def icmp_count(self): function so that it returns an integer, n, which represents
the number of ICMP packets in the flag6.pcap file.

 Points: 3

Task 6.2

 Modify the def icmp_request_reply(self): function to return r (the number of ICMP Echo
Requests as a integer) and a (the number of ICMP Echo Reply as an integer).

 Points: 5

Task 6.3

 Modify the def dest_mac(self): function to return m (the most common destination MAC
address as a string) and n (its number of occurrences as an integer).

 Points: 7

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Discussion-2

Discussion: Evaluation of AWS Application Discovery Service Contains unread posts Now that you have discussed the data migration and application migration strategies, you will discuss and evaluate AWS Application Discovery Service. You should ensure that you cover the following areas: · What is agent-based discovery? · What is agentless discovery?

W2 discussion and replies

please see attachment for instructions     W2 Discussion Instructions: Analog, Digital, and what comes next   In 250 word, answer the questions below with 4 evidence base scholarly articles in APA format.  1. Discuss your thoughts on the evolution from analog to digital. 2. What advanced transmission and signal

IS -ASS

Module #2: Electronic Health Records – Dreams and Reality Module #2: Discussion Board Please respond to the following prompts: · How do data standards impact health interoperability?  · How can healthcare organizations balance the need for access to EHRs with the privacy and security of patient information?  · Please post

case study

To complete this assignment, review the prompt and grading rubric in the Module Two Activity Guidelines and Rubric. When you have finished your work, submit the assignment here for grading and instructor feedback.

WK2 DISCUSS ramar

INSTRUCTIONS!! IN THE LINK BELOW IS DISCUSS FRM WK 1 TO HELP WIT THIS ASSIGNMENT!!   Consider the aligned topic and problem for your project. For this week’s discussion, choose one of the following for your post: Share a resource (such as a link to a website or a business

How to build a game website?

I want to build a website like   [link=/]snow rider 3d[/link] [link name=snow rider 3d]/[/link] ((/)) ((/ snow rider 3d)) [/ snow rider 3d] [[/ snow rider 3d]] [L=snow rider 3d]/[/L] “snow rider 3d”:/ [snow rider 3d](/)

a1

Create an E-R model based on the following scenarios: Note: is a free web application for creating diagrams. I have provided a video showing how to use this application. You are welcome to use the modeling software of your choice (Visio, Lucid Charts, etc.). Your models must use crows’ foot

Project 1: Develop Cloud Migration Plan

Project 1: Develop Cloud Migration Plan  Step 1: Research Cloud Premigration Considerations  In this step, you will research premigration considerations, such as the analysis of the current workloads that are being served out of BallotOnline’s existing IT infrastructure, and how the  cloud migration plan will align with business objectives and BallotOnline’s updated

Discussion: Data Migration vs. Application Migration Strategies

Discussion: Data Migration vs. Application Migration Strategies Now that you have a comprehensive IT Policy that incorporates the Cloud Adoption Policy, you will discuss the dynamics between data migration vs. application migration. You should cover the following areas: · What is data migration? · What types of data can and

c++ social media platform

attached CE221 – C++ Programming Assignment 2 – 24/25 Dr Michael Barros ([email protected]) Deadline: 13:59:59, Monday 13th January 2025 Notice You should refer to sections 5 and 7 of the Undergraduate Students’ Handbook for details of the University policy regarding late submission and plagiarism; the work handed in must be

c++ social media platform

attached CE221 – C++ Programming Assignment 2 – 24/25 Dr Michael Barros ([email protected]) Deadline: 13:59:59, Monday 13th January 2025 Notice You should refer to sections 5 and 7 of the Undergraduate Students’ Handbook for details of the University policy regarding late submission and plagiarism; the work handed in must be

Computer Science WK1 Assignment

Please see attachment for instructions     W1 Assignment Instructions: Chapter 7 exercise 7.3   In 2 pages, answer the questions below with 5 evidence base scholarly articles in APA format.  In the 1970s, one of the main arguments in favor of using closed technologies focused on economics: companies asked

WK1 Discussion and Replies

Please see attachment for instructions.     W1 Discussion Instructions: Where it all Started   In 250 word, answer the questions below with 4 evidence base scholarly articles in APA format.  1. Discuss what you find interesting about the origin of the internet covered in Chapters 7 and 8 of

Discussion 8…

Follow the attach instructions to complete this work. Ethical Practices for Cybersecurity Investments & Purchases   Must post first. Subscribe Moral and ethical requirements should serve as drivers which encourage a business to  invest in or  spend money on cybersecurity products, services, and programs. You have been invited to participate in a

Discussion 7…

Follow the attach instructions to complete this work. Risky Business: How Can U.S. Companies Protect their Digital Assets Overseas?   Must post first. Subscribe Risky Business: How Can U.S. Companies Protect their Digital Assets Overseas? Prepare a 3 to 5 paragraph briefing statement that can be used to answer the

Discussion 6..

Follow the attach instructions to complete this work. Briefing Paper: Exploring Factors which Drive Market Demand for Cybersecurity Products and Services   Must post first. Subscribe Failure to understand what drives customer demand in the cybersecurity market can result in a quick trip to bankruptcy court or a forced sale

wk 1 discuss 2

BELOW I INPUT A CLASSMATE DISCUSSION TO SEE WHERE YOU SHOULD GO WITH THIS ASSIGNMENT MY MAJOR IS INFORMATION TECHNOLOGY For your final project, you will be developing a two-unit course. Choose a topic for that course and develop an overview for it. The overview should be about one paragraph

Worksheet

To complete this assignment, review the prompt and grading rubric in the Module One Worksheet Activity Guidelines and Rubric. You will also need to access the Module One Worksheet. When you have finished your work, submit the assignment here for grading and instructor feedback.