• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • Instructor
  • Syllabus
  • Lecture & Notes
    • Lecture 1: Introduction to Incident Response and Intrusion management
    • Lecture 2: CIRT
    • Lecture 3: Wireshark / Packet Captures
    • Lecture 4: IDS/IPS
    • Lecture 5: Detecting Intrusion
    • Lecture 6: Escalation
    • Lecture 7: LOGS / SIEM
    • Lecture 8: LOGS where to get them
    • Lecture 9: SOC : How to build a SOC for Incident Response Center
    • Lecture 10: SPLUNK
    • Lecture 11: Executive Brief
    • Lecture 12: Final
  • Assignments
    • Short Paper 1
    • Short Paper 2
    • Short Paper 3
    • Term Paper
    • Executive Brief: Presentation
  • Blog Post
    • Welcome
    • Week 2 Blog
    • Week 3 Blog
    • Week 4 Blog
    • Week 8 blog
  • LABS
    • LAB 1
    • LAB 2
    • LAB 3
    • LAB 4
    • LAB 5
    • LAB 6
  • Webex
  • Gradebook

Intrusion Detection & Response

Temple University

LAB 2

Lab 2:  Extract Image (Jpeg only)

  • Restart Wireshark capture
  • Visit google.com
  • In the search engine: search for any image (Cars, Sports logos, places, landmarks etc..)
  • Visit the site with the image but do not download the image:
  • Go Back to wireshark
  • Identify the traffic pattern of the image search
  • Display filter on http
  • Based on the available packets identify the http packet with jpeg data

 

  • Note that in the middle pane many other packet numbers are identified which are associated with this JPEG Packet.
  • Right Click on JPEG File Interchange Format in the middle pane
  • Upon right clicking – select export packet bytes. It will look similar to image below.  Provide a file name.  And ensure that the file type is JPEG (extension).  And under save as type – select ALL.

Find the file that you saved (jpg) upon opening you would have identified the image you visited.

Using the PCAP (wiresharklab.pcapng) provided, identify extract the image and submit it with the LAB submissions.

  • Identify the IP address of the bank visited
  • Extract the “cars” jpeg within the packet capture.

Primary Sidebar

Weekly Discussions

  • Week 01
  • Week 02
  • Week 03
  • Week 04
  • Week 06
  • Week 08
  • Week 09

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in