pcapanalysis.py # You may NOT alter the import list!!!! import pyshark import hashlib class MITMException(Exception): “””A class to throw if

pcapanalysis.py

# You may NOT alter the import list!!!!
import pyshark
import hashlib

class MITMException(Exception):
“””A class to throw if you come across incorrect syntax or other issues”””
def __init__(self, value):
self.value = value

def __str__(self):
return repr(self.value)

class MITMProject(object):
# HINT:
# You can use the __init__ method to load the packet capture
def __init__(self):
self.cap = pyshark.FileCapture(‘flag6.pcap’)
self.class_id = “CS6035F24″

# TODO: Change this to YOUR Georgia Tech ID!!!
# This is your 9-digit Georgia Tech ID
self.student_id = ”

def get_student_hash(self, value):
return hashlib.sha256(self.student_id.encode(‘UTF-8’) + self.class_id + value).hexdigest()

# TODO:
# Task 1: Return n being:
# n = Number of ICMP Packets
def icmp_count(self):
n = 0
# TODO: Implement me

return n

# TODO:
# Task 2: Return r,a, being:
# r = Number of ICMP Echo Requests
# a = ICMP Echo Reply
def icmp_request_reply(self):
r = 0
a = 0
# TODO: Implement me

return r,a

# TODO:
# Task 3: Return m,n, being:
# m = Most Common Destination MAC Address
# n = Number of Occurrences
def dest_mac(self):
m,n = 0,0
# TODO: Implement me

return m,n

if __name__ == ‘__main__’:
pcap_analysis = MITMProject()
icmp_count = pcap_analysis.icmp_count()
request,reply = pcap_analysis.icmp_request_reply()
dest_mac,occurences = pcap_analysis.dest_mac()
print(“Number of ICMP Packets : “, icmp_count)
print(“Number of ICMP Requests and Replies : “,request,reply)
print(“Most Common MAC Address and Number of Ocurrences: “, dest_mac,occurences)

__MACOSX/._pcapanalysis.py

flag6.pcap

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and

follow the Instructions in the  attach Documents to complete this work. Follow the Rubric Research Report #1: Data Breach Incident Analysis and Report  Scenario  Padgett-Beale Inc.’s (PBI) insurance company, CyberOne Business and Casualty Insurance Ltd, sent an audit team to review the company’s security policies, processes, and plans. The auditors

Can someone complete this for me

Can someone complete this for me ? ID mSysRowId 1 ua06Ftxxo5DT29FEtU6s2GsIH4WBra7Vmm9mzoDmd4hFWmgWHD2q19Uh6gZgjcdYJD5KAfiSoqJNYPVYozboMdrWC5/boC+GqAv6ldlKwK76KrWnq6AoA9zoHkqnmH8kRWOuUZ6tXLQ=-~LyErwg/RbqxliP9sRDATWA==

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can

  Public Key Infrastructure (PKI) is an encryption and cybersecurity architecture for managing digital certificates and communication encryption. PKI can be used to ensure secure electronic transfer, provide authentication for communications requiring data integrity and stringent proof of identity. The public/private keys created as part of PKI digital certificates can