Packet Tracer – Communicating in a Cyber World
© 2016 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 2 of 4
b. Click the Desktop tab and then click Email.
c. Click the Receive button to retrieve the email sent from Mike.
What protocol was used to retrieve the email from the email server?
Part 2: Upload Files using FTP
Step 1: Set the packet sniffer to capture traffic on the correct port.
a. Enter the geographic (root) view to see all three remote sites.
b. Click the Cyber Criminals Sniffer.
c. Click Port1 to capture packets on this port.
d. Leave the Cyber Criminal Sniffer open and visible for the rest of this part.
Step 2: Remotely connect to the FTP server.
e. Enter the Healthcare at Home site and then click the PC Mary.
f. Click the Desktop tab and then click Command Prompt.
g. Connect to the FTP/Web server at Metropolis Bank HQ by entering ftp 209.165.201.3 in the command
prompt.
h. Enter the username of mary and a password of cisco123.
Step 3: Upload a file to the FTP server.
a. At the ftp> prompt, enter the command dir to view the current files stored on the remote FTP server.
b. Mary has a file containing sensitive information regarding new healthcare client information.
Upload the newclients.txt file to the FTP server by entering the command put newclients.txt.
c. At the ftp> prompt, enter the command dir and verify the newclients.txt file is now on the FTP server.
Why is FTP considered an insecure protocol for moving files?
Step 4: Analyze the FTP traffic.
a. Enter the geographic (root) view to see all three remote sites.
b. Click the Cyber Criminals Sniffer.
c. Under the GUI tab on the left, click the 1
st
FTP packet available to select it. Then scroll down to the
bottom of the window displayed on the right.
What information is displayed in clear text from the FTP header?
d. On the left, click the 2
nd
FTP packet available to select it. Then scroll down to the bottom of the window
displayed on the right. Do this again for the 3
rd
FTP packet.
e. Besides the username, what other sensitive information is displayed in clear text from the FTP header?