Week 9 Lab 2: TCP View and Whois - FlameSpyro/Tech-Journal GitHub Wiki
Assignment: https://docs.google.com/document/d/1ayzB6RTGCCvEuNHXP92N5Rbgtgl7vU9MbsF7ieL9MrE/edit
TCP View allows you to look at the TCP and UDP connections or streams that have been run on your system. It also allows you to look at the process name and ID associated with the connection on your end. The application is different from Wireshark because it shows more low-level information such as which process is using the open socket. That is very, very valuable information. For every open port and process on your computer, you want to know the process that has it open and the path to the process (where the executable exists on the disk).
Find the connection which has sent the most bytes and identify the following
- Process Name
- Path to where executable exist (Path and tools used to find it)
- Process ID
- Protocol
- Remote Address
- Remote Port
- Approximate Bytes Sent
- Approximate received
* chrome.exe * C:\Program Files (x86)\Google\Chrome\Application\chrome.exe * 11460 * TCP * does not show one * https * 38,000 approx. * 8,000 approx.
WhoIs is a mature Internet program (typically Unix) that uses the DNS to lookup information about a domain name.
Open cmd.exe as an administrator and run whois64 champlain.edu.
Find the following in your champlain whois query
- Name of Administrative Contact
- Email of Administrative
- Name of Technical Contact
- Phone number of Technical Contact
- Primary Name Server
- When the domain name expires
* Chris North * [email protected] * Wayne Buttles * +1 802-860-2710 * NS.Champlain.EDU * July 31st, 2021
Run whois on a site you frequently use. Submit the same information as above.
* Domain Administrator * [email protected] * Domain Administrator * +1 310-337-7468 * a11-64.akam.net * does not list