Week 7

This week I just did a lot of traffic reading on Wireshark. There are three scenarios of how I am reading the packets. The first is Address Resolution Protocol (ARP) poisoning, which forwards the traffic to the device I am using for the attack, the iPad and the router, the second is ARP poisoning the iPhone and iPad, and the third is ARP poisoning the router, iPad and iPhone. My faculty advisor wanted to know where the calls between the iPad and iPhone I am using for the attacks since one of three of the scenarios do not work properly. The type of packets that appear when a call is Session Transversal Utilities of NAT (STUN) and User Datagram Protocol (UDP). STUN is what appears when the call is being established and UDP appears when the call conversation is active. The problem with one of the scenarios is when I drop the packets on the call no UDP packets appear and the call connection is still active which is very strange because usually when there are no UDP packets being sent that means there should be no call going on. So currently I am looking for a possible reason why that is happening, but I have an inkling of why that is happening. My guess is because since I do not have the router ARP poisoned I do not have the permissions to see the traffic of the call since I am not forwarding any packets that are coming from the router. Besides the research, I started to work on the introduction of my two-page abstract since it getting close to the end which was a lot quicker than I thought. The two-page abstract is basically the longer version of the poster board so hopefully, I can quickly and effectively write a good abstract and getting my poster started also.