Packet Capture and Analysis Report 1. Machine’s IP Address During the packet capture process, my machine’s IP address was identified as: IP Address: 192.168.1.4 This was determined using the ipconfig command in Windows Command Prompt. 2. Identified TCP Port Number From the captured packets in Wireshark, I identified the first TCP packet originating from my machine. The source port number used for this connection was: Port Number (P): 50213 This port was determined by examining the Transmission Control Protocol (TCP) header in the first recorded TCP packet from my machine. 3. Packet Filtering in Wireshark To analyze only the packets associated with this connection, I applied the following filter in Wireshark: tcp.port == 50213 This allowed me to isolate all packets sent or received using the identified port. 4. Screenshot Submission A screenshot of the Wireshark capture, displaying: • The Internet Protocol (IP) header, showing Src IP and Dst IP addresses. • The Transmission Control Protocol (TCP) header, showing Src Port and Dst Port numbers. is attached for verification. Conclusion: This report documents the process of capturing and analyzing a TCP connection using Wireshark. The key findings include the machine’s IP address and the source port number used during the connection. The screenshot confirms the successful application of packet filtering and analysis. Attachments: Wireshark screenshot