COMPUTER NETWORKS. CPSC 441, Winter 2016 Prof. Mea Wang Department of Computer Science University of Calgary
|
|
- Claude Hart
- 6 years ago
- Views:
Transcription
1 COMPUTER NETWORKS CPSC 441, Winter 2016 Prof. Mea Wang Department of Computer Science University of Calgary
2 Introduction: Wireshark and tshark Running tshark Running Wireshark Exercise: Analyze HTTP traffic to and from web browser
3 WHAT IS WIRESHARK? Wireshark is network protocol analyzer Runs in Linux, Mac and Windows Free of cost It is installed in lab machines, but need root access You can install it: on your own machine: download.html on your RAC VM (next slide) CPSC 457 Winter 2014
4 TSHARK Terminal version of Wireshark Typically used when interactive user interface is not available You need to use tshark to capture and analyze network packets on RAC VMs. Install tshark on your RAC VM Please login to your VM sudo apt-get install tshark If this results in package not available message, update package list by executing sudo apt-get update first and later install tshark
5 Introduction: Wireshark and tshark Running tshark Running Wireshark Exercise: Analyze HTTP traffic to and from web browser
6 CAPTURE TRAFFIC tshark has to be run with root privileges sudo (superuser mode) while running tshark Identify the network interface to monitor To list all interfaces in a machine: ifconfig -a For RAC VMs, there is only interface -- eth0 Create a destination folder to save the packet trace file In your home directory (/home/ubuntu): mkdir dump Change ownership of the dump folder to root: sudo chown -R root: dump Capture traffic sudo tshark -i eth0 -w dump/filedump0 Option i to specify interface name Option w to specify destination of packet trace file
7 Introduction: Wireshark and tshark Running tshark Running Wireshark (This tutorial is adapted from the textbook exercise.) Exercise: Analyze HTTP traffic to and from web browser
8 MAIN WINDOW Click Capture pull down button to select an interface and start capturing packets
9 CAPTURE WINDOW
10 CAPTURE WINDOW The command menus are standard pull-down menus located at the top of the window. The packet- lis1ng window displays an one-line summary for each packet captured. The packet- header details window provides details about the packet selected (highlighted) in the packet-listing window. The packet- contents window displays the entire content of the captured frame, in both ASCII and hexadecimal format. The packet display filter field, into which a protocol name or other information can be entered in order to filter the information displayed in the packet-listing window (and hence the packet-header and packet-contents windows).
11 Introduction: Wireshark and tshark Running tshark Running Wireshark Exercise: Analyze HTTP traffic to and from web browser (This tutorial is adapted from the textbook exercise.)
12 EXERCISE: HTTP ANALYSIS In this exercise, you will use Wireshark or tshark to analyze HTTP traffic. On your RAC VM: Since we cannot run a browser application on the VM, we will use the command wget to retrieve web content While running tshark through one terminal, connect to the public VM in another terminal. Then do the following steps: wget wget will show a progress bar Once the webpage is downloaded completely, stop the capture (press Control-c in the terminal where tshark is running)
13 TSHARK: ANALYZE PACKETS Tshark dumps all incoming and outgoing packets from eth0 We need to filter the packets that are of interest to us tshark and wireshark shares the same Filter Engine The filter expression is provided to tshark using the option field -R. For example: To filter tcp packets: sudo tshark -r dump/filedump0 -R tcp By default, a short description of the packets (one per line) is displayed to the standard output You can redirect output using > operator If you want full information (all protocol fields) about packet, use V option: sudo tshark -r dump/filedump0 -R tcp -V To filter packets with HTTP header sudo tshark -r dump/filedump0 -R http
14 TSHARK: ANALYZE PACKETS To display tcp packets to and from specific port numbers sudo tshark -r dump/filedump0 -R tcp.dstport==80 tcp.srcport==80 Above command displays all packets having either source or destination tcp port number equal to 80 Note the operators == and Similarly, there are operators:!=, >, <, <=, <= dstport and srcport are field names defined in tshark for TCP destination and source port number, respectively. For more information about the filter expression General Info, go to manual page: man wireshark-filter For full list of field names dfref/
15 TSHARK: FILTER HTTP PACKETS Filter packets with protocol or field name HTTP sudo tshark -r dump/filedump0 -R http Note that above command will ONLY display packets that is identified as HTTP by tshark or has a field called HTTP To display all packets exchanged between VM and the cpsc server sudo tshark -r dump/filedump0 -R tcp.dstport==80 tcp.srcport==80 HTTP server listens on port 80
16 WIRESHARK: HTTP ANALYSIS In Windows or MacOS: Start up your favorite web browser, which will display your selected homepage Start up the Wireshark software. To begin packet capture, select the Capture pull down menu and select Interfaces. This will cause the Wireshark: Capture Interfaces window to be displayed. You ll see a list of the interfaces on your computer. Click on Start for the interface on which you want to begin packet capture. While Wireshark is running, enter the URL: in your browser and have that page displayed in browser Stop Wireshark packet capture by selecting stop in the Wireshark capture window
17 WIRESHARK: HTTP ANALYSIS Lets now filter the HTTP messages (due to webpage access) between your browser and cpsc web server Type in http (without the quotes, and in lower case all protocol names are in lower case in Wireshark) into the display filter specification window and press ENTER. The wireshark window will look similar to figure in slide 11
18 EXAMPLE: HTTP ANALYSIS No. and Time values are relative to the start of the capture
19 THINGS TO TRY OUT Find the HTTP Get Message. This is the HTTP request message sent to the cpsc web server from your browser Find the HTTP Ok Message. This is the HTTP Response message from the cpsc web server to your browser Figure out the IP address of cpsc web server Figure out the IP address of your machine Figure out the time gap between HTTP Get and HTTP OK?
Getting Wireshark. Detailed installing steps can be found on the Internet, so this tutorial won t cover this part.
Wireshark Tutorial Getting Wireshark Wireshark for Windows and Mac OS X can be easily downloaded from its official website. If you are Linux users, you ll probably find Wireshark in its package repositories.
More informationWireshark intro. Introduction. Packet sniffer
Wireshark intro Introduction One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages
More informationWireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross
Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved In the Wireshark
More informationWireshark Lab: Getting Started
Wireshark Lab: Getting Started This following content is edited from the wireshark lab exercise provided by J.F. Kurose, and K.W. Ross, "Computer Networking: A Top down approach" 5th ed. Pearson, 2010.
More informationLab: 2. Wireshark Getting Started
Lab: 2 Wireshark Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages
More informationLab Assignment 3 for ECE374
Lab Assignment 3 for ECE374 Posted: 02/25/18 Due: 03/08/18 In this lab, we ll take a quick look at the UDP and TCP transport protocol. Whenever possible you should hand in a Wireshark screenshot that you
More informationWireshark Lab: Getting Started v6.0
Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.
More informationWireshark Lab: Getting Started
Wireshark Lab: Getting Started Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb 2005-2019, J.F Kurose and K.W. Ross, All Rights Reserved Introduction to Wireshark
More informationExploring TCP and UDP based on Kurose and Ross (Computer Networking: A Top-Down Approach) May 15, 2018
Exploring TCP and UDP based on Kurose and Ross (Computer Networking: A Top-Down Approach) May 15, 2018 Exploring TCP Description Capturing a bulk TCP transfer from your computer to a remote server. In
More informationGoals - to become acquainted with Wireshark, and make some simple packet captures and observations
CSCI 395: Networks Lab 2: Introductory Wireshark Lab, Current state of the Internet, and Transmission/ Delay Due: 2/19/16 at the beginning of class 20 Points Part I Goals - to become acquainted with Wireshark,
More informationLab Assignment for Chapter 1
CHAPTER 1 Lab Assignment for Chapter 1 We have created lab assignments for eight chapters of the textbook (Chapters 1, 2, 3, 4, 5, 6, 8, and 10). We have no lab assignments for Chapter 7, 9 or 11. We cannot
More informationEthereal Lab: Getting Started
Ethereal Lab: Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages
More informationWireshark Lab: Getting Started v7.0
Wireshark Lab: Getting Started v7.0 Supplement to Computer Networking: A Top-Down Approach, 7th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.
More informationWireshark Lab: Getting Started v6.0
Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.
More informationTo see how ARP (Address Resolution Protocol) works. ARP is an essential glue protocol that is used to join Ethernet and IP.
Lab Exercise ARP Objective To see how ARP (Address Resolution Protocol) works. ARP is an essential glue protocol that is used to join Ethernet and IP. Requirements Wireshark: This lab uses the Wireshark
More informationIntro to OpenFlow Tutorial
GENIExperimenter/Tutorials/OpenFlowOVS-Floodlight GENI: geni Intro to OpenFlow Tutorial Overview: This is a simple OpenFlow tutorial that will guide you how to use the Floodlight Controller in conjunction
More informationNew York University Computer Science Department Courant Institute of Mathematical Sciences
New York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Data Communication & Networks Course Number: g22.2662-001 Instructor: Jean-Claude Franchitti Session:
More informationWireshark HTTP. Introduction. The Basic HTTP GET/response interaction
Wireshark HTTP Introduction Having gotten our feet wet with the Wireshark packet sniffer in the introductory lab, we re now ready to use Wireshark to investigate protocols in operation. In this lab, we
More informationInstituto Superior Técnico, Universidade de Lisboa Network and Computer Security. Lab guide: Traffic analysis and TCP/IP Vulnerabilities
Instituto Superior Técnico, Universidade de Lisboa Network and Computer Security Lab guide: Traffic analysis and TCP/IP Vulnerabilities Revised on 2016-10-18 Alpha version: This is an early version and
More informationEthereal Lab: Getting Started
Ethereal Lab: Getting Started Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. Tell me and I forget. Show
More informationUniversity of Maryland Baltimore County Department of Information Systems Spring 2015
University of Maryland Baltimore County Department of Information Systems Spring 2015 IS 450/650: Data Communications and Networks Homework Assignment 1 Wireshark Lab (Handed Out: February 3, 2015 (Tuesday),
More informationWireshark Lab: Getting Started v7.0
Wireshark Lab: Getting Started v7.0 Adapted by HMC from the supplement to Computer Networking: A Top-Down Approach, 7 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve
More informationWireshark Lab: Getting Started
Wireshark Lab: Getting Started Version: 2.0 2007 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach, 4 th edition. Tell me and I forget. Show me and I remember. Involve
More informationProject points. CSE422 Computer Networking Spring 2018
Project 1 100 points Introduction One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages
More informationLab Exercise Protocol Layers
Lab Exercise Protocol Layers Objective To learn how protocols and layering are represented in packets. They are key concepts for structuring networks that are covered in 1.3 and 1.4 of your text. Review
More informationExercises: Basics of Networking II Experiential Learning Workshop
Exercises: Basics of Networking II Experiential Learning Workshop 1 General Guidelines 1. Make a team of two or three unless stated otherwise. 2. For each exercise, use wireshark capture to verify contents
More informationLab I: Using tcpdump and Wireshark
Objectives To get the student familiar with basic network protocol analyzer, tools and equipment used in later labs, including tcpdump and Wireshark. Lab Readings Go to http://www.tcpdump.org/tcpdump_man.html
More informationWireshark Lab: HTTP SOLUTION
Wireshark Lab: HTTP SOLUTION Supplement to Computer Networking: A Top-Down Approach, 7th ed., J.F. Kurose and K.W. Ross 2005-2012, J.F Kurose and K.W. Ross, All Rights Reserved The following screen shots
More informationStateless Firewall Implementation
Stateless Firewall Implementation Network Security Lab, 2016 Group 16 B.Gamaliel K.Noellar O.Vincent H.Tewelde Outline : I. Enviroment Setup II. Today s Task III. Conclusion 2 Lab Objectives : After this
More informationBSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario
BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark
More informationSpring 2017 Gabriel Kuri
Lab 2 ECE 431L Spring 2017 Gabriel Kuri This lab is made up of two parts. Part 1 will consist of familiarizing yourself with the Raspberry Pi (RPi). It includes running Unix/Linux commands to become somewhat
More informationWireshark Lab: HTTP v6.1
Wireshark Lab: HTTP v6.1 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb
More informationTo see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet.
Lab Exercise TCP Objective To see the details of TCP (Transmission Control Protocol). TCP is the main transport layer protocol used in the Internet. The trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-tcp.pcap
More informationProblem Set 9 Due: Start of class, December 4
CS242 Computer Networks Handout # 18 Randy Shull November 27, 2017 Wellesley College Problem Set 9 Due: Start of class, December 4 Reading: Kurose & Ross, Sections 6.1 through 6.5 Wireshark Lab [16] In
More informationWeek Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development
Weekly Tasks Week 5 Rich Macfarlane 2013 Week Date Teaching Attended 5 Feb 2013 Lab 7: Snort IDS Rule Development Aim: The aim of these labs are to further investigate the Snort, network IDS, and methods
More informationObjectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets.
Team Project 1 Due: Beijing 00:01, Friday Nov 7 Language: English Turn-in (via email) a.pdf file. Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and
More informationExercises: Basics of Network Layer Experiential Learning Workshop
Exercises: Basics of Network Layer Experiential Learning Workshop 1 General Guidelines 1. Make a team of two or three unless stated otherwise. 2. For each exercise, use wireshark capture to verify contents
More information5. Write a capture filter for question 4.
Pre-Lab 2: Single Segment IP Networks 1. Review Linux man pages for arp at www.linuxmanpages.com (in both Sections 7 and 8), the ARP RFC (RFC 826) at www.ietf.org, and Section 3.4 of the IBM Red Book.
More informationWireshark Lab: Ethernet and ARP v6.01
Wireshark Lab: Ethernet and ARP v6.01 Supplement to Computer Networking: A Top-Down Approach, 6 th ed., J.F. Kurose and K.W. Ross Tell me and I forget. Show me and I remember. Involve me and I understand.
More informationAssignment 3 Firewalls
LEIC/MEIC - IST Alameda LEIC/MEIC IST Taguspark Network and Computer Security 2013/2014 Assignment 3 Firewalls Goal: Configure a firewall using iptables and fwbuilder. 1 Introduction This lab assignment
More informationUNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12
UNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12 Due Wednesday, 12/7, at 11:59:59 PM. One s understanding of network protocols can often be greatly deepened by seeing protocols
More informationUse of the TCP/IP Protocols and the OSI Model in Packet Tracer
Communication Networks [Netw501] Spring 2018 Tutorial 3 Packet Tracer Activity 3 Use of the TCP/IP Protocols and the OSI Model in Packet Tracer Introduction: In Packet Tracer simulation mode, detailed
More informationLab Exercise UDP. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise UDP Objective To look at the details of UDP (User Datagram Protocol). UDP is a transport protocol used throughout the Internet as an alternative to TCP when reliability is not required. It
More informationIntro to OpenFlow Tutorial
5/24/2015 GENIExperimenter/Tutorials/OpenFlowOVS GENI: geni Intro to OpenFlow Tutorial Overview: This is a simple OpenFlow tutorial that will guide you through the writing of simple OpenFlow controllers
More informationGenie Snoop lab. Laboration in data communication GenieLab Department of Information Technology, Uppsala University
Genie Snoop lab Laboration in data communication GenieLab Department of Information Technology, Uppsala University Overview This lab deals with network layers, services and HTTP transactions as well as
More informationCSE4344 Project 2 (Spring 2017) Wireshark Lab: HTTP
Objectives CSE4344 Project 2 (Spring 2017) Wireshark Lab: HTTP To get familiar with capturing network packets using Wireshark. To explore the HTTP message formats and basic operations of HTTP protocol.
More informationContents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version...
Contents Note: pay attention to where you are........................................... 1 Note: Plaintext version................................................... 1 Hello World of the Bash shell 2 Accessing
More informationUsing RDP with Azure Linux Virtual Machines
Using RDP with Azure Linux Virtual Machines 1. Create a Linux Virtual Machine with Azure portal Create SSH key pair 1. Install Ubuntu Bash shell by downloading and running bash.exe file as administrator.
More informationAgility2018-TCPdump Documentation
Agility2018-TCPdump Documentation Release.01 David Larsen Aug 10, 2018 Switches 1 F5 tcpdump and Wireshark 3 1.1 tcpdump Switches............................................ 3 1.2 tcpdump Filters..............................................
More informationSecure Communications Over a Network
Secure Communications Over a Network Course: MITS:5400G Proffessor: Dr. Xiaodong Lin By: Geoff Vaughan 100309160 March 20th 2012 Abstract The purpose of this experiment is to transmit an encrypted message
More informationLab Working with Linux Command Line
Introduction In this lab, you will use the Linux command line to manage files and folders and perform some basic administrative tasks. Recommended Equipment A computer with a Linux OS, either installed
More informationA quick tutorial on using tshark
A quick tutorial on using tshark Ross Maloney January 24, 2017 The network sniffing program tshark is the terminal oriented version of the GUI version wireshark. This GUI version was initially called ethereal.
More informationLab 1: Introduction to Linux Networking
CMPE 150: Introduction to Computer Networks Fall 2011 http://courses.soe.ucsc.edu/courses/cmpe150/fall11/01/ Lab 1: Introduction to Linux Networking Materials: Please bring a USB drive to each lab section.
More informationWireshark Lab: HTTP. 1. The Basic HTTP GET/response interaction
Wireshark Lab: HTTP Version: 2.0 (June 2007) 2007 J.F. Kurose, K.W. Ross. All Rights Reserved Computer Networking: A Topdown Approach, 4 th edition. Having gotten our feet wet with the Wireshark packet
More information9. Wireshark I: Protocol Stack and Ethernet
Distributed Systems 205/2016 Lab Simon Razniewski/Florian Klement 9. Wireshark I: Protocol Stack and Ethernet Objective To learn how protocols and layering are represented in packets, and to explore the
More informationThe trace is here: https://kevincurran.org/com320/labs/wireshark/trace-dhcp.pcap
Lab Exercise DHCP Objective To see how DHCP (Dynamic Host Configuration Protocol) works. The trace is here: https://kevincurran.org/com320/labs/wireshark/trace-dhcp.pcap Network Setup Recall that DHCP
More informationVERSION Lab 3: Link Layer
Lab 3: Link Layer Objective In this lab, you will investigate Ethernet and the ARP protocol. You will also prove you are a Wireshark Ninja by dissecting an unknown protocol. Knowledge from Lecture 20 and
More informationLAB THREE STATIC ROUTING
LAB THREE STATIC ROUTING In this lab you will work with four different network topologies. The topology for Parts 1-4 is shown in Figure 3.1. These parts address router configuration on Linux PCs and a
More informationMP 1: HTTP Client + Server Due: Friday, Feb 9th, 11:59pm
MP 1: HTTP Client + Server Due: Friday, Feb 9th, 11:59pm Please read all sections of this document before you begin coding. In this assignment, you will implement a simple HTTP client and server. The client
More informationConfiguring a Palo Alto Firewall in AWS
Configuring a Palo Alto Firewall in AWS Version 1.0 10/19/2015 GRANT CARMICHAEL, MBA, CISSP, RHCA, ITIL For contact information visit Table of Contents The Network Design... 2 Step 1 Building the AWS network...
More informationCS Programming Languages Fall Homework #2
CS 345 - Programming Languages Fall 2010 Homework #2 Due: 2pm CDT (in class), September 30, 2010 Collaboration policy This assignment can be done in teams at most two students. Any cheating (e.g., submitting
More informationJackson State University Department of Computer Science CSC 437/539 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan
Jackson State University Department of Computer Science CSC 437/539 Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan Lab Project # 3: Simulating DHCP Snooping and DNS Cache Poisoning through
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationVPN-against-Firewall Lab: Bypassing Firewalls using VPN
SEED Labs 1 VPN-against-Firewall Lab: Bypassing Firewalls using VPN Copyright c 2016 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation
More informationLab #9: Basic Linux Networking
CTEC1767 Data Communications & Networking 2017 Lab #9: Basic Linux Networking Understanding Linux networks starts with understanding Linux network commands and the information they provide. We will use
More informationLab - Using Wireshark to Examine a UDP DNS Capture
Topology Objectives Part 1: Record a PC s IP Configuration Information Part 2: Use Wireshark to Capture DNS Queries and Responses Part 3: Analyze Captured DNS or UDP Packets Background / Scenario If you
More informationWe want to install putty, an ssh client on the laptops. In the web browser goto:
We want to install putty, an ssh client on the laptops. In the web browser goto: www.chiark.greenend.org.uk/~sgtatham/putty/download.html Under Alternative binary files grab 32 bit putty.exe and put it
More informationIP Addressing, monitoring and packet analyzing
IP Addressing, monitoring and packet analyzing CS-335a Fall 2012 Computer Science Department Manolis Surligas surligas@csd.uoc.gr 1 TCP/IP stack 2 TCP/IP stack At sending: Each layer adds information to
More informationSECURITY+ LAB SERIES. Lab 3: Protocols and Default Network Ports Connecting to a Remote System
SECURITY+ LAB SERIES Lab 3: Protocols and Default Network Ports Connecting to a Remote System Document Version: 2015-09-24 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported
More informationADVANCED COMPUTER NETWORKS Assignment 9: Introduction to OpenFlow
Spring Term 2014 ADVANCED COMPUTER NETWORKS Assignment 9: Introduction to OpenFlow Assigned on: 8 May 2014 Due by: 21 May 2014, 23:59 1 Introduction The goal of this assignment is to give an introduction
More informationLab Using Wireshark to Examine Ethernet Frames
Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with
More informationIntroduction to Wireshark
Introduction to Wireshark CS3C03/SE4C03 Jason Jaskolka Department of Computing and Software Faculty of Engineering McMaster University Hamilton, Ontario, Canada jaskolj@mcmaster.ca Winter 2013 Jason Jaskolka
More informationCOMPUTER NETWORKING LAB EXERCISES (TP) 4
Name 1: Name 2: Group number: COMPUTER NETWORKING LAB EXERCISES (TP) 4 IPV6 December 14, 2009 Abstract In this TP you will revisit some of the basic networking tools that were introduced in TP1, only this
More informationLab 2. All datagrams related to favicon.ico had been ignored. Diagram 1. Diagram 2
Lab 2 All datagrams related to favicon.ico had been ignored. Diagram 1 Diagram 2 1. Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is the server running? According to the diagram
More informationDepartment Of Computer Science
Department Of Computer Science Laboratory Manual Prepared By: Muhammad Nouman Farooq Lecturer and Course Coordinator Course: Network Security (CS-242) Page 1 of 47 Table of Contents Lab 1- Introduction
More informationLab 3.4.2: Managing a Web Server
Topology Diagram Addressing Table Device Interface IP Address Subnet Mask Default Gateway R1-ISP R2-Central Eagle Server S0/0/0 10.10.10.6 255.255.255.252 N/A Fa0/0 192.168.254.253 255.255.255.0 N/A S0/0/0
More informationFirewall Evasion Lab: Bypassing Firewalls using VPN
SEED Labs Firewall Evasion Lab 1 Firewall Evasion Lab: Bypassing Firewalls using Copyright 2018 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science
More informationFundamentals of Linux Platform Security
Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 1 Reconnaissance Tools Roadmap Review of generally
More informationFundamentals of Linux Platform Security. Hands-On Network Security. Roadmap. Security Training Course. Module 1 Reconnaissance Tools
Fundamentals of Linux Platform Security Security Training Course Dr. Charles J. Antonelli The University of Michigan 2012 Hands-On Network Security Module 1 Reconnaissance Tools Roadmap Review of generally
More informationLab Using Wireshark to Examine Ethernet Frames
Topology Objectives Part 1: Examine the Header Fields in an Ethernet II Frame Part 2: Use Wireshark to Capture and Analyze Ethernet Frames Background / Scenario When upper layer protocols communicate with
More informationLAN Setup Reflection
LAN Setup Reflection After the LAN setup, ask yourself some questions: o Does your VM have the correct IP? o Are you able to ping some locations, internal and external? o Are you able to log into other
More informationCapturing & Analyzing Network Traffic: tcpdump/tshark and Wireshark
Capturing & Analyzing Network Traffic: tcpdump/tshark and Wireshark EE 122: Intro to Communication Networks Vern Paxson / Jorge Ortiz / Dilip Anthony Joseph 1 Some slides added from Fei Xu's slides, Small
More informationWireshark Lab: DNS Please note that this exercise is designed for Windows machines. Change the commands accordingly if you are using Linux.
Wireshark Lab: DNS Please note that this exercise is designed for Windows machines. Change the commands accordingly if you are using Linux. Version: 2.0 2007 J.F. Kurose, K.W. Ross. All Rights Reserved
More informationDNS CACHE POISONING LAB
University of Trento Network Security - Malware lab 2 th May 2016 DNS CACHE POISONING LAB GROUP #15: MATTEO FIORANZATO MATTEO MATTIVI ANDREA SIMONELLI MICHELA TESTOLINA DON T CLOSE OR MOVE ANY WINDOW Lab
More informationProblem Set 6 Due: Start of Class, October 26
CS242 Computer Networks Handout # 12 Randy Shull October 19, 2017 Wellesley College Problem Set 6 Due: Start of Class, October 26 Reading: Kurose & Ross, Sections 3.4, 3.5 Wireshark Lab [11] This exercise
More informationWeek Date Teaching Attended 9 Mar 2013 Lab 9: Network Forensics
Week Date Teaching Attended 9 Mar 2013 Lab 9: Network Forensics Aim: The aim of this lab is to further investigate network-based forensic investigations, including network evidence capture and analysis
More informationPacket Capturing with TCPDUMP command in Linux
Packet Capturing with TCPDUMP command in Linux In this tutorial we will be looking into a very well known tool in Linux system administrators tool box. Some times during troubleshooting this tool proves
More informationLab 1: Creating Secure Architectures (Revision)
Lab 1: Creating Secure Architectures (Revision) A Challenge Our challenge is to setup MyBank Incorp, where each of you will be allocated a network and hosts to configure and get on-line (Figure 1). For
More informationThe Wifidog project is an open source captive portal solution It consists of two components:
Captive Portal System typically used by business centers, airports, hotel lobbies, coffee shops, and other venues which offer Wi-Fi hot spots for Internet users It permits to authenticate a client by username
More informationSC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers
SC/CSE 3213 Winter 2013 L8: TCP/IP Overview Sebastian Magierowski York University 1 Outline TCP/IP Reference Model A set of protocols for internetworking The basis of the modern IP Datagram Exchange Examples
More informationDKT 224/3 LAB 2 NETWORK PROTOCOL ANALYZER DATA COMMUNICATION & NETWORK SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK
DKT 224/3 DATA COMMUNICATION & NETWORK LAB 2 NETWORK PROTOCOL ANALYZER SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK Lab #2 2 Lab #2 : Network Protocol Analyzer (Sniffing and Identify Protocol used
More informationDeploy the ExtraHop Discover Appliance in Azure
Deploy the ExtraHop Discover Appliance in Azure Published: 2018-04-20 The following procedures explain how to deploy an ExtraHop Discover virtual appliance in a Microsoft Azure environment. You must have
More informationPrepared By: Eng. Wasan Fraihat
Objectives Taibah University College of Computer Science & Eng. Computer Engineering Department Computer Networks Laboratory CN332 Lab. 1 Cabling & Packet Sniffing Prepared By: Eng. Wasan Fraihat 1. To
More informationProblem Set 10 Due: Start of class December 11
CS242 Computer Networks Handout # 20 Randy Shull December 4, 2017 Wellesley College Problem Set 10 Due: Start of class December 11 Reading: Kurose & Ross, Sections 7.1 7.3, 8.1 8.4 Wireshark Lab [16] Recall
More informationThe trace file is here: https://kevincurran.org/com320/labs/wireshark/trace-udp.pcap
Lab Exercise UDP Objective To look at the details of UDP (User Datagram Protocol). UDP is a transport protocol used throughout the Internet as an alternative to TCP when reliability is not required. It
More informationA Simple Network Analyzer Decoding TCP, UDP, DNS and DHCP headers
A Simple Network Analyzer Decoding TCP, UDP, DNS and DHCP headers Objectives The main objective of this assignment is to gain a deeper understanding of network activities and network packet formats using
More informationMaterial for the Networking lab in EITF25 & EITF45
Material for the Networking lab in EITF25 & EITF45 2016 Preparations In order to succeed with the lab, you must have understood some important parts of the course. Therefore, before you come to the lab
More informationLab 2: Creating Secure Architectures
Lab 2: Creating Secure Architectures A Challenge Our challenge is to setup MyBank Incorp, where each of you will be allocated a network and hosts to configure and get on-line (Figure 1). For this you will
More informationGetting Started. 1 Earlier versions of these labs used the Ethereal packet analyzer. In May 2006, the developer of Ethereal
Getting Started One s understanding of network protocols can often be greatly deepened by seeing protocols in action and by playing around with protocols observing the sequence of messages exchanged between
More informationAssignment 5: Software Defined Networking CS640 Spring 2015
Assignment 5: Software Defined Networking CS640 Spring 2015 Due: Thursday, May 7 at 11pm Overview For this project you will implement two control application for a software defined network (SDN). A layer
More information