Network Forensics (wireshark) Cybersecurity HS Summer Camp

Similar documents
Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross

Wireshark Lab: Getting Started

Wireshark Lab: Getting Started

Wireshark Lab: Getting Started v7.0

Lab: 2. Wireshark Getting Started

Wireshark Lab: Getting Started v6.0

Wireshark Lab: Getting Started

Ethereal Lab: Getting Started

Ethereal Lab: Getting Started

Lab 1: Packet Sniffing and Wireshark

University of Maryland Baltimore County Department of Information Systems Spring 2015

Prepared By: Eng. Wasan Fraihat

Goals - to become acquainted with Wireshark, and make some simple packet captures and observations

Getting Wireshark. Detailed installing steps can be found on the Internet, so this tutorial won t cover this part.

Wireshark Lab: Getting Started v6.0

Wireshark Lab: Getting Started v7.0

Wireshark intro. Introduction. Packet sniffer

New York University Computer Science Department Courant Institute of Mathematical Sciences

UNI CS 3470 Networking Project 5: Using Wireshark to Analyze Packet Traces 12

Lab - Using Wireshark to Examine a UDP DNS Capture

How to connect to XBox Live ±via. BiPAC-72,73 Series? How To Connect Xbox 360 Game Consoles to the Router by Ethernet cable (RJ45)?

Lab - Using Wireshark to Examine a UDP DNS Capture

CIT 380: Securing Computer Systems. Network Security Concepts

Lab Using Wireshark to Examine Ethernet Frames

Lab Assignment for Chapter 1

Lab Using Wireshark to Examine Ethernet Frames

DKT 224/3 LAB 2 NETWORK PROTOCOL ANALYZER DATA COMMUNICATION & NETWORK SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK

Project points. CSE422 Computer Networking Spring 2018

ICS 351: Networking Protocols

Submit your captured trace file from the TCP lab exercise (Section 1 describes how this can be done).

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Getting Started. 1 Earlier versions of these labs used the Ethereal packet analyzer. In May 2006, the developer of Ethereal

Department Of Computer Science

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Nonconventional Network Security Measures for Intrusion Detection

IT 341: Introduction to System

Wireshark Dissector for PCAN-Gateways IPEH , IPEH ,IPEH (A) User Manual. Document version 1.0 ( )

Using Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton

Introduction to Wireshark

Introduction to Wireshark

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

HW/Lab 4: IPSec and Wireless Security. CS 336/536: Computer Network Security DUE 11 am on 12/01/2014 (Monday)

Wireless Network Security

2016 Braindump2go Valid Cisco Exam Preparation Materials:

IP Network Troubleshooting Part 3. Wayne M. Pecena, CPBE, CBNE Texas A&M University Educational Broadcast Services - KAMU

CS1302 / Computer Networks

On the left hand side of the screen, click on Setup Wizard and go through the Wizard.

TCP/IP and the OSI Model

Lab 5 Packet Capture Traffic Analysis With Wireshark

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Networking Background

HAI Network Communication Protocol Description

Computer Networks Security: intro. CS Computer Systems Security

Wireshark Lab: DHCP. DHCP Experiment

COEN 445 Lab 8 Wireshark Lab: DHCP

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

Hands-On Ethical Hacking and Network Defense

CSIBridge: Computer Science for Digital Forensics and Cyber Security

Digital forensics Technical Fundamentals. Saurabh Singh

Network Security. Thierry Sans

Wireless LAN Security (RM12/2002)

Protocol Analysis: Capturing Packets

9. Wireshark I: Protocol Stack and Ethernet

Problem Set 9 Due: Start of class, December 4

The OSI Model. Open Systems Interconnection (OSI). Developed by the International Organization for Standardization (ISO).

HP M n Access Point Configuration and Administration Guide

COMP2330 Data Communications and Networking

Advanced Computer Networking. CYBR 230 Jeff Shafer University of the Pacific. Project 2

Configuring the WT-4 for Upload to a Computer (Ad-hoc Mode)

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer

Objectives: (1) To learn to capture and analyze packets using wireshark. (2) To learn how protocols and layering are represented in packets.

Configuring the WT-4 for ftp (Infrastructure Mode)

CyberP3i Hands-on Lab Series

Presenter. Xiaolong Li, Assistant Professor Department of Industrial and Engineering Technology Morehead State University

To make a difference between logical address (IP address), which is used at the network layer, and physical address (MAC address),which is used at

Local Area Networks and the Network Protocol Stack

VERSION Lab 3: Link Layer

CS118 Discussion 1A, Week 9. Zengwen Yuan Dodd Hall 78, Friday 10:00 11:50 a.m.

SJTU 2018 Fall Computer Networking. Wireless Communication

CE3005: Computer Networks Laboratory 3 SNIFFING AND ANALYSING NETWORK PACKETS

Chapter 4 Advanced Settings and Features

Experiment 2: Wireshark as a Network Protocol Analyzer

Wireshark HTTP. Introduction. The Basic HTTP GET/response interaction

Configuring Wireless Security Settings on the RV130W

Security SSID Selection: Broadcast SSID:

Cisco Nexus 7000 Series Architecture: Built-in Wireshark Capability for Network Visibility and Control

Connecting to the Network

BSc (Hons) Business Information Systems, BSc (Hons) Computer Science with Network Security. Cohort: BIS/16B/FT & BCNS/16B/FT

CONTENTS IN DETAIL ACKNOWLEDGMENTS INTRODUCTION 1 PACKET ANALYSIS AND NETWORK BASICS 1 2 TAPPING INTO THE WIRE 17 3 INTRODUCTION TO WIRESHARK 35

Wireless Security Guide (for Windows XP, Windows Vista, Windows 7, Mac OSx)

KINGS COLLEGE OF ENGINEERING DEPARTMENT OF ELECTRONICS AND COMMUNICATION ENGINEERING B.E. ECE UNIT I DATA COMMUNICATION PART A

Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on

Defining Networks with the OSI Model. Module 2

A5500 Configuration Guide

Evaluation of the Effect of Wireshark-based Laboratories on Increasing Student Understanding of Learning Outcomes in a Data Communications Course

COS 140: Foundations of Computer Science

CS513/EE506/CS4514 Intro to Local and Wide Area Networks WPI, Summer 2006

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. Managing a HTTP request. transport session. Step 1 - opening transport

BABU MADHAV INSTITUTE OF INFORMATION TECHNOLOGY, UTU 2017

1: Review Of Semester Provide an overview of encapsulation.

Transcription:

Network Forensics (wireshark) Cybersecurity HS Summer Camp

Packet Sniffer a packet sniffer captures ( sniffs ) messages being sent/received from/by your computer; it will also typically store and/or display the contents of the various protocol fields in these captured messages.

Packet sniffer structure The packet capture (pcap) library receives a copy of every link-layer frame that is sent from or received by your computer.

Packet sniffer structure The packet analyzer displays the contents of all fields within a protocol message

Wireshark Wireshark is the world's foremost network protocol analyzer. It is the de facto (and often de jure) standard across many industries and educational institutions. https://www.wireshark.org/

Wireshark?

Initial wireshark screen

Wireshark components Command menus Filters

Command menus Standard pulldown menus Of interest to us now are the File and Capture menus The File menu allows you to save captured packet data or open a file containing previously captured packet data

Wireshark components Command menus Filters List of captured packets

Packet listing window displays a one-line summary for each packet captured the time at which the packet was captured the packet s source and destination addresses the protocol type, and protocol-specific information contained in the packet.

Wireshark components Command menus Filters List of captured packets Details of selected packet

Packet Header detail window provides details about the packet selected (highlighted) in the packetlisting window. These details include information about the Ethernet frame and IP datagram that contains this packet. If the packet has been carried over TCP or UDP, TCP or UDP details will also be displayed

Wireshark components Command menus Filters List of captured packets Details of selected packet Packet content in hex and ASCII

packet-contents window Displays the entire contents of the captured frame, in both ASCII and hexadecimal format

Broadcast channels In the past network devices known as hubs broadcasted all the packets it received to all the machines connected. Such devices were substituted by switches that do not broadcast the packets. Therefore you can only listen to broadcast packets, and packets destined to your computer.

Broadcast channels Many switches can be configured to assign one or more of its ports as a mirror port. Such mirror port receives copies of all the packets received in the switch.

Broadcast channels WiFi Channels are by default broadcast channels. You can t control the direction of frequency waves. Thus all the packets in a Wireless router are received in all the wireless network interfaces. However modern WiFi protocols encrypt the packets in such a way that you do receive the packets but they can t be interpreted by all the machines.

Broadcast channels The WEP protocol use the same encryption key for all the packets in its network, thus all the computers connected to the same WEP WiFi router can see all the packets in the network. WPA and WPA2 use different encryption keys per computer in the network, therefore it is hard or impossible to decrypt the packets of other computers.

Broadcast channels The WEP protocol is the most vulnerable WiFi protocol and it is very easy to steal the key needed to join the network.