Lab 1: Packet Sniffing and Wireshark

Similar documents
TCP/IP Overview. Basic Networking Concepts. 09/14/11 Basic TCP/IP Networking 1

CSC 4992 Cyber Security Practice

System Programming. Introduction to computer networks

CSC 5991 Cyber Security Prac1ce

CCNA Exploration Network Fundamentals. Chapter 3 Application Layer Functionality and Protocols

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

NETWORK PACKET ANALYSIS PROGRAM

Interconnecting Networks with TCP/IP

Configure Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) Service Settings on a Switch

TCP/IP THE TCP/IP ARCHITECTURE

Faculty of Science and IT Course title. Pre-requisite/corequisite

CIT 380: Securing Computer Systems. Network Security Concepts

Hands-On Ethical Hacking and Network Defense

Network Reference Models

Ethernet / TCP-IP - Training Suite Application level protocols

E&CE 358: Tutorial 1. Instructor: Sherman (Xuemin) Shen TA: Miao Wang

Outline. Inter-Process Communication. IPC across machines: Problems. CSCI 4061 Introduction to Operating Systems

Protocol Layers & Wireshark TDTS11:COMPUTER NETWORKS AND INTERNET PROTOCOLS

Interconnecting Networks with TCP/IP. 2000, Cisco Systems, Inc. 8-1

03 The Internet Model and TCP/IP

Lab: 2. Wireshark Getting Started

Lab Assignment for Chapter 1

Unit 28 Website Production ASSIGNMENT 1

SC/CSE 3213 Winter Sebastian Magierowski York University CSE 3213, W13 L8: TCP/IP. Outline. Forwarding over network and data link layers

Unix Network Programming

Lesson 5 TCP/IP suite, TCP and UDP Protocols. Chapter-4 L05: "Internet of Things ", Raj Kamal, Publs.: McGraw-Hill Education

Wireshark Lab: Getting Started

Wireshark Lab: Getting Started v6.0 Supplement to Computer Networking: A Top-Down Approach, 6th ed., J.F. Kurose and K.W. Ross

ACL Rule Configuration on the WAP371

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

EE 610 Part 2: Encapsulation and network utilities

Wireshark Lab: Getting Started

Network Forensics (wireshark) Cybersecurity HS Summer Camp

Computer Networks. Dr. Abdel Ilah ALshbatat Dept. of Communication and Computer Engineering Faculty of Engineering Tafila Technical University

New York University Computer Science Department Courant Institute of Mathematical Sciences

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

Lab - Using Wireshark to Examine a UDP DNS Capture

Wireshark Lab: Getting Started v6.0

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

BLM6196 COMPUTER NETWORKS AND COMMUNICATION PROTOCOLS

Lab - Using Wireshark to Examine a UDP DNS Capture

Computer Networks Security: intro. CS Computer Systems Security

Wireshark Lab: Getting Started v7.0

Lecture 2. Outline. Layering and Protocols. Network Architecture. Layering and Protocols. Layering and Protocols. Chapter 1 - Foundation

Computer Networks. More on Standards & Protocols Quality of Service. Week 10. College of Information Science and Engineering Ritsumeikan University

Wireshark Lab: Getting Started

PROGRAMMING Kyriacou E. Frederick University Cyprus. Network communication examples

Business Data Networks and Security 10th Edition by Panko Test Bank

TSIN02 - Internetworking

BSc Year 2 Data Communications Lab - Using Wireshark to View Network Traffic. Topology. Objectives. Background / Scenario

Networking Background

DKT 224/3 LAB 2 NETWORK PROTOCOL ANALYZER DATA COMMUNICATION & NETWORK SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK

Introduction to TCP/IP networking

Wireshark Lab: Getting Started v7.0

Goals - to become acquainted with Wireshark, and make some simple packet captures and observations

Networking Basics. EC512 Spring /15/2015 EC512 - Prof. Thomas Skinner 1

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

Network Architecture Models

Review of Important Networking Concepts

3.2 COMMUNICATION AND INTERNET TECHNOLOGIES

Network Programming. Introduction to Sockets. Dr. Thaier Hayajneh. Process Layer. Network Layer. Berkeley API

ECPE / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

Position of IP and other network-layer protocols in TCP/IP protocol suite

Need For Protocol Architecture

University of Maryland Baltimore County Department of Information Systems Spring 2015

Need For Protocol Architecture

precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet protocol (bottom level)

Computer Forensics: Investigating Network Intrusions and Cybercrime, 2nd Edition. Chapter 2 Investigating Network Traffic

Chapter 2 Network Models 2.1

Ethereal Lab: Getting Started

Use of the TCP/IP Protocols and the OSI Model in Packet Tracer

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Using Ethereal As A Tool For Network Security Mentor: Mr. Christopher Edwards Team Members: Jerome Mitchell, Anthony Anderson, and Napoleon Paxton

Copyleft 2005, Binnur Kurt. Objectives

Computer Networks A Simple Network Analyzer PART A undergraduates and graduates PART B graduate students only

Chapter 16 Networking

Wireshark intro. Introduction. Packet sniffer

Computer Communication & Networks / Data Communication & Computer Networks Week # 03

SE 4C03 Winter Final Examination Answer Key. Instructor: William M. Farmer

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 6 OSI MODEL TRANSPORT LAYER

Hands-On TCP/IP Networking

TCP /IP Fundamentals Mr. Cantu

CS 716: Introduction to communication networks. Instructor: Sridhar Iyer Demo by: Swati Patil IIT Bombay

Layer 4: UDP, TCP, and others. based on Chapter 9 of CompTIA Network+ Exam Guide, 4th ed., Mike Meyers

APPENDIX F THE TCP/IP PROTOCOL ARCHITECTURE

Chapter 3: Network Protocols and Communications

Fundamentals of Computer Networking AE6382

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

Introduction to computer networking

When does it work? Packet Sniffers. INFO Lecture 8. Content 24/03/2009

The Transmission Control Protocol (TCP)

Internet. Organization Addresses TCP/IP Protocol stack Forwarding. 1. Use of a globally unique address space based on Internet Addresses

COMS3200/7201 Computer Networks 1 (Version 1.0)

Communicating over the Network

TCP/IP stack is the family of protocols that rule the current internet. While other protocols are also used in computer networks, TCP/IP is by far

TRANSMISSION CONTROL PROTOCOL. ETI 2506 TELECOMMUNICATION SYSTEMS Monday, 7 November 2016

Review of Important Networking Concepts. Recall the Example from last lecture

Ethereal Lab: Getting Started

Genie Snoop lab. Laboration in data communication GenieLab Department of Information Technology, Uppsala University

Networking Revision. TCP/IP Protocol Stack & OSI reference model. Basic Protocols. TCP/IP Model ANTHONY KAO NETWORKING FINAL EXAM SPRING 2014 REVISION

Transcription:

Lab 1: Packet Sniffing and Wireshark Fengwei Zhang Wayne State University Course: Cyber Security Practice 1

Packet Sniffer Packet sniffer is a basic tool for observing network packet exchanges in a computer Capturing ( sniffs ) packets being sent/received from/ by your computer A packet sniffer itself is passive Displaying the contents of the various protocol fields in these captured packets, but never sending packets itself Wayne State University Course: Cyber Security Practice 2

Packet Sniffer Structure Wayne State University Course: Cyber Security Practice 3

Packet Sniffer (cont d) Applications ( web browsers, FTP clients, email clients ) Network protocols (Internet protocol) Packet capture The packet capture library receives a copy of every link-layer frame that is sent from or received by your computer Packet Analyzer Displaying the contents of all fields within a protocol message Understanding the structure of all messages exchanged by protocols IP, TCP, HTTP headers Wireshark, TCPDump Wayne State University Course: Cyber Security Practice 4

TCP/IP Network Stack TCP/IP is the most commonly used network model for Internet services. Because its most important protocols, the Transmission Control Protocol (TCP) and the Internet Protocol (IP) were the first networking protocols defined in this standard, it is named as TCP/IP. It contains multiple layers including: Application layer Transport layer Network layer Data link layer Wayne State University Course: Cyber Security Practice 5

An Example Layered Approach Wayne State University Course: Cyber Security Practice 6

Network Layers Wayne State University Course: Cyber Security Practice 7

Application Layer The application layer includes the protocols used by most applications for providing user services Examples of application layer protocols are Hypertext Transfer Protocol (HTTP), Secure Shell (SSH), File Transfer Protocol (FTP), and Simple Mail Transfer Protocol (SMTP) Wayne State University Course: Cyber Security Practice 8

Transport Layer The transport layer establishes process-to-process connectivity, and it provides end-to-end services that are independent of underlying user data. To implement the process-to-process communication, the protocol introduces a concept of port. The examples of transport layer protocols are Transport Control Protocol (TCP) and User Datagram Protocol (UDP). The TCP provides flow control, connection establishment, and reliable transmission of data, while the UDP is a connectionless transmission model. Wayne State University Course: Cyber Security Practice 9

Internet Layer The Internet layer is responsible for sending packets to across networks. It has two functions: 1) Host identification by using IP addressing system (IPv4 and IPv6); and 2) packets routing from source to destination. The examples of Internet layer protocols are Internet Protocol (IP), Internet Control Message Protocol (ICMP), and Address Resolution Protocol (ARP). Wayne State University Course: Cyber Security Practice 10

Link Layer The link layer defines the networking methods within the scope of the local network link. It is used to move the packets between two hosts on the same link. An common example of link layer protocols is Ethernet. Wayne State University Course: Cyber Security Practice 11

Data Encapsulation in Network Stack Wayne State University Course: Cyber Security Practice 12

Lab 0 Make sure you can login as CSC 4992 student on Zero Client Using your WSU access ID and password Providing VM images for lab experiments Wayne State University Course: Cyber Security Practice 13

Lab 0 (cont d) Subscribe course mailing-list csc4992@lists.wayne.edu List Home page (web interface for subscribers to join/ leave list, post messages, view archives): http://lists.wayne.edu Send an email to the list to introduce yourself by next class Send a zipped test.txt file on Backboard by this week Wayne State University Course: Cyber Security Practice 14