Lab 8: Network Packet Inspection: Ethernet, IP and TCP
Lab 8: Network Packet Inspection: Ethernet, IP and TCP
http://asecuritysite.com/csn11128/nets
And make sure that all your hosts can connect to Google.com.
http://asecuritysite.com/log/webpage.zip
Host src TCP port (Hint: Examine the Source Port on Packet 3):
Server src TCP port (Hint: Examine the Destination Port on Packet 3):
What is the MAC address of the server (Hint: Examine the reply for Packet 2), and which is the manufacturer of the network card:
1
What is the MAC address of the host contacting the server, and which is the manufacturer of the network card:
Identify the packets used for the SYN, SYN/ACK and ACK sequence. Which packets are these:
In Packet 1, which is the destination MAC address used in the ARP request?
Using the filter of tcp.flags.syn==1, find all the packets that involve a SYN flag. What are there IDs?
http://asecuritysite.com/log/googleWeb.zip
In this case a host connects to the Google Web server. Determine the following:
What is the MAC address of the host contacting the server, and which is the manufacturer of the network card:
2
What is the IP address of the local gateway?
What is the MAC address of the local gateway, and which is the manufacturer of the network card:
Identify the packets used for the SYN, SYN/ACK and ACK sequence. Which packets are these:
By tracing the TCP stream, can you view the contents of the CSS file? Give an example of some of the text in it?
L1.3 Start capturing network packets on your main network adapter. Next go to intel.com, and access the page. Stop the network capture, and
then from your network traffic, determine:
Apart from your network traffic, can you see other traffic from other hosts on the network? If so, which type of network traffic do you
see?
3
L1.4 Download the following file, and open it up in Wireshark:
http://asecuritysite.com/log/webpage.zip
Using the filter of http.request.method=="GET", identify the files that the host gets from the Web server:
Using the filter of http.response, determine the response codes. Which files have transferred and which have been unsuccessful?
Which is the default file name on the server when the user accesses the top levels of the domain?
http://asecuritysite.com/log/googleWeb.zip
In this case a host connects to the Google Web server. Determine the following:
4
Using the filter of http.request.method=="GET", identify the files that the host gets from the Web server:
Using the filter of http.response, determine the response codes. Which files have transferred and which have been unsuccessful?
Which is the default file name on the server when the user accesses the top levels of the domain?
L1.6 Start capturing network packets on your main network adapter. Next go to intel.com, and access the page. Stop the network capture, and
then from your network traffic, determine:
Using the filter of http.request.method=="GET", identify the files that the host gets from the Web server:
Using the filter of http.response, determine the response codes. Which files have transferred and which have been unsuccessful?
Which is the default file name on the server when the user accesses the top levels of the domain?
5
Which language/character set is used by the client?
http://asecuritysite.com/log/dnslookup.zip
The last request is for class of AAAA. What is the AAAA class?
http://asecuritysite.com/log/ftp2.zip
6
Using the filter of ftp.command, determine the FTP commands that the user has used:
Using the filter of ftp.response, determine the FTP codes that have been returned:
What is the username and password for the access to the FTP server:
Using the filter of ftp.request.command=="LIST", determine the first packet number which performs a “LIST”:
In performing in the list of the files on the FTP server, which TCP is used on the server for the transfer:
From the final “LIST” command, which are the files on the server?
What does the filter ftp.response.code==227, identify in terms of the ports that are used for the transfer:
7
The demo of this lab is at: http://youtu.be/T_jrAwZfE74
http://asecuritysite.com/log/webpage.zip
By examining the ARP request and reply. What is the IP and MAC address of the server for the host:
http://asecuritysite.com/log/googleWeb.zip
In this case a host connects to the Google Web server. Determine the following:
By examining the ARP request and reply. What is the IP and MAC address of the gateway for the host:
http://asecuritysite.com/log/arp_scan.zip
8
This was generated by an intruder.
What can say about whether this is an inside intruder or an external one?
Which nodes did the intruder find where connected to the network?
http://asecuritysite.com/log/smtp.zip
The IP address and TCP port used by the host which is sending the email:
The IP address and the TCP port used by the SMTP server:
9
When was the email client used to send the email:
What was the message, and what was the subject of the email:
http://asecuritysite.com/log/pop3.zip
The IP address and TCP port used by the host which is sending the email:
The IP address and the TCP port used by the POP-3 server:
1 5565
2 8412
3 xxxx
Which is the ID for message 3:
For Message 1, who sent the message and what is the subject and outline the content of the message:
For Message 2, who sent the message and what is the subject and outline the content of the message:
10
For Message 3, who sent the message and what is the subject and outline the content of the message:
http://asecuritysite.com/log/imap.zip
The IP address and TCP port used by the host which is sending the email:
The IP address(es) and the TCP ports used by the SMTP and the IMAP server:
Trace the email message that has been sent for its basic details:
11