Lab 06
Lab 06
Lab 06
Introduction to Wireshark
HTTP and DNS on Wireshark
Lab Manual 11
Objectives
DNS
HTTP on Wireshark
Tracing DNS with Wireshark
Lab Graded Task
Reference Material
Introduction to Wireshark
Wireshark, a network analysis tool formerly known as Ethereal, captures packets in real time and
display them in human-readable format. Wireshark includes filters, color-coding and other
features that let you dig deep into network traffic and inspect individual packets.
DNS Records
DNS servers store resource records (RR)
Each DNS Reply carries one/more RRs
RR format: (name, value, type, ttl)
Lab Tasks
Task 1. Explore the packets you captured from test run and answer the following questions
[30 Marks]
1. List up to 4 different protocols that appear in the protocol column in the unfiltered
packet-listing window.
3. Was the second Get Request successful? How can you tell it from the corresponding
response packet?
By looking at the information in the HTTP GET and Response Messages for both the HTTP
Requests, answer the following questions
4. Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is the server
running?
5. What languages (if any) does your browser indicate that it can accept to the server?
8. What is sending and receiving Port Number? What does Port No. 80 represents
9. When was the HTML file, that you are retrieving, last modified at the server?
10. How many bytes of total packet content are being returned to your browser?
Note: Make a Word file and post the screen shots of all the answers in it. Apart from the
answers explore different settings of wireshark, analyze all the layers of the HTTP Packets
and try to understand how layering system works in Computer Networks. Implement
different filters in your data to view different grouping of packets. Make yourself familiar
with the software as we will be using it in the next labs frequently.
Task 1. Tracing DNS with Wireshark [20 Mark]
First, capture the DNS packets that are generated by ordinary Web surfing activity.
Use ipconfig to empty the DNS cache in your host.
Open your browser and empty your browser cache. (With Internet Explorer, go to Tools
menu and select Internet Options; then in the General tab select Delete Files.)
Open Wireshark and enter “ip.addr == your_IP_address” into the filter, where you obtain
your_IP_address (the IP address for the computer on which you are running Wireshark) with
ipconfig. This filter removes all packets that neither originate nor are destined to your host.
Start packet capture in Wireshark.
With your browser, visit the Web page: http://www.ietf.org
Stop packet capture.
2. What is the destination port for the DNS query message? What is the source port of DNS
response message?
3. Examine the DNS query message. What “Type” of DNS query is it? Does the query
message contain any “answers”?
4. Examine the DNS response message. How many “answers” are provided? What does
each of these answers contain?