Lab 12 CN
Lab 12 CN
Lab Manual
Course CSC-251L- Computer Networks - Lab
Instructor Muzamil Ahmed Session / Semester 2022-2026 (5th)
Lecture # 12
Name Zunaira Akbar
Reg # NUM-BSCS-2022-34
Lab Tasks
3. Observations:
o Record the total number of packets captured.
The most frequently used protocol in the capture is ARP (Address Resolution Protocol), which is
evident from the numerous ARP requests and replies present in the packet list. ARP packets are used
for mapping IP addresses to MAC addresses within the local network.
The captured network traffic reveals numerous repeated ARP requests for the same IP addresses,
particularly for 172.16.17.121 and 172.16.14.161, which may indicate potential issues such as ARP
spoofing, where an attacker could be attempting to intercept network traffic by sending misleading
ARP messages, or network congestion caused by devices repeatedly trying to resolve the same
addresses without success. Additionally, noticeable spikes in DHCP requests towards the end of the
capture suggest that devices are attempting to connect to the network and obtain IP addresses from the
DHCP server. While this behavior can be normal, frequent spikes may necessitate further
investigation into the DHCP server's configuration or the overall stability of the network.
Task 2: Analysing DNS Traffic CLO-1, CLO-2, CLO-3
1. Objective: Capture and analyse DNS traffic to understand the process of domain name
resolution.
2. Steps:
o Open Wireshark and start capturing on your active network interface.
o Open a browser and visit three different websites (e.g., example.com, bbc.com,
github.com).
o Stop the capture.
o Apply the filter dns in Wireshark to isolate DNS packets.
3. Observations:
o Identify the DNS query type (e.g., A, AAAA, or CNAME records).
For the domain dns.google, the resolved IP addresses are 8.8.8.8 and 8.8.4.4.
For assets.msn.com, the resolved IP addresses are 23.55.44.112 and 23.55.44.104, with CNAMEs
pointing to assets.msn.com.edgekey.net and e28578.d.akamaiedge.net.
The domain wpad.microsoft.com returned a "No such name" response, indicating that it does not
exist in the DNS records.
For crt.sectigo.com, the resolved IP addresses are 104.18.38.233 and 172.64.149.23, with a CNAME
pointing to crt.comodoca.com.cdn.cloudflare.net.
There are instances of retransmitted DNS queries, particularly for the domain assets.msn.com. The
same query is sent multiple times, likely due to the initial response being delayed or not received.
The behaviour of cached responses can be inferred from the presence of multiple queries for the same
domain. For example, the queries for dns.google and assets.msn.com show that the client is
attempting to resolve these domains multiple times, which may indicate that the responses are not
being cached effectively.
In contrast, when a DNS response is received, it often includes multiple A records or CNAMEs,
suggesting that the DNS server is providing cached information to reduce lookup times for frequently
accessed domains.
Task 3: ICMP Traffic Analysis CLO-1, CLO-2, CLO-3
1. Objective: Capture and analyse ICMP traffic to understand the role of ping in network
troubleshooting.
2. Steps:
o Start Wireshark on your network interface.
o Open a command prompt or terminal and execute the ping command for three
different IP addresses (e.g., your gateway, a DNS server, and a public website).
3. Observations:
o Record the packet structure of ICMP Echo Request and Echo Reply messages.
Code: 0
Sequence Number: A number that helps match requests with replies (e.g., seq=1/256).
TTL (Time to Live): Indicates the maximum number of hops the packet can take (e.g., ttl=128).
Code: 0
Dropped Packets:
There were 0% packet loss for all destinations, indicating that all sent packets received replies.
Unusual Latency:
The response times for the local gateway (4-6ms) are very low, indicating a quick response. The
public DNS (40ms) and Google website (43-45ms) responses are higher but still reasonable for
external requests. No significant latency issues were observed.
ICMP (Internet Control Message Protocol) is an essential tool for network diagnostics, primarily
using the ping command. It enables users to check connectivity by sending Echo Requests and
receiving Echo Replies, which confirms whether a device is reachable. Additionally, it measures
response times, providing insights into the speed and performance of the network connection. If
packets are lost or response times are high, it can indicate potential issues such as network congestion,
misconfigurations, or connectivity problems. Overall, ICMP assists in troubleshooting by helping to
identify where issues may exist, whether within the local network or with external connections.
1. Objective: Observe the behaviour of FTP (File Transfer Protocol) traffic in a controlled
environment.
2. Steps:
o Start Wireshark on your local network interface.
o Use an FTP client (e.g., FileZilla) to connect to a public FTP server (e.g.,
ftp.dlptest.com).
o Log in using the credentials provided by the server, download a file, and upload a
file.
3. Observations:
o Identify the FTP control and data channel traffic.
Connection Establishment:
Login Commands:
The data channel is used for transferring files. This traffic can be identified by commands
like RETR (retrieve) and STOR (store).
Response: 150 Opening BINARY mode data connection for upload.txt (102400 bytes).
o Observe login credentials and file transfers (note that FTP traffic is unencrypted).
Login Credentials:
File Transfers:
Response: 150 Opening BINARY mode data connection for upload.txt (102400 bytes).
The sizes of the files being transferred (e.g., 102400 bytes) are also noted.
o Reflect on the security risks of using FTP versus secure alternatives like SFTP or
FTPS.
FTP transmits data, including login credentials, in plain text, making it vulnerable to
eavesdropping and man-in-the-middle attacks, where attackers can intercept and read
the transmitted data. Without encryption, sensitive information can be easily captured
by malicious actors on the same network or through compromised routers, posing
significant security risks.
1. Objective: Capture and analyse DHCP (Dynamic Host Configuration Protocol) traffic during
an IP address lease.
2. Steps:
o Open Wireshark and start capturing on your local network.
o Disconnect and reconnect to your network to initiate a DHCP process.
o Stop the capture.
o Apply the filter dhcp in Wireshark.
DHCP Discover:
The first packet in your capture is a DHCP Request from 0.0.0.0 to 255.255.255.255:
This packet indicates that the client is looking for a DHCP server to obtain an IP address.
DHCP Offer:
This packet indicates that the DHCP server (with IP 172.16.0.3) is acknowledging the request and
offering an IP address to the client.
DHCP Request:
The DHCP Request packet is indicated by the first packet you provided, which is the client's request
for an IP address.
DHCP Acknowledge:
The packet with the DHCP ACK indicates that the server has confirmed the assignment of the IP
address to the client.
The packets with DHCP NAK indicate that the DHCP server is denying the request for an IP address:
This suggests that the server is unable to fulfill the request for the specified transaction IDs.
o Record the IP address assigned to your device and the lease duration.
The assigned IP address is indicated by the DHCP ACK packet from 172.16.0.3, which confirms that
the server has allocated an IP address to the client; however, the specific address is not explicitly
mentioned in the provided packets. Typically, the assigned IP address can be found in the details of
the DHCP Offer or ACK packet. Additionally, the lease duration, which specifies how long the IP
address is valid, is usually included in the DHCP Offer or ACK packet as well. If this information is
not visible in the provided data, it can be checked in the full details of the DHCP ACK packet within
Wireshark.
DHCP automates the assignment of IP addresses to devices on a network, removing the need for
manual configuration. When a device connects, it sends a DHCP Discover packet to find a DHCP
server, which responds with an Offer. The device then requests the offered IP address, and the server
acknowledges this request, completing the lease process. This automation simplifies network
management, minimizes the risk of IP address conflicts, and allows devices to join the network
seamlessly. Additionally, DHCP supports dynamic IP address allocation, making it especially
beneficial in environments where devices frequently connect and disconnect.
Conclusion:
From this lab, we explored various aspects of network traffic analysis, focusing on DNS, ICMP, FTP,
and DHCP protocols. Using tools like Wireshark, we gained valuable insights into the operation and
packet structures of these protocols, as well as the risks associated with unencrypted traffic. We
emphasized the significance of automation in network management, particularly through DHCP,
which streamlines IP address allocation. Overall, the analyses conducted highlight the essential role of
network protocols in facilitating efficient and secure communication in contemporary networks.