Cnet Lab week2_Fall24
Cnet Lab week2_Fall24
What is Wireshark?
Wireshark is an open-source network protocol analysis software program, widely considered the industry standard. A
global organization of network specialists and software developers supports Wireshark and continues to make updates
for new network technologies and encryption methods. Government agencies, corporations, non-profits, and
educational institutions use Wireshark for troubleshooting and teaching purposes. There truly isn’t a better way to learn
low-level networking than to look at traffic under the Wireshark microscope. You should only use Wireshark on networks
where you have permission to inspect network packets. Using Wireshark to look at packets without permission is illegal.
You can select one or more of the network interfaces using shift+left-click. Once select the network interface, you can
start the capture, and there are several ways to do that. Click the first button on the toolbar, titled “Start capturing
packets.”
During the capture, Wireshark will show you the packets captured in real-time.
National University of Computer & Emerging Sciences (NUCES), Islamabad
Once you have captured all the packets needed, use the red button (next to the start one) or menu options to stop the
capture as you did to begin. Best practice dictates stopping Wireshark’s packet capture before analysis.
When looking at a packet that is part of a conversation, you can right-click the packet and select Follow to see only the
packets that are part of that conversation.
Analysts even build filters to detect specific attacks, like this filter used to detect the Sasser worm:
• ls_ads.opnum==0x09
National University of Computer & Emerging Sciences (NUCES), Islamabad
Step 5: Click on any one of the pc, go to desktop and click on web browser.
Step 6: Type in the ip address of the server, back slash, and the name of the chosen file
Like: 192.168.1.10/image.html
Step 3: Click on the server, and go to the services, and select DHCP.
Step 6: Change the pool name, assign a starting IP address making sure it is from the same network as the ip address of
the server and the PCs. Assign total number of users according to need.
Step 8: Go to the first system, and then go to the desktop portion, and then the IP configuration. Click on the DHCP option
rather than the Static one. After a few moments the server will assign a IP address from the pool and a successful message
will be shown. This is how we assign dynamic IP addresses to a System from the server.
National University of Computer & Emerging Sciences (NUCES), Islamabad
Practice Tasks
Task 1:
Answer the following questions for the assigned website:
1. Is your browser running HTTP version 1.0 or 1.1?
2. What languages (if any) does your browser indicate that it can accept to the server?
3. What is the IP address of your computer and the website?
4. What is the status code returned from the server to your browser?
5. When was the HTML file that you are retrieving last modified at the server?
6. How many bytes of content are being returned to your browser?
7. By inspecting the raw data in the packet content window, do you see any headers within the data that
are not displayed in the packet-listing window? If so, name one.
8. Which packet number in the trace contains the status code and phrase associated with the response
to the HTTP GET request?
9. What is the status code and phrase in the response?
10. When your browser’s sends the HTTP GET message for the second time, what new field is included in
the HTTP GET message?
For this specific question, you are required to answer the question on a word or pdf file. Attach the screenshot
of the Packets captured screen from Wireshark, and then answer the questions.
Task 2:
Construct a client server model that have 6 hosts, assign them IP address and subnet masks dynamically from
the server. Moreover, access the HTTP server from the client and show the results. You need to upload a
simple html file and access that specific file.
Task 3:
Construct a client server model that have 9 hosts, three of them are computers, and other six host will be
laptops, in which further connected to 2 switches, assign them IP address and subnet masks dynamically from
the server. Moreover, access the HTTP server from the client and show the results.
Submission Guidelines :
1. Do not zip your tasks, upload your tasks separately on GCR with naming convention :
rollNumber_TaskNumber.pkt, along with the screenshot of the topology with the successful message.
2. Pledgerism will result in ZERO marks.
3. No late submission will be marked.