Using Wireshark Answers

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 9
At a glance
Powered by AI
The document discusses using Wireshark, a packet sniffer program, to analyze captured network traffic and reconstruct web pages and images from the data. It provides steps to install Wireshark and use it to view packet details, TCP streams, and save files.

A packet sniffer, also called a network analyzer, is a program that monitors data traveling over a network. It captures network packets and allows them to be analyzed to troubleshoot network issues, investigate attacks, or gather data. It works by putting the network card in promiscuous mode to see all network traffic addressed to it.

To capture network traffic, the computer running the packet sniffer must be physically connected to the network, such as through a hub or switch for a wired network. For a wireless network, the sniffer needs a wireless card that can detect packets within range of the transmitter.

DOM 258: Introduction to Information Security

Ch. 5: Using Wireshark Assignment (ANSWERS)


Assignment Due Date: Sunday, 03/08/09 by 11:59 PM
Total Points: 40 (counts as two lab assignments)
Submission Requirements: paste your answers to the questions in this lab in the body of a
WebCT/Bb mail message (addressed to the instructor only)
Goals of Lab
At the end of this lab, students will be able to:
Describe what a packet sniffer is and does;
Explain where to place a sniffer to capture network traffic; and
Utilize Wireshark to capture data from a live network, analyze the captured traffic, filter,
and reconstruct from captured data.
Student Preparation
Students will need to download and install Wireshark to complete this lab
(www.wireshark.org). Wireshark can run on any Windows XP/Vista, Mac OS X, or Linuxbased system.
Students will also need to download the necessary trace files (AKA captured files) in order to
complete this lab. A link to the trace files (in .ZIP format) is located in WebCT/Bb, Learning
Modules, Ch. 5: Securing the Network Infrastructure, wireshark_trace_files.zip.
Estimated Completion Time
60 Minutes
Data is transmitted over a network using packets. These packets may be captured and
viewed in their raw form by a program called a packet sniffer (or just sniffer for short).
Packet sniffers are invaluable tools for diagnosing network difficulties, dissecting network
attacks, or gathering basic data. Packet sniffers work by placing the network card into
promiscuous mode. Normally, network cards are configured to only pick up and process
packets which are addressed to their specific address. A network card placed into
promiscuous mode will capture all data packets which are sent to it. A properly configured
sniffer program will place the network card into promiscuous mode and write all the captured
traffic to a file for later analysis.
Sniffer Placement
The job of a sniffer is to capture network traffic. In order to accomplish this task, the sniffer
hardware (NIC or wireless card) must be able to see the network packets. In the case of a
wired network, this means that the computer running the sniffing software must be physically
connected to the network via a hub or switch.
Because wireless networks broadcast their packets via radio frequency, this information can
be detected by any computer with a compatible wireless card within range of the transmitter.
In the case of Wireshark, the computer must also be logged onto the wireless network with an
appropriately assigned IP address. Other wireless sniffers (airsnort, airopeek, etc) can be
configured to grab any packet within range of a transmitter.
1

DOM 258: Introduction to Information Security


Ch. 5: Using Wireshark Assignment (ANSWERS)
Make sure your computer is properly connected
to the network to be sniffed.
Open up the Wireshark capture window by
double clicking on the desktop icon.
The Wireshark main window will open up.
The window is divided into 3 sections (from top
to bottom):
PACKET LIST: displays one line
summaries of every packet captured.
PACKET DETAILS: provides a tree-like
interface for viewing the packet currently
highlighted in the PACKET LIST.
PACKET BYTES: shows the raw packet
data of the packet highlighted in the
PACKET LIST.
Open the Capture Options box from the menu.

In the capture dialog box, make sure to select


the correct network interface to listen on (this
should be your wired NIC for this assignment).

DOM 258: Introduction to Information Security


Ch. 5: Using Wireshark Assignment (ANSWERS)
Uncheck the Enable network name resolution
check box. This will prevent Wireshark from
doing inverse DNS queries and thus, adding
traffic back onto the cabling system.
Press the Start button and watch the packets
stream in. NOTE: if you dont see any traffic
being captured, open a Web browser and
connect to a web site.
When you are finished capturing make sure to
save the packets to a .pcap file by clicking:
File -> Save As

You will now begin to gain familiarity using


Wireshark to review captured data (AKA trace
files).
In Wireshark, open a trace file by clicking:
File -> Open
All the trace files for this lab are stored in the
folder where you saved them (e.g., c:\temp).
NOTE: unzip the trace files before using them in
Wireshark.
Browse to the folder where you saved this
assignments trace files and open http.cap.
This capture file shows a basic HTTP session between two computers, including the DNS
lookup, three-way handshake, and GET request for a web page.
Exercise Questions:
1. Which IP address is requesting the web page information? 192.168.6.2
2. What is the FQDN from which the web page is being requested? www.target84.com.
3. What is the IP address of that site? 10.10.10.4
4. List at least 2 services running on www.target84.com DNS, HTTP

DOM 258: Introduction to Information Security


Ch. 5: Using Wireshark Assignment (ANSWERS)
Using Display Filters
Depending on their placement within a network, packet sniffers are capable of capturing all
data passed over a network segment. On a large network, this can potentially result in file
sizes in the gigabyte range. Thus, successfully capturing network packets is only part of the
equation analysis of such a large amount of data can be a daunting task. One option for
limiting data size is to limit the amount of data captured by using capture filters. Another is to
make use of the display filters found in Wireshark for organizing and viewing data.
Open the file: filter_ex.cap
Look at the DNS protocols to see what sites
were looked at.
Look at the HTTP GET packets to see what web
pages have been requested.

Type the following in the Filters window and


note their output
ip.src == 192.168.89.69
ip.addr == 192.168.89.69
http contains search
tcp.port == 80
eth.addr == 00:14:a9:cb:4d:8d

Exercise Questions:
5. Which IP address is requesting the web site(s)? 192.168.89.69
6. What is the MAC address associated with this IP address? 00:03:25:19:29:cc
7. Do you think this is the correct MAC address why or why not? Yes, confirmed
w/Display Filter (eth.addr == 00:03:25:19:29:cc)
8. List three web sites visited by the IP address. www.google.com,
www.crackpassword.com, wwwregnow.com, www.codeproject.com
9. What do you think this person was looking for? Information on how to crack
Windows passwords

DOM 258: Introduction to Information Security


Ch. 5: Using Wireshark Assignment (ANSWERS)
Web Site Reconstruction
Open the file: website1.cap
Clear any display filters.
Right-click on packet #5 and select Follow TCP
Stream from the pull-down menu.

If you are familiar with HTTP code you should


recognize many of the commands and HTML
tags embedded in this text.

This is easy to reconstruct by clicking on the


Save As button in the lower-left hand corner.
The file itself will be saved as a simple ASCII
text so a .txt extension is fine. However, since
you will be using a web browser to open the file,
using an .html extension will make it easier to
open with a web browser.
To view the reconstructed page, open a web
browser and select
File -> Open
Select the recently saved file and see what
happens.

DOM 258: Introduction to Information Security


Ch. 5: Using Wireshark Assignment (ANSWERS)
Exercise Questions:
10. What web site was reconstructed? www.hackaday.com
The same procedure can be used to reconstruct web-based email sessions as well. Use the
same reconstruction procedure to open the file: http_mail.cap and reconstruct the web page.
Exercise Questions:
11. What web based email client is being used? Hotmail
12. Who sent the email? [email protected]
13. What is the username of the login account? Fnulnu1999

DOM 258: Introduction to Information Security


Ch. 5: Using Wireshark Assignment (ANSWERS)
Image Reconstruction
Configure Wireshark to correctly order packets
for image reconstruction (this only needs to be
done once) by clicking:
Edit -> Preferences

Select HTTP from the Protocols heading on the


left-hand window (if it is not visible, then make
sure to click the + sign next to Protocols). On
the right-hand pane, make sure all four boxes
are checked.
Scroll down the left-hand window pane and
highlight TCP. Make sure Allow subdissector to
reassemble TCP streams is checked.

Open the file: web_pic.cap


Use the web site reconstruction procedure from
the previous exercise to reconstruct this web
site. (HINT: try starting with packet 14).

DOM 258: Introduction to Information Security


Ch. 5: Using Wireshark Assignment (ANSWERS)
Select packet 216 in the Packet List window.
You can tell it is an image header because one
of the following entries appears in the Info
column:
JPEG JFIF Image
GF89a

In the Packet Details window, highlight the line


called JPEG File Interchange Format

To save the image file click:


File -> Export -> Selected Packet Bytes

Name the saved file appropriately. If it is a JPEG


file, use a .jpg or .jpeg extension. If it is a GIF
file, use the .gif extension. This will make it
easier to open later.

DOM 258: Introduction to Information Security


Ch. 5: Using Wireshark Assignment (ANSWERS)
Open the newly saved picture file by doubleclicking on it.

Exercise Questions:
14. What is the picture of? Eilean Donan Castle in Scotland
15. What web site did it come from? www.electricscotland.com
16. What IP address requested the web site? 192.168.89.69
17. Bonus qestion: What movie featured the object in this picture? Highlander or The
Ghost Goes West

You might also like