Preview

Wireshark Capture: Network Traffic

Good Essays
Open Document
Open Document
967 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Wireshark Capture: Network Traffic
Wireshark Capture
The first step that needed to be taken in order to start this project was the download of the program Wireshark. In order to download Wireshark all I had to do was access the Wireshark website which was located at http://www.wireshark.org/download.html. Once that the program was loaded I was able to run a session and capture network traffic. When you first run a capture you have to choose which interface you are using. For this situation, I am running off of a wireless access card so I had to choose the “wireless” interface.
Once I started the capture, you immediately see captures of packets scroll down the screen with the different protocols displayed as well as detailed information on what is inside that packet. In figure 1.1 I accessed a website and we can clearly see the 3-way handshake that occurs so I can gain access to that website. My pc sends a SYN request asking permission for access, I then receive and SYN ACK. My computer completes the process by sending an ACK response.

(Figure) 1.1
When I try to gain access to a site that is secure and requires authentication such as a log in screen. I am the TLSV1 Protocol is given. This is a transport layer security protocol which is given when I access an HTTPS website. These protocols provide cryptographic security for all the information that I am sending over this site. All my information is encrypted and cannot be viewed openly by someone using a sniffer on the network. Figure 1.2 shows the capture to the USAA website which required authentication to access.

Figure (1.2) We were given instruction to capture certain packets across our network. The first packet were given is ARP. What this protocol does is that it associates a MAC address with an IP address by broadcasting “who has this IP address”. It then waits for the response. The MAC address of the response is then stored in the ARP table for future references. Below in figure 1.3 is a capture of the ARP protocol from my

You May Also Find These Documents Helpful

  • Powerful Essays

    IS3220 FINAL STUDY GUIDE

    • 1708 Words
    • 7 Pages

    b. SYN-ACK: In response, the server replies with a SYN-ACK. The acknowledgment number is set to one more than the received sequence number, and the sequence number that the server chooses for the packet is another random number.…

    • 1708 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 5 Lab JM

    • 625 Words
    • 5 Pages

    2. If not found build ARP request frame containing MAC address, IP Address, and forwarding IP address.…

    • 625 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1210 Chapter 5.2.6

    • 342 Words
    • 2 Pages

    Step 5: When the targeted device checks the Target Protocol Address, it will find a match and will generate an ARP reply message. It takes the Sender Hardware Address and the Sender Protocol Address fields from the ARP request message and uses these values for the Targeted Hardware Address and Targeted Protocol Address of the reply message.…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Manages information-consistency capacities, i.e., gives a dependable byte stream between two nodes on a system. TCP and UDP exert at this particular level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    100 NT2580 Lab01 Final

    • 287 Words
    • 2 Pages

    In this lab, you explored the common tools available in the virtual lab environment. You used…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Section I: Watch the video on the iLab page about Wireshark and answer the questions below.…

    • 1389 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    ISSC362 lab 7 jarad krum

    • 696 Words
    • 2 Pages

    5. How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What function in Wireshark provides you with a breakdown of the different protocol types on the LAN segment?…

    • 696 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Is317 Lab #3 Questions

    • 430 Words
    • 2 Pages

    It traces the routes packets from the user to the target, it shows a packets hops to the target, and they target the host address.…

    • 430 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    5. How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What function in Wireshark…

    • 2612 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Netw420 Week 5

    • 526 Words
    • 3 Pages

    On this paper I will be talking about and describing the definition of the RMON (Remote Network Monitoring) and how RMON probes are utilized in the network management system to help manager to better manage the network.…

    • 526 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab#1

    • 335 Words
    • 2 Pages

    1. Name at least five applications and tools pre-loaded on the TargetWindows01 server desktop, and identify whether that application starts as a service on the system or must be run manually.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    State the source MAC and IP addresses as well as destination MAC and IP addresses for a packet going from the client to the cache…

    • 2570 Words
    • 11 Pages
    Good Essays
  • Satisfactory Essays

    In this lab, you created and captured traffic from the machines in this lab using tcpdump, a command line…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    3. This tool uses the command-line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lab 5

    • 440 Words
    • 2 Pages

    How many different protocols (layer 3, layer 4, etc.) did your protocol capture session have? What function in Wireshark provides you with a breakdown of the different protocol types on the LAN segment?…

    • 440 Words
    • 2 Pages
    Satisfactory Essays