Task 1: Ping PDU Capture Step 1: After Ensuring That The Standard Lab Topology and Configuration Is
Task 1: Ping PDU Capture Step 1: After Ensuring That The Standard Lab Topology and Configuration Is
Step 1: After ensuring that the standard lab topology and configuration is
correct, launch Wireshark on a computer in a lab pod.
Set the Capture Options as described above in the overview and start the
capture process.
From the command line of the computer, ping the IP address of another network
connected and powered on end device on in the lab topology. In this case, ping
the Eagle Server at using the command ping 192.168.254.254.
After receiving the successful replies to the ping in the command line window,
stop the packet capture.
The Packet List pane on Wireshark should now look something like this:
Step 3: Select (highlight) the first echo request packet on the list with the
mouse.
The Packet Detail pane will now display something similar to:
As you can see, the details for each section and protocol can be expanded
further. Spend some time scrolling through this information. At this stage of the
course, you may not fully understand the information displayed but make a note
of the information you do recognize.
Locate the two different types of 'Source" and "Destination". Why are there two
types? Hay dos tipos diferentes de “Source” y “Destination” porque una
corresponde a la dirección física (MAC) y la otra corresponde a la dirección
lógica (IP).
As you select a line in the Packets Detail pane all or part of the information in
the Packet Bytes pane also becomes highlighted.
For example, if the second line (+ Ethernet II) is highlighted in the Details pane
the Bytes pane now highlights the corresponding values.
This shows the particular binary values that represent that information in the
PDU. At this stage of the course, it is not necessary to understand this
information in detail.
Assuming Wireshark is still running from the previous steps, start packet
capture by clicking on the Start option on the Capture menu of Wireshark.
Userid: anonymous
Password: <ENTER>
You may alternatively use login with userid cisco and with password cisco.
Connected to eagle-server.example.com.
When the file has successfully downloaded, stop the PDU capture in Wireshark.
Step 2: Increase the size of the Wireshark Packet List pane and scroll through
the PDUs listed.
Locate and note those PDUs associated with the file download.
These will be the PDUs from the Layer 4 protocol TCP and the Layer 7 protocol
FTP.
Identify the three groups of PDUs associated with the file transfer.
If you performed the step above, match the packets with the messages and
prompts in the FTP command line window.
The first group is associated with the "connection" phase and logging into the
server.
Response: 220 “Welcome to the Suse ftp server: Please login as user ftp”
Request: USER Anonymous
Response: 331 Please send your email address as a password
Request: PASS
Response: 230 Login successful. Have a lot of fun.
Locate and list examples of messages exchanged in the second phase that is
the actual download request and the data transfer.
The third group of PDUs relate to logging out and "breaking the connection".
List examples of messages exchanged during this process.
Request: QUIT
Response: 221 Goodbye
Locate recurring TCP exchanges throughout the FTP process. What feature of
TCP does this indicate?
TCP crea la conexión con el servidor FTP y se encarga de verificar que los
datos sean entregados en el destino sin errores y en el mismo orden en que
fueron transmitidos. ACK indica que el mensaje ha llegado correctamente.
Select (highlight) a packet on the list associated with the first phase of the FTP
process.
What are the protocols encapsulated in the frame? IP, TCP, FTP
What does this say about the security of this FTP login process? No se nota
ningún tipo de seguridad, ya que al registrarme ingreso como usuario anónimo
y no se me pide ningún tipo de contraseña. Salvo el hecho de que entro como
usuario pasivo y no se me permite modificar ningún archivo existente en el
servidor FTP.
From any pane, locate the packet containing the file name.
Highlight a packet containing the actual file content - note the plain text visible in
the Byte pane.
Highlight and examine, in the Details and Byte panes, some packets exchanged
in the third phase of the file download.
When finished, close the Wireshark file and continue without saving
Task 3: HTTP PDU Capture
Assuming Wireshark is still running from the previous steps, start packet
capture by clicking on the Start option on the Capture menu of Wireshark.
Note: Capture Options do not have to be set if continuing from previous steps of
this lab.
Enter the URL of the Eagle Server of example.com or enter the IP address-
192.168.254.254. When the webpage has fully downloaded, stop the Wireshark
packet capture.
Step 2: Increase the size of the Wireshark Packet List pane and scroll through
the PDUs listed.
Locate and identify the TCP and HTTP packets associated with the webpage
download.
Note the similarity between this message exchange and the FTP exchange.
Step 3: In the Packet List pane, highlight an HTTP packet that has the notation
"(text/html)" in the Info column.
In the Packet Detail pane click on the "+" next to "Line-based text data: html"
When this information expands what is displayed? Nos muestra el código html
de la página cargado en ese paquete, tal como vemos a continuación.
Examine the highlighted portion of the Byte Panel.
When finished close the Wireshark file and continue without saving.
Task 4: Reflection
Task 5: Challenge
Discuss how you could use a protocol analyzer such as Wireshark to:
and