SBA 162 - Analyze Traffic With Wireshark
SBA 162 - Analyze Traffic With Wireshark
Wireshark
Version 1.0, August 2023
Introduction
Wireshark is a widely used open-source network protocol analyzer. It is primarily used for
capturing and analyzing the traffic that flows across a computer network. Wireshark allows
users to inspect the data packets exchanged between devices on a network, providing
detailed information about the communication process.
During this module, you have explored different features of Wireshark. In this Skill-Based
Assessment, you will demonstrate your skills in capturing and analyzing network traffic.
Note: As Wireshark constantly evolves, images, functions, and tool locations may differ
slightly from what is displayed here.
Objectives
● Capture network traffic with Wireshark.
● Create a profile.
● Customize the profile.
● Analyze ICMP traffic with Wireshark.
● Analyze DNS traffic with Wireshark.
● Analyze TCP headers with Wireshark.
Page 1 of 13
SBA 162 - Analyze Traffic with Wireshark
Equipment
● A laptop or PC running Windows with Internet connectivity or A Windows Virtual Machine
with Internet connectivity.
● Wireshark Protocol Analyzer installed on the laptop, PC, or virtual machine.
Instructions
Answer the questions and provide screenshots.
a. On your Windows machine, launch the Wireshark program (Do not start the capture
yet).
b. On your Windows machine (the same one you will use to capture network traffic for this
SBA), search for cmd and select Run as administrator from the Command Prompt
App options.
Page 2 of 13
SBA 162 - Analyze Traffic with Wireshark
c. In the Command Prompt, type ipconfig /flushdns and press Enter key.
d. Once you are notified that Windows IP Configuration successfully flushed the DNS
resolver Cache, type arp -d into the Command Prompt and press the Enter key.
e. Back on the Wireshark program, what is the name of the interface you will be using to
capture network traffic?
Page 3 of 13
SBA 162 - Analyze Traffic with Wireshark
Create a profile.
a. Create a new Wireshark profile and name it with your name.
b. Take a screenshot of the Wireshark window displaying your new profile and paste the
image into the box below.
Page 4 of 13
SBA 162 - Analyze Traffic with Wireshark
j. Add a coloring rule for TCP SYNs. The rule should be the second rule after the existing
Bad TCP and should color the background of the TCP SYN packets bright green. Use
the filter tcp.flags.syn == 1
k. Scroll through your packet capture or use a filter to find a TCP 3-way handshake. Take a
screenshot of the Wireshark window displaying a TCP 3-way handshake using your
coloring rule and paste the image into the box below.
Page 5 of 13
SBA 162 - Analyze Traffic with Wireshark
b. Take a screenshot of the result and paste the image into the box below.
e. What is the frame number of the reply to the first ping request?
g. What is the Delta (time) between the first request and reply frames?
h. Compare the Delta between the first request frame and the first reply frame with the first
reply of the ping command in the screenshot you pasted into this file earlier. What can
you conclude?
Page 6 of 13
SBA 162 - Analyze Traffic with Wireshark
i. What is the MAC address of the sending device on the first ping request frame?
j. What is the MAC address of the router used to forward the ping request to 8.8.8.8?
k. What hexadecimal value within the Ethernet II header identifies the IPV4 protocol?
m. Within the Internet Protocol Version 4 section of the packet details (in pane 2), select the
Source Address. This will highlight the bits representing the address in pane 3. Enter the
32 bits representing the IPv4 source address into the box below.
n. What is the decimal value within the Internet Control Message Protocol that signifies an
Echo (ping) request?
o. What is the decimal value within the Internet Control Message Protocol that signifies an
Echo (ping) reply?
Page 7 of 13
SBA 162 - Analyze Traffic with Wireshark
f. What version of the Internet Protocol is used to route the DNS packets?
i. What is the source port number(s) used to send the DNS queries resolving
www.example.com?
k. Navigate into the Domain Name System query in the details section of the capture,
locate the www.example.com name in the A record query, and highlight it. Take a
screenshot of Wireshark displaying the result in all three panes, with the name displayed
as highlighted bits on pane number three.
l. What is the source port number(s) used to send the DNS response(s)?
Page 8 of 13
SBA 162 - Analyze Traffic with Wireshark
m. What IP address(es) are found in the Answers section of the DNS response to an A
record query)?
d. Take a screenshot of Wireshark displaying the TCP 3-way handshake between the client
and the server hosting www.example.com. Paste the image into the box below.
f. What is the port number used by the client for this exchange?
Page 9 of 13
SBA 162 - Analyze Traffic with Wireshark
g. What is the port number used by the server for this exchange?
h. On the first packet of the TCP 3-way handshake, on the details pane, under the
Transmission Control Protocol section, locate and highlight the flag indicating the Syn bit
is set (this is the byte of data that indicates to the receiving device that this is a Syn
request).
i. Using the bits pane, enter the binary value of the flag indicating that this TCP packet is a
Syn request into the box below.
j. On the second packet of the TCP 3-way handshake, on the details pane, under the
Transmission Control Protocol section, locate and highlight the flags indicating that both
the Syn and Ack bits are set (this is the byte of data that indicates to the receiving device
that this is a Syn/Ack TCP packet).
k. Using the bits pane, enter the binary value of the flag indicating that this TCP packet is a
Syn/Ack into the box below.
Page 10 of 13
SBA 162 - Analyze Traffic with Wireshark
c. Select a Client Hello packet. In the details pane, locate the server name under the
Extention: server_name section of the Handshake Protocol within the Client Hello. Take
a screenshot of Wireshark displaying the value www.example.com as the Server Name
(this is one way to ensure you are looking at the correct handshake). Paste the image
into the box below.
d. How many Cipher Suites are supported by the client in this TLS session?
e. List five (5) supported Cipher Suites. Include their name, hexadecimal identifier, and
binary representation (16-bit binary string). Enter your answer into the table below.
f. How many Signature Hash Algorithms are supported by the client in this TLS session?
Page 11 of 13
SBA 162 - Analyze Traffic with Wireshark
a. Search the capture file for an Address Resolution Protocol (ARP) request frame
(destination address is broadcast) with a corresponding ARP reply (destination address
is unicast). Use a filter in Wireshark to display only these two frames.
b. Type the filter you used into the box below.
c. Take a screenshot of Wireshark displaying only the two ARP frames. Paste the image
into the box below.
d. Within the Ethernet II frame, what hexadecimal value signifies that the frame’s payload is
ARP?
e. Within the Address Resolution Protocol (request), what hexadecimal value signifies that
the Protocol type is IPv4?
f. On the Address Resolution Protocol (request) frame, how many bytes of padding does
Ethernet II add at the end of the frame?
Page 12 of 13
SBA 162 - Analyze Traffic with Wireshark
g. What is the value of the bits that make up the padding in the Address Resolution
Protocol (request) frame?
h. On the Address Resolution Protocol (request) frame, what is the hexadecimal value of
the Target MAC address?
a. On the Address Resolution Protocol (request) frame, what is the binary value of the
destination MAC address?
Page 13 of 13