Lab_1__CNS_
Lab_1__CNS_
Lab 1
Description. This lab is an introduction to Wireshark, a powerful packet capture (sniffer) and
analyzer. You will use Wireshark to capture various types of communications and use Wire-
shark’s protocol dissectors to inspect each packet with respect to the protocols’ specifications.
Prerequisites
To rock this lab out, make sure to have:
• Two computers running GNU/Linux (or one VM plus your host machine).
2. Make sure the network interface you are connecting with is set to promiscuous mode.
2. On Wireshark, you should see some ICMP packets along with other packets. Stop it.
3. On the filter bar, type in icmp, so that only ICMP transactions are displayed.
4. The command you executed on Step 1, generated some “Echo (ping) request” packets,
and some “Echo (ping) response” packets. Those are ICMP packets.
Copyright © Dr. Karim Lounis, 2024/2025.
5. Go over the captured packets and answer the following questions:
• What is the source and destination IP address?
• What is the TTL value of your ping requests and ping responses?
• The source address will be Natted. What would be the assigned communication port?
6. Run $ping 192.168.1.55 (an address that is not used in your network), and run the
packet capture on Wireshark. You should see some ARP packets. Stop the packet capture
and answer these questions:
• What is the destination address?
• What is this packet used for?
• Were there responses to those ARP packets? why?
7. Let us add one line in the sysctl file. $sudo nano /etc/sysctl.conf.
11. Ask a classmate to ping your computer and capture the packets using Wireshark.
• Do you receive ICMP responses?
• Explain what happened although your machine is up and running.
2. On Wireshark, you should see some DNS packets along with other packets.
3. On the filter bar, type is dns, so that only DNS transactions are displayed.
4. The command you executed on Step 1, generated a “Standard DNS query for an A-record”,
and a “Standard DNS response with an A-record”.
ANNEX