This lab aims to:
telnet server, an
ftp server and a web server, an Ethernet hub and patch panel. You
will also use a packet capture tool to provide data dumps of the traffic
being carried on the network. Analysis of these dump files will help you
understand the nature of datagram based network communication and the
layering of network protocols.Figure 1 - Network Configuration
->
Control Panel -> Network and Internal Connections ->
Network Connectionsping 10.27.x.20
- to make sure you can communicate with yourselfping 10.27.x.1
- to make sure you can communicate with the serverping 10.27.0.8 - to make sure you can
communicate with the printertelnet daemon. Use telnet to log in to
alice's account on the Server VM.
alice
, with the password: secretlogout
-> Printers and Faxes ->Add a printer to start the
Add Printer Wizard. You want to add a network printer.URL:
http://10.27.0.8Have Disk. Enter: C:\Lexmark .
Select Lexmark E360dn PS3windump is a port of the popular tcpdump.
You will use windump to capture and analyze network
traffic. Run the windump program in a Command Prompt
shell. First run windump with the -D switch to
discover the names and numbers of the network interfaces on your computer
(eg. windump -D); note that case matters. You will also notice
that the adapters listed by Windows are "cryptic", however only the External
adapter should be enabled at this stage. windump -Dwindump
-D again; you should now be able record the first four bytes
of the Internal adapter: ______________________windump.
The good news is that the unix/linux equivalent to windump,
called tcpdump, is much clearer in how it identifies
interfaces.-i switch to specify the adapter to use
as follows: windump -i 2Internal adapter. Since there is
only one adapter we can use windump without specifying
the adapter with the -i switch; it will default to the
single (External) adapter.windump and suppress host and port number lookup
using the -n switch windump -nwindump, what happens if the -n
switch is omitted? telnet session to
communicate over the network with the Server VM
using user alice as before.telnet 10.27.x.1windump.
Intermingled with the telnet packets you might also notice a
good deal of other network traffic. This traffic is likely associated
with some of the built-in services of the Windows operating system.
There may also be packets associated with the other student's computers on
the network. windump has a number of
"expressions" that can be specified on the command line when it is
run. The expressions allow the user to filter the traffic and only
report that traffic which is useful for some specific experiment. For
example, filter out all traffic except that associated with your telnet
session with the Server, knowing that telnet traffic
flows to the well-known port number 23 at the telnet server. Therefore
we can filter out all the traffic except our telnet session
by specifying: host "10.27.x.20 and port 23" when we invoke
the program on the command line. Note that command ordering should follow
the convention: command <switch> <option> <filter>.
Try this and observe the result; do not forget to include switches such as -i
and -n. You should now only see your own telnet traffic.windump program also has switches that allow it to report
additional interesting information about the network traffic as it dumps the
data to the output screen. To see a complete list of all the switches
available you can look in the windump manual
pages or refer to the handout provided with this lab.
Specifically you should read the sections of the manual pages that deal with
the following switches and record their meanings (we expect much more than
regurgitation of the information from the man page; you must discuss): | #3 - Switch |
Meaning |
-D |
|
-i |
|
-e |
|
-v |
|
-X |
(#4) When using the -s
switch, how do you ensure that you get whole packets? Experiment with the
snaplen to make sure you understand its use
Invoke windump again to filter only your telnet traffic.
Use the appropriate switches to dump the whole packets, provide a raw hex
form of the output and also the ASCII representation of this hex dump. The
hex dump provides a view of each byte that was transmitted in the IP
packet. The ASCII translation of this can sometimes be useful as the
payload portions of the telnet traffic are ASCII. For
example, if you do a directory listing over the telnet session
you can easily read the directory contents in the windump data.
On the other hand the data associated with the TCP and IP headers is
numeric encoding and is not representative of any ASCII text. windump
still tries to do an ASCII decoding for all the data and reports
it. In this case you only see some characters of gibberish and periods in
the places where non-printable ASCII codes were present. These hex
and ASCII formats for displaying the data can be useful for understanding
and debugging a network protocol. Capture your windump command
with appropriate switches in the box below, and provide a detailed
explanation of each of its components in your report (#5).
windump to filter whole packets of only your telnet
traffic. Output the packets in both raw hex and ASCII
format. Pipe the command output to a file using the ">"
operator. WordPad or NotePad)
open this file and prepare a small sample for
printing that includes some interesting telnet payload
data; one page is sufficient. You can print this from the lab, or better
yet save the file to a USB key and integrate it in your report.windump to isolate the traffic from another
student's machine. Get them to log in to bob's account
(password hidden) over the network while you are
listening. Use windump to steal the password. Provide the
packet trace used in your analysis and indicate what part of the packet
was useful.windump to report on the link layer addresses of
the network communication. Reproduce the network diagram in your lab
report (the source
file is here) and ensure that your network diagram includes:telnet server, the common hub, your VM and
at least one other student VMs.windump
switches -w and -r.| #6 - Switch |
Meaning |
-w |
|
-r |
windump to write raw packets to file; it is
customary to name the file with the .pcap extension (for packet
capture). Write you windump command in your lab
report and explain it well: windump to read your file and filter whole packets
of only your telnet session as you have done after
question #5 above. Once again, write you windump command
in your lab report and explain it well: When you are finished the lab, do not forget to follow the instructions in the preamble to properly shut down your Windows VM and log out of your host machine. Ensure that the you leave the cage in the same state you found it, and ask the instructor for the key-press combination so you can work here after hours.
Submit your lab report by e-mail. Place files together in a zip file before sending. Include your report and network traffic dump files.