This lab aims to:
telnet
server, an
ftp
server and a web server, an Ethernet hub and patch panel. You
will also use a packet capture tool to provide data dumps of the traffic
being carried on the network. Analysis of these dump files will help you
understand the nature of datagram based network communication and the
layering of network protocols.Figure 1 - Network Configuration
ping 10.27.x.20
- to make sure you can communicate with yourselfping 10.27.x.1
- to make sure you can communicate with the serverping 10.27.0.8
- to make sure you can
communicate with the printertelnet
daemon. Use telnet
to log in to
alice's account on the Server VM.
alice
, with the password: secret
logout
-> Printers and Faxes ->Add a printer
to start the
Add Printer Wizard
. You want to add a network printer.URL:
http://10.27.0.8
Have Disk
. Enter: C:\Lexmark .
Select Lexmark E360dn PS3
windump
is a port of the popular tcpdump
.
You will use windump
to capture and analyze network
traffic. Run the windump
program in a Command Prompt
shell. First run windump
with the -D
switch to
discover the names and numbers of the network interfaces on your computer
(eg. windump -D
); note that case matters. You will also notice
that the adapters listed by Windows are "cryptic", however only the External
adapter should be enabled at this stage. windump -D
windump
-D
again; you should now be able record the first four bytes
of the Internal adapter: ______________________windump
.
The good news is that the unix/linux
equivalent to windump
,
called tcpdump
, is much clearer in how it identifies
interfaces.-i
switch to specify the adapter to use
as follows: windump -i 2
Internal
adapter. Since there is
only one adapter we can use windump
without specifying
the adapter with the -i
switch; it will default to the
single (External) adapter.windump
and suppress host and port number lookup
using the -n
switch windump -n
windump
, what happens if the -n
switch is omitted? telnet
session to
communicate over the network with the Server VM
using user alice as before.telnet 10.27.x.1
windump
.
Intermingled with the telnet
packets you might also notice a
good deal of other network traffic. This traffic is likely associated
with some of the built-in services of the Windows operating system.
There may also be packets associated with the other student's computers on
the network. windump
has a number of
"expressions" that can be specified on the command line when it is
run. The expressions allow the user to filter the traffic and only
report that traffic which is useful for some specific experiment. For
example, filter out all traffic except that associated with your telnet
session with the Server, knowing that telnet
traffic
flows to the well-known port number 23 at the telnet server. Therefore
we can filter out all the traffic except our telnet
session
by specifying: host "10.27.x.20 and port 23"
when we invoke
the program on the command line. Note that command ordering should follow
the convention: command <switch> <option> <filter>
.
Try this and observe the result; do not forget to include switches such as -i
and -n
. You should now only see your own telnet
traffic.windump
program also has switches that allow it to report
additional interesting information about the network traffic as it dumps the
data to the output screen. To see a complete list of all the switches
available you can look in the windump
manual
pages or refer to the handout provided with this lab.
Specifically you should read the sections of the manual pages that deal with
the following switches and record their meanings (we expect much more than
regurgitation of the information from the man page; you must discuss): #3 - Switch |
Meaning |
-D |
|
-i |
|
-e |
|
-v |
|
-X |
(#4) When using the -s
switch, how do you ensure that you get whole packets? Experiment with the
snaplen
to make sure you understand its use
Invoke windump
again to filter only your telnet
traffic.
Use the appropriate switches to dump the whole packets, provide a raw hex
form of the output and also the ASCII representation of this hex dump. The
hex dump provides a view of each byte that was transmitted in the IP
packet. The ASCII translation of this can sometimes be useful as the
payload portions of the telnet
traffic are ASCII. For
example, if you do a directory listing over the telnet
session
you can easily read the directory contents in the windump
data.
On the other hand the data associated with the TCP and IP headers is
numeric encoding and is not representative of any ASCII text. windump
still tries to do an ASCII decoding for all the data and reports
it. In this case you only see some characters of gibberish and periods in
the places where non-printable ASCII codes were present. These hex
and ASCII formats for displaying the data can be useful for understanding
and debugging a network protocol. Capture your windump
command
with appropriate switches in the box below, and provide a detailed
explanation of each of its components in your report (#5).
windump
to filter whole packets of only your telnet
traffic. Output the packets in both raw hex and ASCII
format. Pipe the command output to a file using the ">
"
operator. WordPad
or NotePad
)
open this file and prepare a small sample for
printing that includes some interesting telnet
payload
data; one page is sufficient. You can print this from the lab, or better
yet save the file to a USB key and integrate it in your report.windump
to isolate the traffic from another
student's machine. Get them to log in to bob
's account
(password hidden
) over the network while you are
listening. Use windump
to steal the password. Provide the
packet trace used in your analysis and indicate what part of the packet
was useful.windump
to report on the link layer addresses of
the network communication. Reproduce the network diagram in your lab
report (the source
file is here) and ensure that your network diagram includes:telnet
server, the common hub, your VM and
at least one other student VMs.windump
switches -w
and -r
.#6 - Switch |
Meaning |
-w |
|
-r |
windump
to write raw packets to file; it is
customary to name the file with the .pcap
extension (for packet
capture). Write you windump
command in your lab
report and explain it well: windump
to read your file and filter whole packets
of only your telnet
session as you have done after
question #5 above. Once again, write you windump
command
in your lab report and explain it well: When you are finished the lab, do not forget to follow the instructions in the preamble to properly shut down your Windows VM and log out of your host machine. Ensure that the you leave the cage in the same state you found it, and ask the instructor for the key-press combination so you can work here after hours.
Submit your lab report by e-mail. Place files together in a zip file before sending. Include your report and network traffic dump files.