Week 1 CN Lab
Week 1 CN Lab
Week 1 CN Lab
SRN: PES1UG21CS184
NAME: DISHA M
SECTION: C
ip address table:
• TTL
• Time
Step 5: Analyze the following in Wireshark
Details First Echo Request First Echo Reply
Frame Number 6 7
Source IP address 10.0.3.47 10.0.3.47
Destination IP address 10.0.3.47 10.0.3.47
ICMP Type Value 8 0
ICMP Code Value 0 0
Source Ethernet Address
Destination Ethernet Address
Internet Protocol Version 4 4
Time To Live(TIL) Value 0.000000000 0.000026281
Task 3: HTTP PDU Capture
Using Wireshark’s Filter feature
Step 1: Launch Wireshark and select ‘any’ interface. On the Filter toolbar, type-in ‘http’ and
press enter
Observations to be made
Step 3: Analyze the first (interaction of host to the web server) and second frame (response
of server to the client). By analyzing the filtered frames, complete the table below:
Step 4: Analyze the HTTP request and response and complete the table below.
`
HTTP Request HTTP Response HTTP/1.1 200
OK\r\n
Get /canonical.html Server nginx\r\n
HTTP/1.1\r\n
Host Detectportal.firefox.com\r\n Content-Type text/html\r\n
User-Agent Mozilla/5.0 Date Sat, 14 Jan 2023
Gecko/20100101 19:10:10 GMT\r\n
FireFox/103.0\r\n
Accept-Language en-US,en;q=0.5\r\n Location 19:10:10 GMT\r\n
Accept-Encoding gzip, deflate\r\n Content-Length 90\r\n
Connection keep-alive\r\n Connection keep-alive\r\n
Step 1: Make sure the filter is blank. Right-click any packet inside the Packet List Pane, then
select ‘Follow TCP Stream’. For demo purpose, a packet containing the HTTP GET request
sudo tcpdump -D
Step 4: To filter packets based on protocol, specifying the protocol in the command line. For
File:
Task 5: Perform Traceroute checks
Step 1: Run the traceroute using the following command.
Number of hops=30
By default, traceroute uses icmp (ping) packets. If you’d rather test a TCP connection
to gather data more relevant to web server, you can use the -T flag.
nmap www.pes.edu
nmap 163.53.78.128