EGL202 - Lab - 4 - Network Traffic Analysis (Instructor) - Revisedv2
EGL202 - Lab - 4 - Network Traffic Analysis (Instructor) - Revisedv2
A Objectives
To revise the basic TCP/IP concepts
To familiarise with a network traffic analyser and its role in security audit
1) Install and start Wireshark (recommended version 3.2.3) and Npcap (recommended
version 0.9989). Reference: www.wireshark.org (Note: Wireshark used to be called
Ethereal).
2) In the Input tab, select “Ethernet (if using wired connection) or Wi-Fi (if using wireless
connection)”
3) In the Options tab, under Stop Capture Automatically After… , check and input after
10000 packets.
4) Click Start. You should see many network packets. (Note: You may need to turn your PC’s
personal firewall such as Windows Defender to see the traffic.).
Task 3: Filters
1) Under “Apply a display filter”, key in ip.addr == x.x.x.x where x.x.x.x is your PC’s IP
address. (Hint: You can use “ipconfig” from the command prompt to find your PC’s IP
address.) You should now only see traffic flowing to and from your PC.
Question: Click on any IP packet with your PC’s IP address as the source. Write
down the corresponding Ethernet destination address. Which host on the
network does this Ethernet address belongs to?
Example:
2) Under “Apply a display filter”, key in icmp and restart the live capturing. From your PC,
ping the default gateway. (Hint: Use “ipconfig” if necessary.)
Question: From the capture of your ping, write down all the Ethernet addresses
detected. Next, issue “ipconfig/all” to check your PC’s MAC/hardware address. Is
ping request or ping reply packets’ Ethernet source address the same as your
PC’s MAC address?
<Answer may varies depending – use ipconfig /all to check gateway details>
172.16.222.101, 172.16.223.254
3) Under “Apply a display filter”, key in tcp and restart the live capturing. Use your browser to
go to www.sg. Visit https://nslookup.io/ to identify the possible public IP addresses for
www.sg . Hint: It should be 45.60.101.124 or 45.60.11.124
Search for first occurrence of destination ip for www.sg . Right click the packet and click
(Follow> TCP Stream).
>> Look for first occurrence of SYN, SYN-ACK and ACK packet for www.sg
FIN flags are used for TCP termination and Reset flags are used when there is an
abrupt closure of the session
Note: To stop and start your Wireshark traffic capture (Capture> Stop and Capture> Start).
2) Key in a username and password. Let’s try: username: admin123 Password: pass123
3) Click Login on the page. You should see the following screen.
Question: From your capture, what is the IP address for the website vbsca.ca?
Question: From your capture, can you identify the user ID and password used? What
service details can you glean from the website?
Yes. User ID and password (admin123, pass123) are shown in the POST section.
Website is using HTTP port 80 and the Server is on Microsoft IIS 5.0 which is an
obsolete web server with many vulnerabilities.
HTTP is not secure, traffic is in clear and can be intercepted by cyber attacker. Use
HTTPS.