Professional Documents
Culture Documents
Technology
This assignment requires students
to:
Include screen shots of captured network traffic and present them with associated
discussion.
Answer: To collect the traffic from 802.11 other than Unicast to & from the host machine where the
wireshark is running, Multicast traffic and Broadcast traffic, the network adaptor needs to put itself
into monitor mode so that the filter mentioned is switched off and all packets received are delivered to
the host.
[ 1 mark ]
The Capture > Options dialog allows the Name Resolution of Network Layer names.
Describe what this means and describe how it could be used for capturing network
traffic.
ANSWER:
Page 1 of 18
1. Name resolution tries to resolve the numerical address (for example, the MAC
address, the IP address, and port) to its corresponding name, under the category
where these options are defined.
2. Resolve MAC address by converting the MAC address to a human-readable format;
for example 28:cf:e9:1e:df:a9 will translate to 192.168.1.101.
3. Resolve network-layer names (IP name resolution) to convert the IP address to its
corresponding hostname (for example, 216.58.220.46 will translate to google.com).
4. Resolve transport-layer names (TCP/UDP port name resolution) to convert wellknown ports to human-readable format (for example, 443 will translate to https).
5. Use external the network name resolver to perform a reverse DNS lookup for each
unique IP address (for example 216.58.196.14 will translate tons4.google.com) also
referred as reverse DNS lookup.
[ 1 mark ]
Describe the difference between a network switch and a network hub. Then explain how
switched networks limit the network traffic that is visible to Wireshark in comparison to
networks that used hubs. (Note switches are the technology used in todays computer
networks)
ANSWER: Hubs and switches are different types of network equipment that connect
devices. They differ in the way that they pass on the network traffic that they receive.
Page 2 of 18
Page 3 of 18
Page 4 of 18
host 192.168.12.22
host google.com
src host google.com
tcp port 80
&&
tcp port
The references dst, host, tcp and port are called qualifiers.
The references 192.168.12.13
Page 5 of 18
Sources of documentation of the Berkeley Filter Syntax that you should refer to are:
Documentation that describes the BPF syntax can be found at
https://www.winpcap.org/docs/docs_40_2/html/group__language.html
There are also good cheat sheets for TCPDump (Wireshark Capture Filters) and
Wireshark Display filters at: http://packetlife.net/library/cheat-sheets/
The Wireshark Users Guide (Access from Help in Wireshark)
Type (3)
Dir (2)
Proto (8)
The Type qualifier has three possible options: host, net and port. The other two
qualifier types also have associated options, there are 4 options associated with Dir
qualifier type and 8 options associated with Proto qualifier type (please disregard the
fddi, decnet options as they are seldom used in todays networks).
You are required to describe what each qualifier means and list a total of 10 capture filter
examples that incorporate at least 1 qualifier and one ID, and explain how each capture
filter works.
ANSWER:
BPF qualifier:
Type qualifier:
This qualifier gives information about the ID name or number it refers to.
Dir qualifier:
It gives information about the transfer directions either to or from the ID name or
number.
Proto qualifier:
CRICOS Provider No. 00103D
Page 6 of 18
Page 7 of 18
[ 3 marks ]
Answer: In wireshark -AND , OR, NOT play a major role in unique filtering which gives
more strength to combine more filters together.
Page 8 of 18
Document all three logical operators and give one example of how each could be used in
a capture filter.
[ 1 mark ]
Page 9 of 18
After creating an appropriate capture filter you may need to generate appropriate traffic
for Wireshark to capture. For instance, if you create a Capture Filter to capture ftp traffic
you will need to run an ftp client to effect the traffic capture. Likewise, when capturing
web traffic you could use a browser to generate appropriate traffic. To capture ICMP
traffic you might use the ping command because it uses the ICMP protocol to query other
hosts.
Page 10 of 18
Note
Make sure you have selected the correct network interface, or select
all interfaces if you are unsure.
Page 11 of 18
Page 12 of 18
Excluding particular
network traffic (2 marks)
Page 13 of 18
Capture all traffic from a range of network addresses but exclude broadcast
traffic
Page 14 of 18
Page 15 of 18
Page 16 of 18
tcp[13] & 4 == 4
This particular capture filter can detect TCP packets that have the RST flag set.
Describe this syntax so that a layman could understand how such filters work.
Page 17 of 18
Page 18 of 18