Professional Documents
Culture Documents
20CSP-338
Submitted for the requirement of
Lab Course
Sr. Evaluation
No Program Date LW VV FW Total Sign
(12) (8) (10) (30)
ii
EXPERIMENT NO-1
1. Aim:
To identify the http packet on monitoring tool like Wireshark.
2. Objective:
To analyze http traffic.
3. Software/Hardware Requirement:
Widows 7 & above version.
4. Tools to be used:
a) Wireshark packet sniffer and packet capture library.
b) Microsoft Word.
c) WinZip as necessary.
5. Introduction:
Wireshark is an open-source packet analyzer, which is used for education, analysis, software
development, communication protocol development, and network troubleshooting. It is used to track the
packets so that each one is filtered to meet our specific needs. It is commonly called as a sniffer,
network protocol analyzer, and network analyzer. It is also used by network security engineers to
examine security problems.
Wireshark has many uses like troubleshooting networks that have performance issues. Cybersecurity
professional use wireshark to trace connections, view the contents of suspect network transactions and
identify bursts of network traffic.
6. Steps/Methods:
a) Install Wireshark.
b) Open your Internet browser.
c) Clear your browser cache.
d) Open Wireshark.
e) Click on “Capture > Interfaces”. A pop-up window will display.
f) You’ll want to capture traffic that goes through your ethernet drives. Click on the start button to
capture traffic via this interface.
g) Visit the URL, that you wanted to capture the traffic from.
h) Go back to your Wireshark screen and press Ctrl +E to stop capturing.
i) Now, identify http packet on your monitor screen.
3
Akshat -20BCS5931
7. Outcome:
8. Evaluation Grid (To be created as per the SOP and Assessment guidelines by the faculty):
5
Akshat -20BCS5931