You are on page 1of 46

Assignment No.

Network System & Administration


Table of Contents
Problem Statement............................................................................................................3
Identify a suitable solution for the given scenario.....................................................................................3
Installation of Oracle VM VirtualBox..............................................................................................................4
Create VM.......................................................................................................................................................4
Installation of Server side VM........................................................................................................................5
Install Ubuntu Server in the Virtual Machine.................................................................................................9
Assigning of meaningful name to client machine........................................................................................16
Installation of Client Side..............................................................................................................................17
Assigning of meaningful name to client machine........................................................................................22
Install, configure, and operate the network solution in an industry-standard multiuser............22
system........................................................................................................................................22
Secure Shell (SSH).......................................................................................................................22
Working of SSH.............................................................................................................................................23
Enable SSH Connection.................................................................................................................................23
Installation of OpenSSH Client......................................................................................................................23
Connect Via SSH............................................................................................................................................25
Apache2 (HTTPD)........................................................................................................................26
Installation of Apache2.................................................................................................................................27
Adjusting the Firewall...................................................................................................................................29
Dynamic Host Configuration Protocol (DHCP).............................................................................31
Installing DHCP Server..................................................................................................................................31
Configuring a DHCP Server...........................................................................................................................32
Defining a Subnet to Use..............................................................................................................................32
DHCP Global Configurations.........................................................................................................................33
DHCP Device Management...........................................................................................................................33
Securing the DHCP Configuration.................................................................................................................33
Domain Name Server (DNS)........................................................................................................35
How DNS servers work.................................................................................................................................35
Types of DNS queries....................................................................................................................................38
DNS caching..................................................................................................................................................39
Wireshark...................................................................................................................................39
Wireshark Installation on Linux (Ubuntu)....................................................................................................40
Packet Trace analysis using Wireshark.........................................................................................................41
Reference:..................................................................................................................................44
Problem Statement
AcmeAccounting is a small business running from a small office in Luton. The company
owner has been reliant on using Microsoft Office applications for her work. However, due to
the increase in clients, she wants to set up a Linux client-server network infrastructure
running the essential network services to allow her install and run a MySQL database
application along with other business applications. You have been hired to use an industry
Linux distribution that you must install from scratch (no pre-built VM is to be used – 20
marks deduction if this is done) on VirtualBox (preferred) or VMWare Player, to create a
client-server network (i.e. 2 VMs). The network is expected t have more clients added to
connect to the server. You are then required to demonstrate four network services that should
be installed, configured, tested based on a clear testing strategy, and fully reported with
configuration details and full justifications for all actions done including commands details
and their parameters. Your report should also cover a maintenance plan and a short (500
words) critical evaluation of your work. The network services that you can use are:

HTTP, FTP, SMTP, SSH, DNS, DHCP, LDAP

Identify a suitable solution for the given scenario

To facilitate solution of above mentioned problem to setup Linux client-server network


infrastructure one of the most viable solution is to perfom virtualization. Virtualization allows
the computer system to allow efficient utilization of physical hardware by creating
abstraction layer over computer hardware. In virtualization we create multiple virtual
computer called virtual machines (VMs) that behaves like an independent computer [1]. IBM
pioneered the notion of virtual machines in the 1960s as a way to enable concurrent,
interactive access to a mainframe computer. Users are given the illusion of running directly
on the real machine because each virtual machine is a duplicate of the underlying physical
machine.

Virtual machines additionally offer advantages such as isolation, resource sharing, and the
ability to run several flavours and configurations of operating systems, each with its own set
of software technologies and configuration [2]. This approach will help AcmeAccounting to
operate multiple OS on one virtual system and will help the clients to access application on
network. For this task, we are using Linux distribution Ubuntu 22.04 to install from scratch
on Virtual box. For this task we have created 1 server and 1 client on VirtualBox that will
allow us to install, configure and test our strategy over several network strategies.

Installation of Oracle VM VirtualBox

First task in the Assignment was to use and industry Linux distribution on VirtualBox. For
this purpose, I downloaded the Oracle VM (Virtual Machine) VirtualBox from the
distribution website (https://www.virtualbox.org/wiki/Downloads)[3]. I have download
VirtualBox 6.1.34 for Linux specific for Ubuntu 22.04 Desktop Installer. Basically,
VirtualBox is a virtualization software that is used to install the operating system (OS) and
facilitates the creation and management of VM. Virtual machines (VMs) are software-based
simulations of actual computing environments [4]. They usually consist of multiple files
providing the VM's setup, virtual hard disc storage, and some snapshots of the VM's state at a

specific point in time. The next step is to install two version on Linux Ubuntu 22.04 Desktop.
After installation of Oracle VM VirtualBox Manager, the following screen appears as shown
in figure 1.

Create VM

The next step was to create two virtual machines. For this purpose, I started the VirtualBox. It
has opened the VirtualBox Manager. This interface will be used for administration of the next
two virtual machines. In the given task I have to create two instances i.e. one for server and
one for client. The second task was to given the names and operating system to the first
machine. I have used the name s for server followed by registration number (1959410) and
then initials of my Name ST (S for Suraj and T for Timilsina). As I am using Apple
MacBook Pro, thus the folder name where the VM will be installed is given in Machine
Folder. The next step was to select the type of Operating System, I have used the Linux as
operating system and in the Version I choose Ubuntu 22.04 (64-bit).

Installation of Server side VM

By pressing the Next button and there will be a wizard for selecting the amount of memory to
be used as RAM to allocate to the server side VM. I chose about megabytes to be allocated to
the virtual machine. I chose approximately 6 GB (6144 megabytes) of RAM.
After allocating Ram the next step is to add a virtual hard disk to the server. Make sure

that create a virtual hard disk now is selected, then press Create.

Next I choosed the file type for the new virtual hard disk. Make sure that VDI (VirtualBox
Disk Image) is checked and press Next.
The next step was to use the hard disk as dynamic or fixed allocation. I have selected
dynamically allocation and used the dynamically allocated storage on physical hard disk.
In the last, select the amount of space allocated to virtual hard disk in GB. The default size of
10GB, but I have chosen 2 TB of space to hard disk. The path of virtual disk image is shown
in the given below figure and click create to allocate the disk size. After this step the hard
disk will be created and can be seen in the VirtualBox Manager.

Install Ubuntu Server in the Virtual Machine


After the installation of Oracle VirtualBox, the next stage was to install the Ubuntu in the
VM. I have opened the server storage and selected Ubuntu 22.04 desktop amd 64-bit edition
[5]. After performing this step, the installation of process of Ubuntu started.

.
After the completion of basic steps, the next step was to set the profile with the name,
computer name and selection of passwords. The following screen shows the setting of profile.
Assigning of meaningful name to client machine
Installation of Client Side
Assigning of meaningful name to client machine

Install, configure, and operate the network solution in an industry-standard multiuser


system.
As we have to use a client-server architecture based network so we have to use
different network services that can be used to connect ubuntu client to ubuntu
server. For this purpose I have selected Secure Shell (SSH) to establish connection
between client and server.
Secure Shell (SSH)
Secure Shell, also known as Secure Socket Shell, is an option that enables you to
securely connect to a remote computer or server via a text-based interface [6]. A
shell session will be initiated once a secure SSH connection is established, and you
will be able to manipulate the server by typing commands into the client on our
local computer. This protocol has been most commonly used by system and
network administrators, as well as anyone who needs to remotely administer a
computer in a secure manner [7].
Working of SSH
To establish an SSH connection, you'll require two components: a client and the
server-side part that corresponds. An SSH client is a piece of software that you
install on your computer and use to connect to another computer or a server. The
client initiates the connection using the specified remote host info, and if the
credentials are authenticated, the encrypted connection is established.
An SSH server is a component on the server that is continually listening to a
certain TCP/IP port for possible client connection requests [8]. The SSH server
will respond with the software and protocol versions it supports once a client
begins a connection, and the two will share their identity data. SSH generates a
new session for the relevant environment if the credentials provided are correct
[9].
Enable SSH Connection
Because an SSH connection requires both a client and a server component, you
must ensure that both are installed on both the server and client network machines.
OpenSSH is an open source SSH utility that is commonly used in Linux
distributions. OpenSSH is a simple program to install. It requires access to the
server's terminal as well as the machine you use to connect [10].
Installation of OpenSSH Client.

The computer on which server is installed must have the capability to accept the ssh
connection. This could be done by installing the ssh software toolkit on server
machine. To install SSH server, we need to install the package of openssh-server as
shown in the figure below. To install the ssh server on my server machine I execute
the following command.
Installation of OpenSSH Client.

Following is the complete procedure for installation of OpenSSH client [11].


1. After the relevant support files have been installed, execute the following command to
see if the SSH server is functioning on server side of VirtualBox:

Connect Via SSH

After the successful installation of openssh on both client and server side, the network user
can create a secure remote. The given below sequence of command will be used to establish
secure ssh connection among client and server

 Execute ssh s2030889KK@10.0.2.15 where s2030889 is the user name of server side
and 10.0.2.15 is the host ip address of server.
 The system will prompt for the password, you are required to enter the password
followed by the Enter button. While typing, you will not receive any feedback on the
screen. If you're going to paste your password, be sure it's not in a text file.
 When you first connect to a server, it will ask if you wish to keep connecting, you
need to Simply write yes(y) and press Enter button key. Because the remote server is
not recognized on your local PC, this message appears only this time.
You may now use your terminal to manage and control a distant machine. If you're having
problems connecting to a remote server, check sure you've done the following:

 The distant machine's IP address is correct.


 The port on which the SSH daemon listens is not blocked by a firewall or erroneously
routed.
 Your password and username are correct.
 The SSH software is correctly installed.

Apache2 (HTTPD)

The Apache web server (also known as "HTTPD") is one of the most widely used for
providing dynamic and static web pages [12]. It is open-source software distributed under the
Apache License 2.0. It has a lot of useful features, such as dynamically loadable modules,
strong media support, and significant integration with other popular software.
Installation of Apache2
Because Apache is included in Ubuntu's default software repositories, it may be installed via
standard package management tools. Let's start by adjusting the local package index to mirror
the most recent changes from upstream [13]:
sudo apt update
sudo apt upgrade

It's time to install Apache 2 software now as the system has been upgraded with the newest
fixes. To put it another way, type the following command and hit [Enter] [14]:
After this I forwarded a ping command from my client side to the server side to test the
connection. I used my Ip address of server side got from ifconfig command. In the below
figure we can see the amount of time for sending of packet and time of getting response.

Adjusting the Firewall

Before you can test Apache, you'll need to change the firewall settings to allow access to the
default web ports from the outside. You should have a UFW firewall configured to restrict
access to your server if you followed the necessary steps. During installation, Apache
registers itself with UFW to give a few application profiles that can be used to permit or
disable access to Apache over the firewall. Display the ufw application profiles by writing:
Find the status of apache2 server

At the completion of the installation procedure, Ubuntu 20.04 starts Apache. The web server
should be up and operating at this point. Check with the systemd init system to check sure the
service is running by typing:
Dynamic Host Configuration Protocol (DHCP)

The Dynamic Host Configuration Protocol (DHCP) is a system communication protocol


which assigns IP addresses to devices connected to a local network or the internet [15].
Adding a new computer to a network before the development of the DHCP protocol needed
manual activity to convert its Mac address to an IP address. When there were a lot of hosts on
the network, managing the network was difficult. When DHCP is installed and configured on
a local network, any computer that is approved automatically receives an IP address that
corresponds to its Mac address. A Domain Name Server (DNS) oversees IP address
generation, whereas a DHCP server delivers configuration to hosts automatically [16].

Installing DHCP Server

To install the DHCP server on the Linux VM firstly, you'll need to update the packages
repository by executing the following command [17].
$ sudo apt-get update
Install the DHCP package using the following command after updating the packages list.
$ sudo apt-get install dnsmasq

Config
uring a
DHCP
Server

Following the installation of the DHCP server, use the ifconfig command to obtain the DHCP
server's IP address. DHCP configuration files can be found in /etc/dhcp/dhcpd.conf. To open
the file, type the following command.

$ sudo nano /etc/dhcp/dhcpd.conf

Defining a Subnet to Use

To define the subnet, range of IP addresses, domain, and domain name servers, add the
following lines to the configuration file.

subnet 192.168.110.0 netmask 255.255.255.0 {


The range specifies the set of IP address pools from which DHCP clients receive addresses.
Add the following line to indicate the leased address range.
range 192.168.110.5 192.168.1.10;

DHCP Global Configurations


To configure the global settings for a DHCP server, follow the instructions below [18].
Step 1: Find the parameters default-lease-time and max-lease-time in the configuration file
and update their values to determine the default and maximum lease times.
Step 2: Define which interface the DHCP server should use to serve DHCP requests if there
are multiple interfaces. Find and edit the value of INTERFACESv4 in the configuration file
to replace it with the preferred interface for serving requests.
You must save and close the configuration file after completing the preceding basic
configuration.
DHCP Device Management

To control the DHCP server, run the commands below.

I have used the below given command in termina to check the status of DHCP service as its
running or not
$ sudo systemctl status isc-dhcp-server.service
To start the DHCP service.
$ sudo systemctl start isc-dhcp-server.service
To stop the DHCP service.
$ sudo systemctl stop isc-dhcp-server.service
To restart the DHCP service.
$ sudo systemctl restart isc-dhcp-server.service

Securing the DHCP Configuration

DHCP servers are subject to a variety of attacks. Let's look at some of the many types of
attacks and how to avoid or neutralise them.

 Denial of Service
Because the DHCP protocol does not need client authentication to give network
configurations, any user with network access can receive an IP address lease. The data
transmitted by the DHCP server could leak DNS server IP addresses, jeopardising the
network's security. Malicious users with access to a DHCP-enabled network can launch a
denial-of-service attack on DHCP servers by flooding them with a large number of lease
requests, reducing the amount of leases accessible to other DHCP clients [19].

 DHCP Starvation Attack

The DHCP starvation attack occurs when a hacker uses up all of the address space accessible
to DHCP servers for a set amount of time [20]. Broadcasting DHCP queries with faked MAC
addresses is used in this type of attack. The attackers also employ DHCP snooping to get
access to the network, which is a strategy for providing network security by filtering
untrusted DHCP packets and constructing and maintaining a DHCP snooping binding
database.

 Rogue DHCP Server

In order to carry out man-in-the-middle, sniffer, and reconnaissance attacks, a hacker may set
up a phoney DHCP server on the attacked network [21]. The attacker uses this rogue server
to offer the clients with bogus addresses and other network information in order to snoop into
the data packets. The rogue server then sets up its own DNS servers and network gateways,
which send users to malicious websites where they can be phished for personal information
like credit card numbers and passwords.

 Safety Tips

Unauthorized access to the server system is limited by following adequate physical security
rules for hardware components such as servers, switches, and routers. Maintaining user
access policies additionally anneals the security perimeter by restricting wireless access for
illicit individuals inside or outside the system. Every DHCP server on the network should
have audit logging enabled, and log files should be monitored. When the DHCP server
receives an unusually high number of lease requests from clients, these log files assure
security. An audit log file contains the information needed to hunt down the source of DHCP
server attacks. Explanatory information about the DHCP Server service should also be
examined in the system event log. While authentication occurs before the DHCP server
assigns a lease to clients running the Microsoft OS with 802.1 enabled switches, providing
improved security. Furthermore, only a small number of people should have administrative
access to DHCP. Only members of the Administrators or DHCP Administrators groups
should be able to administer DHCP servers through the DHCP console or Netsh commands.
Ensure that users that require read-only access to the DHCP console are added to the DHCP
Users group rather than the DHCP Administrators group. Even if nothing in the cyber world
is totally secure, a few security measures used in a security policy can help a company avoid
cyber dangers.

Domain Name Server (DNS)


The DNS (Domain Name System) protocol is a critical component of the Internet. It converts
difficult-to-remember Internet Protocol (IP) addresses into simple domain names [21]. DNS
(Domain Name Service) is an Internet service that connects IP addresses and fully qualified
domain names (FQDNs). DNS eliminates the need to remember IP addresses in this way.
Name servers are computers that run DNS. BIND (Berkley Internet Naming Daemon), the
most common application for operating a name server on Linux, is included with Ubuntu.
Every device connected to the internet has a unique IP address those other devices use to
locate it. DNS servers allow individuals to type normal words into their browsers, such as
www.google.com, without of having to remember the IP address for each website. A DNS
server is a computer that keeps a database of public IP addresses and the names of the
websites that an IP address leads to. DNS serves as the internet's phone book. The DNS finds
the correct IP address whenever people type domain names like Fortinet.com or Yahoo.com
into the address bar of their web browsers. The IP address of the website sends the device to
the correct location for data access.

Browsers use the address to send data to content delivery network (CDN) edge servers or
origin servers once the DNS server has found the correct IP address. Once this is completed,
the user can view the website's information.

How DNS servers work

The DNS directory, which converts names to numbers, isn't all kept in one dark part of the
internet [22]. DNS resolution is the process of translating a hostname (for example,
www.example.com) into a computer-friendly IP address (such as 192.168.1.1). Each device
on the Internet is assigned an IP address, which is required to locate the proper Internet
device, much like a street address is required to locate a certain residence. When a user types
example.com into their web browser, a translation must take place between what the user
types and the machine-friendly address required to reach the example.com webpage [23].

DNS installation on Ubuntu


In
a typical DNS query, the user's URL must pass through four servers before receiving an IP
address. The following four servers collaborate to provide the right IP address to the client:

DNS recursor: The DNS recursor, also known as a DNS resolver, receives the request from
the DNS client. It then talks with other DNS servers in order to determine the correct IP
address. After retrieving the request from the client, the resolver operates as if it were a
client. It does this by sending requests to the other three DNS servers, which are root
nameservers, top-level domain (TLD) nameservers, and authoritative nameservers [24].

Root nameservers: The root nameserver is responsible for the DNS root zone on the internet.
Its job is to respond to requests for records from the root zone. It responds to requests by
returning a list of authoritative nameservers for the requested TLD.

TLD nameservers: The IP address of the second-level domain is kept within the TLD name
by a TLD nameserver. The website's IP address is then released, and the query is sent to the
domain's nameserver.
Authoritative nameservers: An authoritative nameserver is the one that responds to your DNS
query with the correct information. A master server, or primary nameserver, and a slave
server, or secondary nameserver, are the two types of authoritative nameservers. The zone
records are kept on the master server, whereas the slave server is a carbon replica of the
master server. It distributes DNS server load and serves as a backup in the event that the
master server fails.

Types of DNS queries

Three sorts of requests occur in a normal DNS lookup. An efficient DNS resolution
procedure can reduce the distance travelled by using a combination of these queries. Cached
record data will be available in an ideal circumstance, allowing a DNS name server to return
a non-recursive query [25].

 Recursive query

A DNS client expects a DNS server (usually a DNS recursive resolver) to respond to a
recursive query if the resolver is unable to locate the requested resource record, it will return
an error message. [26].

 Iterative query

In the case of iterative query the DNS client will let server to offer the optimized or the
possibly best response. If the query forwarded by DNS client could not find the exact match
by DNS server, then DNS server with lower authoritative will be requested to provide lower
level domain space information. In this scenario the DNS client will forward the query with
referral address. The process will be executed until some error message occurs or there will
be some time out happens.

Non-recursive query

This usually happens whenever a DNS resolver client requests a record from a DNS server to
which it has access, mostly because the DNS server is legitimate for such query or if the
information is in its cache. DNS servers frequently cache DNS records to reduce bandwidth
usage and burden on gateway systems.

DNS caching

The objective of caching is to temporary hold information at a site that optimizes query
performance and efficiency. DNS caching maintains info locally to the asking user such that
the DNS query can be handled faster and then further searches throughout the DNS lookup
network can be bypassed, lowering response time and CPU usage. DNS info can sometimes
be cached in a variety of places, which will all keep DNS records for a given amount of time
specified by a time-to-live value (TTL).

Wireshark

Wireshark is an open source packet sniffer tool used for the network protocol analyzer and is
also used for the troubleshooting of network protocols in real time and presents the packets in
human readable formats [27]. This section will guide us through the process of Wireshark
downloading, installation and packet capturing.

Downloading

For installation of Wireshark we can download its setup from the given below site:

https://www.wireshark.org/download.html
Wireshark Installation on Linux (Ubuntu)

As I was using Linux (Ubuntu 22.04) I followed following command for Wireshark
installation.

$ sudo apt install wireshark


Packet Trace analysis using Wireshark

.
Wireshark allows users to set network interface controllers into promiscuous mode (if the
network interface controller supports it), allowing them to observe all traffic visible on that
interface, including unicast traffic not addressed to that network interface controller's MAC
address [28]. However, when using a packet analyzer in promiscuous mode on a network
switch port, not all traffic passing through the switch is forwarded to the port where the
capture is performed, hence capturing in promiscuous mode is not always sufficient to see all
network traffic. Capture can be extended to any point on the network via port mirroring or
various network taps. As I stated earlier the Wireshark is known to the most popular packet
sniffer in computer network community and its popularity is majorly due to following three
task it performs

 Packet Capture
Wireshark has the capability of listening huge stream of packets at real time, it can handle
potentially thousands of packets at a time. This feature allows the network engineer and
networks users to check whole packets processed in real time.

 Filtering

Wireshark helps to control the display of relevant packets, checking specific protocol or its
values by using the facility of filters. Wireshark has a graphical interface which provides the
support of sorting and filtering to find specific packets of our requirement. In our case we
have selected the filter on FTP protocol. Resulting all the communication packets using the
FTP will be selected and displayed on the interface as shown in figure.

 Visualization

Wireshark visualization features support in diagnosis and determination of manifesting


problems and then it relates it to some technical features. Problem manifestation helps to
determine the manifestation of packet capturing. It also helps to classify the problem and
categorize its behavior. We can use different techniques like graphs, sorting to visualize large
amount of packets and understanding the relationship between different indicators. It also
facilities the network engineer to find and visualize the amount of packet loss and its
potential reasons. This feature allow to mine and detect several patterns on different
hierarchy levels. This feature is used by the network engineers to resolve the technical issues.

Wireshark can be used for a variety of tasks, including diagnosing network performance
issues. Wireshark is frequently used by cybersecurity professionals to trace connections,
analyse the contents of dubious network transactions, and spot network traffic surges. It's an
important aspect of any IT professional's toolset, and preferably the IT expert knows how to
use it.
Traffic analysis using Wireshark.

Reference:
[1]. Chiueh SN, Brook S. A survey on virtualization technologies. Rpe Report. 2005 Jun;142.

[2]. Chowdhury NM, Boutaba R. A survey of network virtualization. Computer Networks.


2010 Apr 8;54(5):862-76.

[3]. https://www.virtualbox.org/wiki/Downloads

[4]. Yi B, Wang X, Li K, Huang M. A comprehensive survey of network function


virtualization. Computer Networks. 2018 Mar 14;133:212-62.
[5]. https://ubuntu.com/download/desktop
[6]. Cabral W, Valli C, Sikos L, Wakeling S. Review and analysis of cowrie artefacts and
their potential to be used deceptively. In2019 International Conference on computational
science and computational intelligence (CSCI) 2019 Dec 5 (pp. 166-171). IEEE.

[7]. Oakes J. Intelligent Management of Virtualised Computer Based Workloads and


Systems (Doctoral dissertation, University of Northampton).

[8]. Fomin SS, Gudkov YI, Tumkovskiy SR. Concept of a virtual workshop on ICT. In2018
IEEE International Conference" Quality Management, Transport and Information Security,
Information Technologies"(IT&QM&IS) 2018 Sep 24 (pp. 787-790). IEEE.

[9]. https://www.techtarget.com/searchsecurity/definition/Secure-Shell

[10]. https://linuxize.com/post/how-to-enable-ssh-on-ubuntu-20-04/

[11]. https://www.cyberciti.biz/faq/ubuntu-linux-install-openssh-server/

[12]. https://httpd.apache.org

[13]. https://mkyong.com/apache/how-to-install-apache-http-server-in-ubuntu/

[14]. https://www.cloudsigma.com/installing-the-apache-server-on-ubuntu-18-04-a-how-to-
guide/

[15]. Aldaoud M, Al-Abri D, Al Maashri A, Kausar F. DHCP attacking tools: an analysis.


Journal of Computer Virology and Hacking Techniques. 2021 Jun;17(2):119-29.

[16]. https://www.infoblox.com/glossary/dhcp-server/

[17]. https://www.linuxfordevices.com/tutorials/ubuntu/dhcp-server-on-ubuntu

[18]. https://vitux.com/how-to-setup-dhcp-server-on-ubuntu/
[19]. Tripathi N, Hubballi N. Slow rate denial of service attacks against HTTP/2 and
detection. Computers & security. 2018 Jan 1;72:255-72.

[20]. https://www.cbtnuggets.com/blog/technology/networking/what-is-a-dhcp-
starvation-attack

[21]. Elz R, Bush R. Clarifications to the DNS Specification. RFC 2181, July; 1997 Jul
[22]. https://www.cloudflare.com/en-gb/learning/dns/what-is-dns/

[23]. https://www.geeksforgeeks.org/working-of-domain-name-system-dns-server/

[24]. https://www.omnisecu.com/tcpip/recursive-and-iterative-dns-queries.php

[25]. https://ns1.com/resources/dns-types-records-servers-and-queries

[26]. https://www.ibm.com/docs/es/itcam-transactions/7.4.0.1?topic=monitor-dns-query-
types

[27]. Lamping U, Warnicke E. Wireshark user's guide. Interface. 2004;4(6):1.

[28]. Chappell L, Combs G. Wireshark 101: Essential skills for network analysis. Protocol
Analysis Institute, Chapell University; 2013.

You might also like