You are on page 1of 38

Capture all HTTP Packets by using

wireshark and try to fetch all http

usernames & passwords

Batch no:17
160030429- G.Mallikrjuna Rao
160030459- G. Priyanka
 A network is defined as a group of two or more computer systems linked
together. There are many types of computer networks, including the
 local-area networks (LANs): The computers are geographically close
together (that is, in the same building).
 Wide-area networks (WANs): The computers are farther apart and are
connected by telephone lines or radio waves.
 Campus-area networks (CANs): The computers are within a limited
geographic area, such as a campus or military base.
 Metropolitan-area networks MANs): A data network designed for a
town or city.
 Home-area networks (HANs): A network contained within a user's
home that connects a person's digital devices.
 The Open System Interconnection (OSI) model defines a
networking framework to implement protocols in seven
layers. There is really nothing to the OSI model. In fact, it's
not even tangible. The OSI model doesn't perform any
functions in the networking process. It is a conceptual
framework so we can better understand complex interactions
that are happening.
 The International Standards Organization (ISO) developed
the Open Systems Interconnection (OSI) model. It divides
network communication into seven layers.
 Layers 1-4 are considered the lower layers, and mostly
concern themselves with moving data around.
 Layers 5-7, the upper layers, contain application-level data.
Networks operate on one basic principle: "pass it on." Each
layer takes care of a very specific job, and then passes the
data onto the next layer.
 In the OSI model, control is passed from one layer to the
next, starting at the application layer (Layer 7) in one station,
and proceeding to the bottom layer, over the channel to the
next station and back up the hierarchy.
 The OSI model takes the task of inter-networking and
divides that up into what is referred to as a vertical stack that
consists of the following 7 layers.
 Application
 Presentation
 Session
 Transport
 Network
 Data Link
 Physical
 OSI Model, Layer 7, supports application and end-user
processes. Communication partners are identified,
quality of service is identified, user authentication and
privacy are considered, and any constraints on
data syntax are identified. Everything at this layer is
application-specific. This layer provides application
services for file transfers, e-mail, and
other network software services. Telnet and FTP are
applications that exist entirely in the application level.
Tiered application architectures are part of this layer.
 Layer 7 Application examples include WWW browsers,
 This layer provides independence from differences in data
representation (e.g., encryption) by translating from
application to network format, and vice versa. The
presentation layer works to transform data into the form that
the application layer can accept. This layer formats and
encrypts data to be sent across a network, providing freedom
from compatibility problems. It is sometimes called the
syntax layer.
 Layer 6 Presentation examples include encryption, ASCII,
 This layer establishes, manages and terminates connections
between applications. The session layer sets up, coordinates,
and terminates conversations, exchanges, and dialogues
between the applications at each end. It deals with session
and connection coordination.
 Layer 5 Session examples include NFS, NetBios names,
 OSI Model, Layer 4, provides transparent transfer of data
between end systems, or hosts, and is responsible for end-to-
end error recovery and flow control. It ensures complete data
 Layer 4 Transport examples include SPX, TCP, UDP.
 provides switching and routing technologies, creating logical
paths, known as virtual circuits, for transmitting data
from node to node. Routing and forwarding are functions of
this layer, as well as addressing, internetworking, error
handling, congestion control and packet sequencing.
 Layer 3 Network examples include AppleTalk DDP, IP, IPX.
 At OSI Model, Layer 2, data packets are encoded and
decoded into bits. It furnishes transmission protocol
knowledge and management and handles errors in the
physical layer, flow control and frame synchronization. The
data link layer is divided into two sub layers:
 The Media Access Control (MAC) layer
 Logical Link Control(LLC) layer.
 The MAC sub layer controls how a computer on the network
gains access to the data and permission to transmit it. The
LLC layer controls frame synchronization, flow control and
error checking.
 Layer 2 Data Link examples include PPP, FDDI, ATM,
IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame Relay.
 OSI Model, Layer 1 conveys the bit stream - electrical
impulse, light or radio signal — through the network at the
electrical and mechanical level. It provides
the hardware means of sending and receiving data on a
carrier, including defining cables, cards and physical
aspects. Fast Ethernet, RS232, and ATM are protocols with
physical layer components.
 Layer 1 Physical examples include Ethernet, FDDI, B8ZS,
V.35, V.24, RJ45.
 The following characteristics are also used to categorize
different types of networks:
 Topology : The geometric arrangement of a computer
system. Common topologies include a bus, star, and ring.
 Protocol : The protocol defines a common set of rules and
signals that computers on the network use to communicate.
One of the most popular protocols for LANs is
called Ethernet. Another popular LAN protocol for PCs is
the IBM token-ring network .
 Architecture : Networks can be broadly classified as using
either a peer-to-peer or client/server architecture.
 Computers on a network are sometimes called nodes.
Computers and devices that allocate resources for a network
are called servers.
 A port is always associated with an IP address of a host and
the protocol type of the communication, and thus completes
the destination or origination network address of a
communication session. A port is identified for each address
and protocol by a 16-bit number, commonly known as
the port number.
 For example, an address may be "protocol: TCP, IP address:, port number: 80", which may be written
when the protocol is known from context.
 Specific port numbers are often used to identify specific
services. Of the thousands of enumerated ports,
1024 well-known port numbers are reserved by convention to
identify specific service types on a host.
In the client–server model of application architecture, the
ports that network clients connect to for service initiation
provide a multiplexing service. After initial communication
binds to the well-known port number, this port is freed by
switching each instance of service requests to a dedicated,
connection-specific port number, so that additional clients
can be serviced. The protocols that primarily use ports are
the transport layer protocols, such as the
 The port numbers are divided into three ranges: the well-
known ports, the registered ports, and the dynamic or private
 The well-known ports (also known as system ports) are those
from 0 through 1023. The requirements for new assignments
in this range are stricter than for other registrations, examples
 21: File Transfer Protocol (FTP)
 22: Secure Shell (SSH)
 23: Telnet remote login service
 25: Simple Mail Transfer Protocol (SMTP)
 53: Domain Name System (DNS) service
 80: Hypertext Transfer Protocol (HTTP) used in worldwide
 110: Post Office Protocol (POP3)
 119: Network News Transfer Protocol (NNTP)
 123: Network Time Protocol (NTP)
 143: Internet Message Access Protocol (IMAP)
 161: Simple Network Management Protocol (SNMP)
 194: Internet Relay Chat (IRC)
 443: HTTP Secure (HTTPS)
 A server is a computer program that provides services to
other computer programs (and their users) in the same or
other computers. The computer that a server program runs in
is also frequently referred to a server.
Uses of server:
 Servers are used for a multitude of reasons. For data
collection and transmission, for hosting websites and other
web client applications such as video games, and streaming.
1.FTP Server
File Transfer Protocol (FTP ) is one of the oldest
server types. It is responsible for transferring
files from server to a computer and vice versa.
2.Proxy Servers
The Proxy server is responsible for a connection
between a client(web browser or an app) with
and an external server to entertain the request
for connection, performance enhancement, and
3.Online Gaming Server
Gaming server has gained its popularity in a recent decay.
This type of server is responsible for connecting hundreds of
gamers around the world to an external server(s) for
accessing gaming data.
Xbox live is one of the examples for gaming servers.
4.Web servers
The web server is responsible for hosting website files and
serve it up through a web browser. It loads an individual file
of a web page and loads it to display in the browser as one
complete page.
5.Application Servers
Application servers have lion’s share in computer territory
between database servers and the end user, where servers are
often connected to the two.
6.List Servers
List servers are used to enhance the functionality &
management of mailing lists. Whether they are an interactive
database that is open to the public or one-way lists that
deliver newsletters, announcements or advertising.
7.Chat Servers
This server enables a number of people to share information
in the environment of an internet newsgroup that offer real-
time discussion capabilities.
Steps :
1. Open wireshark software

2. Go to capture option ,and click on the interface

to select the microsoft and click on start
3. Other browser login in way2sms so that it
captures the data Userid and Password.
4. All the packets are available in wireshark after
capturing it click on Stop button.
5. Next in the filter box type HTTP packet name
so that all http packets will appear .
6. Now we can check it by clicking on post login it
contains the UserID, Password.
 Wireshark is a network packet analyzer. A network
packet analyzer will try to capture network packets and
tries to display that packet data as detailed as possible.
 You could think of a network packet analyzer as a
measuring device used to examine what’s going on
inside a network cable, just like a voltmeter is used by
an electrician to examine what’s going on inside an
electric cable (but at a higher level, of course).
 In the past, such tools were either very expensive,
proprietary, or both. However, with the advent of
Wireshark, all that has changed. Wireshark is perhaps
one of the best open source packet analyzers available
Some intended purposes
Here are some examples people use Wireshark for:
 Network administrators use it to troubleshoot network
 Network security engineers use it to examine security
 Developers use it to debug protocol implementations
 People use it to learn network protocol internals
The following are some of the many features Wireshark
• Available for UNIX and Windows.
• Capture live packet data from a network interface.
• Open files containing packet data captured with
tcpdump / WinDump, Wireshark, and a number of other
packet capture programs.
• Import packets from text files containing hex dumps of
packet data.
• Display packets with very detailed protocol information.
• Save packet data captured.
• Export some or all packets in a number of capture file
• Filter packets on many criteria
 Wireshark is a program that is used to capture data
packets to allow a more precise analysis. The main focus
of this tool is observing the data traffic within a network.
Such a tool allows the user to examine his/her own
computer for protocol errors and problems within the
network architecture. Accordingly, Wireshark is also
gaining significance within the information technology
and network-internal communication, because by finding
discrepancies, risks to the PC and its components can be
prevented. From a security aspect it must be taken into
account that such a program is helpful in discovering and
stopping hacker attacks. Especially among people
working in the industry, this can be of an advantage if
sensitive data is stored on their computer that should
never reach third parties.