Internet Traffic Measurements. TCPdump. School of Electrical Engineering AALTO UNIVERSITY

Size: px
Start display at page:

Download "Internet Traffic Measurements. TCPdump. School of Electrical Engineering AALTO UNIVERSITY"

Transcription

1 Internet Traffic Measurements TCPdump School of Electrical Engineering AALTO UNIVERSITY

2 Page 1 Contents What is TCPdump?... 2 Hardware and software components used for this tutorial... 2 Getting familiar with TCPdump... 2 Install the package... 3 Getting all available interfaces... 3 Selecting a specific interface... 4 Capturing all IP packets... 4 Getting verbose results... 5 Capturing all TCP/UDP/ICMP packets... 6 Disabling hostname and port translation... 7 Disabling time stamp display... 7 Displaying the content of the packets in ASCII and hexadecimal... 8 Capturing the link layer header with the packets... 9 Capturing specific amount of packets... 9 Saving the captured packets into a file Reading the captured packets from a file Capturing packets for specific port/s Capturing packets for specific IP address Capturing packets for specific range of address... 12

3 Page 2 What is TCPdump? TCPdump is one of the best and greatest command line tools on UNIX and Linux based operating systems to capture and analyze the data transmitted and received by the network interface card. TCPdump is extremely flexible and versatile tools which can be used in many cases for traffic monitoring, measurements, network troubleshooting and security analysis so it is really important that students have a good understanding about the capabilities of this powerful networking tool. Hardware and software components used for this tutorial The material available in this tutorial is created based network devices in a virtual Lab environment running CentOS Linux version bit (minimal version) where all concepts and commands are also applicable to other Linux distributions. Linux machine hardware properties are as follows: Machine Name Hard Disk Drive RAM CPU No. NICs GPLinux 10GB 512MB 1 socket, 1 core 1 Note: All these commands and concepts are applicable to other UNIX and Linux distributions but as all the examples used in this guide are taken from the CentOS based system so it is recommended to use the same Linux distribution if you are new to UNIX and Linux based systems. Getting familiar with TCPdump Note: Linux kernel by default is able to sniff and capture all broadcast messages and packets that are destined to that specific machine and not every single packet transmitted and received by other machines on the network! In order to capture all the traffic that is not destined for a specific machine: 1- That traffic must be redirected to the sniffing NIC (by using Hub, tap interfaces or port mirroring technics). 2-NIC must be configured in promiscuous mode.

4 Page 3 Install the package Install the package using following command. Command : yum install tcpdump -y Loaded plugins: fastestmirror... Resolving Dependencies --> Running transaction check ---> Package tcpdump.x86_64 14: el7 will be erased --> Finished Dependency Resolution Dependencies Resolved Resolving Dependencies --> Running transaction check ---> Package tcpdump.x86_64 14: el7 will be installed --> Finished Dependency Resolution Running transaction Installed: tcpdump.x86_64 14: el7 Complete! Getting all available interfaces First step for working with TCPdump is checking for the list of available interfaces for capturing the packets on the system by using following command. Command : tcpdump -D 1.bluetooth0 (Bluetooth adapter number 0) 2.nflog (Linux netfilter log (NFLOG) interface) 3.nfqueue (Linux netfilter queue (NFQUEUE) interface) 4.usbmon1 (USB bus number 1) 5.usbmon2 (USB bus number 2)

5 Page 4 6.eno any (Pseudo-device that captures on all interfaces) 8.lo Note: 1- any interface is a kernel special type of interface designed to sniff the packets from all available NICs. 2- lo stands for loopback interface. Selecting a specific interface If you need to capture packets only on a specific interface then you need to use -i option as follows: Command : tcpdump -i eno :18: IP gplinux.ssh > : Flags [P.], seq : , ack , win 314, length :18: IP gplinux > gateway.domain: PTR? in-addr.arpa. (44) 10:18: IP gateway.domain > gplinux.50829: NXDomain 0/1/0 (103) 10:18: IP gplinux > gateway.domain: PTR? in-addr.arpa. (46) Capturing all IP packets TCPdump will capture all IP packets on interface if nothing else is specified as follows: Command : tcpdump -i eno :06: IP gplinux > gateway.domain: A? (32) 11:06: IP gplinux > gateway.domain: AAAA? (32) 11:06: IP gplinux > gateway.domain: PTR? in-addr.arpa. (44) 11:06: IP gateway.domain > gplinux.58759: NXDomain 0/1/0 (103)

6 Page 5 11:06: IP gplinux > gateway.domain: PTR? in-addr.arpa. (46) Getting verbose results If you need more detail result from TCPdump then you can use -v, -vv or -vvv for more verbose result. Command: tcpdump -i eno vvv tcpdump: listening on eno , link-type EN10MB (Ethernet), capture size bytes 12:08: IP (tos 0x0, ttl 64, id 13406, offset 0, flags [DF], proto ICMP (1), length 84) gplinux > google-public-dns-a.google.com: ICMP echo request, id 2679, seq 1, 12:08: IP (tos 0x0, ttl 64, id 9873, offset 0, flags [DF], proto UDP (17), length 66) gplinux > gateway.domain: [bad udp cksum 0x121a -> 0x61e9!] PTR? in-addr.arpa. (38) 12:08: IP (tos 0x0, ttl 128, id 65506, offset 0, flags [none], proto UDP (17), length 110) gateway.domain > gplinux.42014: [udp sum ok] q: PTR? inaddr.arpa. 1/0/ in-addr.arpa. [5s] PTR google-public-dns-a.google.com. (82) 12:08: IP (tos 0x0, ttl 64, id 9874, offset 0, flags [DF], proto UDP (17), length 74) gplinux > gateway.domain: [bad udp cksum 0x1222 -> 0xbd53!] PTR? in-addr.arpa. (46) 12:08: IP (tos 0x0, ttl 128, id 65507, offset 0, flags [none], proto ICMP (1), length 84) google-public-dns-a.google.com > gplinux: ICMP echo reply, id 2679, seq 1, 12:08: IP (tos 0x0, ttl 128, id 65508, offset 0, flags [none], proto UDP (17), length 133) gateway.domain > gplinux.59846: [udp sum ok] NXDomain q: PTR? in-addr.arpa. 0/1/0 ns: in-addr.arpa. [5s] SOA localhost. nobody.invalid (105) 12:08: IP (tos 0x0, ttl 64, id 9875, offset 0, flags [DF], proto UDP (17), length 72)

7 Page 6 gplinux > gateway.domain: [bad udp cksum 0x1220 -> 0x1b44!] PTR? in-addr.arpa. (44) 12:08: IP (tos 0x0, ttl 128, id 65509, offset 0, flags [none], proto UDP (17), length 131) gateway.domain > gplinux.33984: [udp sum ok] NXDomain q: PTR? in-addr.arpa. 0/1/0 ns: in-addr.arpa. [5s] SOA localhost. nobody.invalid (103) Capturing all TCP/UDP/ICMP packets If you need to capture only TCP, UDP or ICMP packets then you need to use following options to capture only those protocols: Command : tcpdump -i eno tcp 11:10: IP > gplinux.ssh: Flags [.], ack , win 253, length 0 11:10: IP gplinux.ssh > : Flags [P.], seq 1:193, ack 0, win 484, length :10: IP gplinux.ssh > : Flags [P.], seq 193:433, ack 0, win 484, length 240 Command : tcpdump -i eno udp 11:12: IP gplinux > gateway.domain: A? (31) 11:12: IP gplinux > gateway.domain: PTR? inaddr.arpa. (44) 11:12: IP gateway.domain > gplinux.46586: 2645 NXDomain 0/1/0 (103) 11:12: IP gplinux > gateway.domain: PTR? in-addr.arpa. (46) 11:12: IP gateway.domain > gplinux.44592: 1356 NXDomain 0/1/0 (105) 11:12: IP gateway.domain > gplinux.59986: /0/0 CNAME mail.google.com., CNAME googl .l.google.com., A (100)

8 Page 7 Command : tcpdump -i eno icmp 11:14: IP gplinux > google-public-dns-a.google.com: ICMP echo request, id 2355, seq 1, 11:14: IP google-public-dns-a.google.com > gplinux: ICMP echo reply, id 2355, seq 1, 11:14: IP gplinux > google-public-dns-a.google.com: ICMP echo request, id 2355, seq 2, 11:14: IP google-public-dns-a.google.com > gplinux: ICMP echo reply, id 2355, seq 2, Disabling hostname and port translation TCPdump will try to translate IP addresses and port numbers by default which might not be desired in some situation. Use -nn option to disable the name translation for captured packets as follows: Command : tcpdump -nn -i eno N/A Disabling time stamp display TCPdump will append time stamp to each capture packets by default which might not be suitable desired in some situation. Use -t option to disable the time stamp generation for captured packets as follows: Command : tcpdump -t -i eno Output: IP > : ICMP echo request, id 2687, seq 1, IP > : ICMP echo reply, id 2687, seq 1, IP > : ICMP echo request, id 2687, seq 2, IP > : ICMP echo reply, id 2687, seq 2,

9 Page 8 Displaying the content of the packets in ASCII and hexadecimal Use following option to show the content of the captured packets in ACSII format: Command : tcpdump -A -nn -i eno :29: IP > : ICMP echo request, id 2227, seq 1,...!"#$%&'()*+,-./ :29: IP > : ICMP echo reply, id 2227, seq 1,...!"#$%&'()*+,-./ :29: IP > : ICMP echo request, id 2227, seq 2,...I...K. W...\#...!"#$%&'()*+,-./ :29: IP > : ICMP echo reply, id 2227, seq 2, E..T.O...J...K. W...\#..../ !"#$%&'()*+,- And use x option to show the packet content in hexadecimal format or X to display the content in both ASCII and hexadecimal format as follows: 10:36: IP > : ICMP echo request, id 2251, seq 1, 0x0000: d0a c0a8 c886 E..T4`@.@.m... 0x0010: a9e3 08cb 0001 fab4 7c57... W 0x0020: e q... 0x0030: a1b 1c1d 1e1f !"# 0x0040: a2b 2c2d 2e2f $%&'()*+,-./0123 0x0050: :36: IP > : ICMP echo reply, id 2251, seq 1, 0x0000: ff5a a20f E..T.Z...

10 Page 9 0x0010: c0a8 c b1e3 08cb 0001 fab4 7c57... W 0x0020: e q... 0x0030: a1b 1c1d 1e1f !"# 0x0040: a2b 2c2d 2e2f $%&'()*+,-./0123 0x0050: Capturing the link layer header with the packets TCPdump will ignore link layer header in capture so if you need to see the link layer information as well you need to use -e option as follows: Command : tcpdump -e -nn -i eno :41: :0c:29:ad:fa:d7 > 00:50:56:f8:b9:13, ethertype IPv4 (0x0800), length 98: > : ICMP echo request, id 2270, seq 1, length 64 10:41: :50:56:f8:b9:13 > 00:0c:29:ad:fa:d7, ethertype IPv4 (0x0800), length 98: > : ICMP echo reply, id 2270, seq 1, length 64 10:41: :0c:29:ad:fa:d7 > 00:50:56:f8:b9:13, ethertype IPv4 (0x0800), length 98: > : ICMP echo request, id 2270, seq 2, length 64 10:41: :50:56:f8:b9:13 > 00:0c:29:ad:fa:d7, ethertype IPv4 (0x0800), length 98: > : ICMP echo reply, id 2270, seq 2, length 64 Capturing specific amount of packets If you need to capture only few packets instead of all packets use c option to limit amount of captured packets. Limiting number of captured packets is useful especially if you are dealing with huge amount of traffic on the link and only checking few packets from the flows is sufficient for you. Command : tcpdump -c 4 -nn -i eno not port 22

11 Page 10 10:52: IP > : ICMP echo request, id 2295, seq 1, 10:52: IP > : ICMP echo reply, id 2295, seq 1, 10:52: IP > : ICMP echo request, id 2295, seq 2, 10:52: IP > : ICMP echo reply, id 2295, seq 2, 4 packets captured 4 packets received by filter 0 packets dropped by kernel Saving the captured packets into a file TCPdump only capture the packets and do not save the captured ones. If you need to save the captured packets then you have to store them in a file using -w option as follows: Command : tcpdump -w Packet_Capture.pcap -c 4 -nn -i eno N/A Reading the captured packets from a file If you need to check the captured packets saved to file then you need to read those information using - r option as follows: Command : tcpdump -r Packet_Capture.pcap -c 4 -nn -i eno reading from file Packet_Capture.pcap, link-type EN10MB (Ethernet) 10:58: IP > : ICMP echo request, id 2298, seq 1, 10:58: IP > : ICMP echo reply, id 2298, seq 1, 10:58: IP > : ICMP echo request, id 2298, seq 2, 10:58: IP > : ICMP echo reply, id 2298, seq 2,

12 Page 11 Capturing packets for specific port/s If you need to capture packets for specific port then you need to use port option as follows: Command : tcpdump -i eno port 53 11:37: IP gplinux > gateway.domain: A? (31) Or if you need to capture packets sourced from a specific port or destined to a specific port then you need to use src and dst options with port Command : tcpdump -i eno dst port 53 11:37: IP gplinux > gateway.domain: A? (31) Note! If you do not specify any src or dst option for port then TCPdump will capture packets both from or to that specific port. Note! If you need to capture packets for a range of ports instead of a single port then simply use portrange option instead of port option. Command : tcpdump -nn -i eno portrange N/A Capturing packets for specific IP address If you need to capture packets for specific host address then you need to use host option as follows: Command : tcpdump -nn -i eno host :39: IP > : ICMP echo request, id 2581, seq 1,

13 Page 12 11:39: IP > : ICMP echo reply, id 2581, seq 1, Or if you need to capture packets sourced from a specific host address or destined to a specific host address then you need to use src and dst options with host. Note! If you do not specify any src or dst option for host then TCPdump will capture packets both from or to that specific host address. Capturing packets for specific range of address If you need to capture all packets that belongs to specific network address then you need to use net option as follows: Command : tcpdump -nn -i eno net /8 11:46: IP > : ICMP echo request, id 2610, seq 1, 11:46: IP > : ICMP echo reply, id 2610, seq 1, Or if you need to capture packets sourced from a specific network address or destined to a specific network address then you need to use src and dst options with net. Note! If you do not specify any src or dst option for net then TCPdump will capture packets both from or to that specific network address.

IP network tools & troubleshooting. AFCHIX 2010 Nairobi, Kenya October 2010

IP network tools & troubleshooting. AFCHIX 2010 Nairobi, Kenya October 2010 IP network tools & troubleshooting AFCHIX 2010 Nairobi, Kenya October 2010 Network configuration Reminder, configure your network in /etc/ rc.conf ( x = your IP, from.10 to...) ifconfig_bge0= 41.215.76.x/24

More information

tcpdump: network traffic capture

tcpdump: network traffic capture tcpdump: network traffic capture David Morgan The Big Daddy of Open Source Capture tcpdump is the core Open Source packet sniffer program simple, text based program many other programs (such as Ethereal)

More information

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar

More information

netkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s)

netkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s) netkit lab MPLS VPNs with overlapping address spaces Version Author(s) 1.0 S.Filippi, L.Ricci, F.Antonini E-mail Web Description silvia.filippi@kaskonetworks.it http://www.kaksonetworks.it/ A lab showing

More information

EE984 Laboratory Experiment 2: Protocol Analysis

EE984 Laboratory Experiment 2: Protocol Analysis EE984 Laboratory Experiment 2: Protocol Analysis Abstract This experiment provides an introduction to protocols used in computer communications. The equipment used comprises of four PCs connected via a

More information

Introduction to Analyzer and the ARP protocol

Introduction to Analyzer and the ARP protocol Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining

More information

Packet Sniffing with Wireshark and Tcpdump

Packet Sniffing with Wireshark and Tcpdump Packet Sniffing with Wireshark and Tcpdump Capturing, or sniffing, network traffic is invaluable for network administrators troubleshooting network problems, security engineers investigating network security

More information

Homework 3 TCP/IP Network Monitoring and Management

Homework 3 TCP/IP Network Monitoring and Management Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report

More information

----------------------------------------------------------------------------------------------------------------------

---------------------------------------------------------------------------------------------------------------------- The basic commands for the firewall: 1. Command firewalllog -- To check the firewall logs and to find out source, destination, ports, request is passing or blocking and matching firewall rule no. etc superuser@securegate

More information

CSE 127: Computer Security. Network Security. Kirill Levchenko

CSE 127: Computer Security. Network Security. Kirill Levchenko CSE 127: Computer Security Network Security Kirill Levchenko December 4, 2014 Network Security Original TCP/IP design: Trusted network and hosts Hosts and networks administered by mutually trusted parties

More information

Introduction to Passive Network Traffic Monitoring

Introduction to Passive Network Traffic Monitoring Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki antonakd@csd.uoc.gr Active Monitoring Inject test packets into the network or send packets

More information

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005

Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005 Firewall Testing Cameron Kerr Telecommunications Programme University of Otago May 16, 2005 Abstract Writing a custom firewall is a complex task, and is something that requires a significant amount of

More information

Hands On Activities: TCP/IP Network Monitoring and Management

Hands On Activities: TCP/IP Network Monitoring and Management Hands On Activities: TCP/IP Network Monitoring and Management 1. TCP/IP Network Management Tasks TCP/IP network management tasks include Examine your physical and IP network address Traffic monitoring

More information

Unverified Fields - A Problem with Firewalls & Firewall Technology Today

Unverified Fields - A Problem with Firewalls & Firewall Technology Today Unverified Fields - A Problem with Firewalls & Firewall Technology Today Ofir Arkin The Sys-Security Group ofir.arkin@sys-security.com October 2000 1 Introduction The following problem (as discussed in

More information

Network Traffic Evolution. Prof. Anja Feldmann, Ph.D. Dr. Steve Uhlig

Network Traffic Evolution. Prof. Anja Feldmann, Ph.D. Dr. Steve Uhlig Network Traffic Evolution Prof. Anja Feldmann, Ph.D. Dr. Steve Uhlig 1 Example trace Name port % bytes % packets bytes per packet world-wide-web 80???????????? netnews 119???????????? pop-3 mail 110????????????...

More information

netkit lab two-hosts Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group

netkit lab two-hosts Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab two-hosts Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani,

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 5 is due Thursday (Oct. 22) Part 1 (tracking

More information

A Research Study on Packet Sniffing Tool TCPDUMP

A Research Study on Packet Sniffing Tool TCPDUMP A Research Study on Packet Sniffing Tool TCPDUMP ANSHUL GUPTA SURESH GYAN VIHAR UNIVERSITY, INDIA ABSTRACT Packet sniffer is a technique of monitoring every packet that crosses the network. By using this

More information

TCP/IP Networking An Example

TCP/IP Networking An Example TCP/IP Networking An Example Introductory material. This module illustrates the interactions of the protocols of the TCP/IP protocol suite with the help of an example. The example intents to motivate the

More information

+ iptables. packet filtering && firewall

+ iptables. packet filtering && firewall + iptables packet filtering && firewall + what is iptables? iptables is the userspace command line program used to configure the linux packet filtering ruleset + a.k.a. firewall + iptable flow chart what?

More information

Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

Domain Name System 2015-04-28 17:49:44 UTC. 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Domain Name System 2015-04-28 17:49:44 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Domain Name System... 4 Domain Name System... 5 How DNS Works

More information

Innominate mguard Version 6

Innominate mguard Version 6 Innominate mguard Version 6 Application Note: Firewall Logging mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str.

More information

Computer Networks I Laboratory Exercise 1

Computer Networks I Laboratory Exercise 1 Computer Networks I Laboratory Exercise 1 The lab is divided into two parts where the first part is a basic PC network TCP/IP configuration and connection to the Internet. The second part is building a

More information

Configuring DNS on Cisco Routers

Configuring DNS on Cisco Routers Configuring DNS on Cisco Routers Document ID: 24182 Contents Introduction Prerequisites Requirements Components Used Conventions Setting Up a Router to Use DNS Lookups Troubleshooting You Can Ping a Web

More information

Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,

Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm, Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm, Network IDS devices use passive network monitoring extensively to detect possible threats. Through passive

More information

Tcpdump Lab: Wired Network Traffic Sniffing

Tcpdump Lab: Wired Network Traffic Sniffing Cyber Forensics Laboratory 1 Tcpdump Lab: Wired Network Traffic Sniffing Copyright c 2012 Hui Li and Xinwen Fu, University of Massachusetts Lowell Permission is granted to copy, distribute and/or modify

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss13/netlab Equipment for each group: - 1 Server computer (OS: Windows Server 2008

More information

Network Traffic Analysis

Network Traffic Analysis 2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing

More information

Practical Network Forensics

Practical Network Forensics BCS-ISSG Practical Network Forensics Day BCS, London Practical Network Forensics Alan Woodroffe issg@securesystemssupport.co.uk www.securesystemssupport.co.uk Copyright Secure Systems Support Limited.

More information

Sample Configuration Using the ip nat outside source static

Sample Configuration Using the ip nat outside source static Sample Configuration Using the ip nat outside source static Table of Contents Sample Configuration Using the ip nat outside source static Command...1 Introduction...1 Before You Begin...1 Conventions...1

More information

Troubleshooting Tools

Troubleshooting Tools Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs

More information

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs

CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs CS 326e F2002 Lab 1. Basic Network Setup & Ethereal Time: 2 hrs Tasks: 1 (10 min) Verify that TCP/IP is installed on each of the computers 2 (10 min) Connect the computers together via a switch 3 (10 min)

More information

netkit lab static-routing Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group

netkit lab static-routing Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab static-routing Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani,

More information

Domain Name System (DNS) Fundamentals

Domain Name System (DNS) Fundamentals Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center mike.jager@synack.co.nz These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Host Fingerprinting and Firewalking With hping

Host Fingerprinting and Firewalking With hping Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: 1608@nu.edu.pk Naveedafzal gmail.com Abstract: The purpose

More information

Network Agent Quick Start

Network Agent Quick Start Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense

More information

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP CSCE 515: Computer Network Programming TCP/IP IP Network Layer Wenyuan Xu Department of Computer Science and Engineering University of South Carolina IP Datagrams IP is the network layer packet delivery

More information

Unix System Administration

Unix System Administration Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71

More information

Cisco Configuring Commonly Used IP ACLs

Cisco Configuring Commonly Used IP ACLs Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow

More information

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik

Network Security. Chapter 3. Cornelius Diekmann. Version: October 21, 2015. Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Network Security Chapter 3 Cornelius Diekmann Lehrstuhl für Netzarchitekturen und Netzdienste Institut für Informatik Version: October 21, 2015 IN2101, WS 15/16, Network Security 1 Security Policies and

More information

Ulogd2, Advanced firewall logging

Ulogd2, Advanced firewall logging Ulogd2, Advanced firewall logging INL 172 rue de Charonne 75011 Paris, France RMLL 2009, July 8, Nantes Ulogd2, Netfilter logging reloaded 1/ 38 Some words about me NuFW main developper INL co-founder

More information

TCPdump Basics. TCPdump and WinDump are available at: http://www.tcpdump.org/ & http://windump.polito.it/

TCPdump Basics. TCPdump and WinDump are available at: http://www.tcpdump.org/ & http://windump.polito.it/ TCPdump Basics What we will cover: What is/are TCPdump/WinDump? Why use TCPdump? Installation of TCPdump on Unix/Windows It s installed, now what? Changing the amount of data collected Reading TCPdump/WinDump

More information

Building a Linux IPv6 DNS Server

Building a Linux IPv6 DNS Server Building a Linux IPv6 DS Server By David Gordon and Ibrahim Haddad Open Systems Lab Ericsson Research Corporate Unit This article presents a tutorial on building an IPv6 DS Linux server that provides IPv6

More information

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort

Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons

More information

Red Hat Linux Networking

Red Hat Linux Networking The information presented should act as a guide to Red Hat Linux networking. It is intended to be accompanied with training and self study. To access most of these items you will need to have root access,

More information

Computer Networks/DV2 Lab

Computer Networks/DV2 Lab Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced

More information

How do I get to www.randomsite.com?

How do I get to www.randomsite.com? Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

Packet filtering with Linux

Packet filtering with Linux LinuxFocus article number 289 http://linuxfocus.org Packet filtering with Linux by Vincent Renardias About the author: GNU/Linux user since 1993, Vincent Renardias started to

More information

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1 SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,

More information

L3DSR Overcoming Layer 2 Limitations of Direct Server Return Load Balancing

L3DSR Overcoming Layer 2 Limitations of Direct Server Return Load Balancing L3DSR Overcoming Layer 2 Limitations of Direct Server Return Load Balancing Jan Schaumann, Systems Architect ! E2A7 437A 7AB8 6EA1 7E1D! F6DC BF09 CDC9 E157 FAB8! Traditional or

More information

RARP: Reverse Address Resolution Protocol

RARP: Reverse Address Resolution Protocol SFWR 4C03: Computer Networks and Computer Security January 19-22 2004 Lecturer: Kartik Krishnan Lectures 7-9 RARP: Reverse Address Resolution Protocol When a system with a local disk is bootstrapped it

More information

Intro to Linux Kernel Firewall

Intro to Linux Kernel Firewall Intro to Linux Kernel Firewall Linux Kernel Firewall Kernel provides Xtables (implemeted as different Netfilter modules) which store chains and rules x_tables is the name of the kernel module carrying

More information

Linux Routers and Community Networks

Linux Routers and Community Networks Summer Course at Mekelle Institute of Technology. July, 2015. Linux Routers and Community Networks Llorenç Cerdà-Alabern http://personals.ac.upc.edu/llorenc llorenc@ac.upc.edu Universitat Politènica de

More information

TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.

TECHNICAL NOTE. Technical Note P/N 300-999-649 REV 03. EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8. TECHNICAL NOTE EMC NetWorker Simplifying firewall port requirements with NSR tunnel Release 8.0 and later Technical Note P/N 300-999-649 REV 03 February 6, 2014 This technical note describes how to configure

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s)

netkit lab dns Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group Version Author(s) Università degli Studi Roma Tre Dipartimento di Informatica e Automazione Computer Networks Research Group netkit lab dns Version Author(s) E-mail Web Description 2.2 G. Di Battista, M. Patrignani, M.

More information

Introduction to Network Security Lab 1 - Wireshark

Introduction to Network Security Lab 1 - Wireshark Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication

More information

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006 CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on

More information

Command Manual - Network Protocol Quidway S3000 Series Ethernet Switches. Table of Contents

Command Manual - Network Protocol Quidway S3000 Series Ethernet Switches. Table of Contents Table of Contents Table of Contents Chapter 1 ARP Configuration Commands... 1-1 1.1 ARP Configuration Commands... 1-1 1.1.1 arp static... 1-1 1.1.2 arp timer aging... 1-2 1.1.3 debugging arp packet...

More information

How to monitor network traffic inside an ESXi host

How to monitor network traffic inside an ESXi host created by: Rainer Bemsel Version 1.0 Dated: Dec/30/2012 I ve done several packet analyses on physical wired environment which was easy and pretty straight forward to set up. But with all virtualization

More information

DNS Resolving using nslookup

DNS Resolving using nslookup DNS Resolving using nslookup Oliver Hohlfeld & Andre Schröder January 8, 2007 Abstract This report belongs to a talk given at the networking course (Institue Eurecom, France) in January 2007. It is based

More information

EKT 332/4 COMPUTER NETWORK

EKT 332/4 COMPUTER NETWORK UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)

More information

DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.

DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses. Lab Exercise DNS Objective DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses. Step 1: Analyse the supplied DNS Trace Here we examine the supplied trace of a

More information

Introduction To Computer Networking

Introduction To Computer Networking Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.

More information

Packet Sniffing and Spoofing Lab

Packet Sniffing and Spoofing Lab SEED Labs Packet Sniffing and Spoofing Lab 1 Packet Sniffing and Spoofing Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following grants from

More information

Firewalls. Chien-Chung Shen cshen@cis.udel.edu

Firewalls. Chien-Chung Shen cshen@cis.udel.edu Firewalls Chien-Chung Shen cshen@cis.udel.edu The Need for Firewalls Internet connectivity is essential however it creates a threat vs. host-based security services (e.g., intrusion detection), not cost-effective

More information

Understanding and Configuring NAT Tech Note PAN-OS 4.1

Understanding and Configuring NAT Tech Note PAN-OS 4.1 Understanding and Configuring NAT Tech Note PAN-OS 4.1 Revision C 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Scope... 3 Design Consideration... 3 Software requirement...

More information

CS 5410 - Computer and Network Security: Firewalls

CS 5410 - Computer and Network Security: Firewalls CS 5410 - Computer and Network Security: Firewalls Professor Kevin Butler Fall 2015 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire, heat

More information

Firewall Tutorial. KAIST Dept. of EECS NC Lab.

Firewall Tutorial. KAIST Dept. of EECS NC Lab. Firewall Tutorial KAIST Dept. of EECS NC Lab. Contents What is Firewalls? Why Firewalls? Types of Firewalls Limitations of firewalls and gateways Firewalls in Linux What is Firewalls? firewall isolates

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Security Options for BGP with TCP Published: 2014-01-10 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

Lab - Using Wireshark to View Network Traffic

Lab - Using Wireshark to View Network Traffic Topology Objectives Part 1: (Optional) Download and Install Wireshark Part 2: Capture and Analyze Local ICMP Data in Wireshark Start and stop data capture of ping traffic to local hosts. Locate the IP

More information

Network Packet Analysis and Scapy Introduction

Network Packet Analysis and Scapy Introduction Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative

More information

Lab Module 3 Network Protocol Analysis with Wireshark

Lab Module 3 Network Protocol Analysis with Wireshark Pacific Northwest National Laboratory Lab Module 3 Network Protocol Analysis with Wireshark NATO ASI on Energy Infrastructure Security October 2015 PNNL-##### Lab Module 3 Network Protocol Analysis with

More information

Intrusion Detection, Packet Sniffing

Intrusion Detection, Packet Sniffing Intrusion Detection, Packet Sniffing By : Eng. Ayman Amaireh Supervisor :Dr.: Lo'ai Tawalbeh New York Institute of Technology (NYIT)- Jordan s s campus-2006 12/2/2006 eng Ayman 1 What is a "packet sniffer"?

More information

Detection of Promiscuous Nodes Using ARP Packets

Detection of Promiscuous Nodes Using ARP Packets Detection of Promiscuous Nodes Using ARP Packets Version 1.0 Written by: 31Aug01 Daiji Sanai Translated by: Kelvin KingPang Tsang http://www.securityfriday.com 1 Contents Abstract...3

More information

DHCP & Firewall & NAT

DHCP & Firewall & NAT DHCP & Firewall & NAT DHCP Dynamic Host Configuration Protocol DHCP introduction DHCP Dynamic Host Configuration Protocol A system can connect to a network and obtain the necessary information dynamically

More information

20 Command Line Tools to Monitor Linux Performance

20 Command Line Tools to Monitor Linux Performance 20 Command Line Tools to Monitor Linux Performance 20 Command Line Tools to Monitor Linux Performance It s really very tough job for every System or Network administrator to monitor and debug Linux System

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? The Websense Network Agent software component uses sniffer technology to monitor all of the internet traffic on the network machines that you assign to it. Network Agent filters

More information

Guideline for setting up a functional VPN

Guideline for setting up a functional VPN Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the

More information

Lab - Observing DNS Resolution

Lab - Observing DNS Resolution Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the nslookup Command on Mail

More information

Lab 1: Packet Sniffing and Wireshark

Lab 1: Packet Sniffing and Wireshark Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.

More information

No. Time Source Destination Protocol Info 1 0.000000 192.168.1.28 192.168.1.2 DNS Standard query A weather.noaa.gov

No. Time Source Destination Protocol Info 1 0.000000 192.168.1.28 192.168.1.2 DNS Standard query A weather.noaa.gov /tmp/dump/dump02_arp_dns-weather_syn_fin complete-session - Ethereal Page 1 1 0.000000 192.168.1.28 192.168.1.2 DNS Standard query A weather.noaa.gov Frame 1 (76 bytes on wire, 76 bytes captured) Arrival

More information

Optimisacion del ancho de banda (Introduccion al Firewall de Linux)

Optimisacion del ancho de banda (Introduccion al Firewall de Linux) Optimisacion del ancho de banda (Introduccion al Firewall de Linux) Christian Benvenuti christian.benvenuti@libero.it Managua, Nicaragua, 31/8/9-11/9/9 UNAN-Managua Before we start... Are you familiar

More information

Lab 1: Introduction to the network lab

Lab 1: Introduction to the network lab CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,

More information

CS 5410 - Computer and Network Security: Firewalls

CS 5410 - Computer and Network Security: Firewalls CS 5410 - Computer and Network Security: Firewalls Professor Patrick Traynor Spring 2015 Firewalls A firewall... is a physical barrier inside a building or vehicle, designed to limit the spread of fire,

More information

Lab PC Network TCP/IP Configuration

Lab PC Network TCP/IP Configuration Lab PC Network TCP/IP Configuration Objective Identify tools used to discover a computer network configuration with various operating systems. Gather information including connection, host name, Layer

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley abulley@ghana.com

Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley abulley@ghana.com Domain Name System (DNS) Session-1: Fundamentals Ayitey Bulley abulley@ghana.com Computers use IP addresses. Why do we need names? Names are easier for people to remember Computers may be moved between

More information

Host Configuration (Linux)

Host Configuration (Linux) : Location Date Host Configuration (Linux) Trainer Name Laboratory Exercise: Host Configuration (Linux) Objectives In this laboratory exercise you will complete the following tasks: Check for IPv6 support

More information

Firewall Implementation

Firewall Implementation CS425: Computer Networks Firewall Implementation Ankit Kumar Y8088 Akshay Mittal Y8056 Ashish Gupta Y8410 Sayandeep Ghosh Y8465 October 31, 2010 under the guidance of Prof. Dheeraj Sanghi Department of

More information

Figure 1. Wireshark Menu Bar

Figure 1. Wireshark Menu Bar Packet Capture In this article, we shall cover the basic working of a sniffer, to capture packets for analyzing the traffic. If an analyst does not have working skills of a packet sniffer to a certain

More information

Sample Configuration Using the ip nat outside source list C

Sample Configuration Using the ip nat outside source list C Sample Configuration Using the ip nat outside source list C Table of Contents Sample Configuration Using the ip nat outside source list Command...1 Introduction...1 Before You Begin...1 Conventions...1

More information

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent?

Quick Start for Network Agent. 5-Step Quick Start. What is Network Agent? What is Network Agent? Websense Network Agent software monitors all internet traffic on the machines that you assign to it. Network Agent filters HTTP traffic and more than 70 other popular internet protocols,

More information

Technical Support Information Belkin internal use only

Technical Support Information Belkin internal use only The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.

More information

1 Introduction: Network Applications

1 Introduction: Network Applications 1 Introduction: Network Applications Some Network Apps E-mail Web Instant messaging Remote login P2P file sharing Multi-user network games Streaming stored video clips Internet telephone Real-time video

More information

- IPv4 Addressing and Subnetting -

- IPv4 Addressing and Subnetting - 1 Hardware Addressing - IPv4 Addressing and Subnetting - A hardware address is used to uniquely identify a host within a local network. Hardware addressing is a function of the Data-Link layer of the OSI

More information

Guideline to Windows 2003 Network Load Balancing Clustering with Allied Telesyn Switches. What information will you find in this document?

Guideline to Windows 2003 Network Load Balancing Clustering with Allied Telesyn Switches. What information will you find in this document? How To Guideline to Windows 2003 Network Load Balancing Clustering with Allied Telesyn Switches Introduction This is a guideline to Network Load Balancing (NLB) clustering options with Allied Telesyn AT-

More information

Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag

Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag 2005 SWITCH What I am going to present: The Motivation. What are NfSen and nfdump? The Tools in Action. Outlook

More information

Attack Lab: Attacks on TCP/IP Protocols

Attack Lab: Attacks on TCP/IP Protocols Laboratory for Computer Security Education 1 Attack Lab: Attacks on TCP/IP Protocols Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science

More information