Computer Networking LAB 2 HTTP

Similar documents
Wireshark Lab: HTTP SOLUTION

Wireshark Lab: HTTP. 1. The Basic HTTP GET/response interaction

No. Time Source Destination Protocol Info HTTP GET /ethereal-labs/http-ethereal-file1.html HTTP/1.

Wireshark Tutorial INTRODUCTION

Wireshark Lab: Assignment 1w (Optional)

Wireshark Tutorial. Figure 1: Packet sniffer structure

New York University Computer Science Department Courant Institute of Mathematical Sciences

Snare for Firefox Snare Agent for the Firefox Browser

Ethereal: Getting Started

Lab 1: Packet Sniffing and Wireshark

Introduction to Network Security Lab 1 - Wireshark

EKT 332/4 COMPUTER NETWORK

Modern snoop lab lite version

Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL

Webmail Using the Hush Encryption Engine

BASIC ANALYSIS OF TCP/IP NETWORKS

Lab VI Capturing and monitoring the network traffic

Computer Networks/DV2 Lab

Snoopy. Objective: Equipment Needed. Background. Procedure. Due Date: Nov 1 Points: 25 Points

Websense Web Security Gateway: What to do when a Web site does not load as expected

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

Phone Inventory 1.0 (1000) Installation and Administration Guide

loss-tolerant and time sensitive loss-intolerant and time sensitive loss-intolerant and time insensitive

Lab Conducting a Network Capture with Wireshark

Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.

Network Technologies

Network Security, ISA 656, Angelos Stavrou. Snort Lab

Lab - Using Wireshark to View Network Traffic

Chapter 3 Restricting Access From Your Network

HTTP. Internet Engineering. Fall Bahador Bakhshi CE & IT Department, Amirkabir University of Technology

Computer Networks - CS132/EECS148 - Spring

DATA COMMUNICATOIN NETWORKING

Configuring Web services

IDS and Penetration Testing Lab III Snort Lab

DCB Ethernet Tunnel Family Configuration Guide

Content Filtering Client Policy & Reporting Administrator s Guide

IP Filtering for Patton RAS Products

M3-R3: INTERNET AND WEB DESIGN

Enrollment Process for Android Devices

Solution of Exercise Sheet 5

Homework 2 assignment for ECE374 Posted: 02/20/15 Due: 02/27/15

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

Network Security: Workshop

Introduction to Analyzer and the ARP protocol

Background (

COMP 361 Computer Communications Networks. Fall Semester Midterm Examination

BITS-Pilani Hyderabad Campus CS C461/IS C461/CS F303/ IS F303 (Computer Networks) Laboratory 3

OCS Training Workshop LAB14. Setup

Final for ECE374 05/06/13 Solution!!

SUMMARY. e-soft s.r.l.

Elluminate Live! Access Guide. Page 1 of 7

Release Notes: J-Web Application Package Release 15.1A1 for Juniper Networks EX Series Ethernet Switches

Firewalls and Software Updates

DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.

GravityLab Multimedia Inc. Windows Media Authentication Administration Guide

Deployment Guide Microsoft IIS 7.0

Dynamic DNS How-To Guide

LESSON Networking Fundamentals. Understand TCP/IP

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark

Configuring Outlook 2010 Anywhere for UNSW Exchange system.

Lab Module 3 Network Protocol Analysis with Wireshark

1. Do I need to upgrade my Broadband at Home modem firmware?

Configuring PA Firewalls for a Layer 3 Deployment

Smoking and any food or drinks are not permitted in the Applications Lab!

Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.

Setup Guide Revision A. WDS Connector

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

CTIS 256 Web Technologies II. Week # 1 Serkan GENÇ

Setting Up a Dreamweaver Site Definition for OIT s Web Hosting Server

Ethical Hacking as a Professional Penetration Testing Technique

UPPER LAYER SWITCHING

Configuring your client to connect to your Exchange mailbox

Advanced Internetworking

Dragonframe License Manager User Guide Version 1.2.2

Kerio Operator. Getting Started Guide

First Midterm for ECE374 03/24/11 Solution!!

Wireshark Lab: v6.0

Skype characteristics

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture # Apache.


Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ MEng. Nguyễn CaoĐạt

Tableau Server Trusted Authentication

Release Notes. SonicOS is the initial release for the Dell SonicWALL NSA 2600 network security appliance.

Homework 2 assignment for ECE374 Posted: 02/21/14 Due: 02/28/14

If you have questions or find errors in the guide, please, contact us under the following address:

Website Analysis. foxnews has only one mail server ( foxnewscommail.protection.outlook.com ) North America with 4 IPv4.

Wireshark Lab:

Networks and Security Lab. Network Forensics

Packet Sniffing and Spoofing Lab

Tableau Server Trusted Authentication

1 Introduction: Network Applications

Elluminate Live! Access Guide. Page 1 of 7

Managing Qualys Scanners

Computer Networks/DV2 Lab

GreenEye Monitor Setup Guide V1.0 Brultech Research Inc.


Remote Desktop Web Access. Using Remote Desktop Web Access

Transcription:

Computer Networking LAB 2 HTTP 1

OBJECTIVES The basic GET/response interaction HTTP message formats Retrieving large HTML files Retrieving HTML files with embedded objects HTTP authentication and security 2

1. THE BASIC HTTP GET/RESPONSE INTERACTION 1. Start up your web browser 2. Start up the Wireshark packet sniffer 3. Enter http in the filter window 4. Begin Wireshark packet capture 5. Enter the following to your browser http://gaia.cs.umass.edu/wiresharklabs/http-wireshark-file1.html 6. Stop Wireshark packet capture 3

RESULTS Two HTTP messages were captured: the GET message from your browser the response message from the server The packet-contents window shows details of the selected message: the HTTP message was carried inside a TCP segment, which was carried inside an IP datagram, which was carried within an Ethernet frame 4

QUESTIONS 1. Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is the server running? 2. What languages does your browser indicate that it can accept to the server? 3. What is the IP address of your computer? Of the gaia.cs.umass.edu server? 4. What is the status code returned from the server to your browser? 5

QUESTIONS 5. When was the HTML file that you are retrieving last modified at the server? 6. How many bytes of content are being returned to your browser? 7. By inspecting the raw data in the packet content window, do you see any headers within the data that are not displayed in the packet-listing window? If so, name one. 6

2. THE HTTP CONDITIONAL GET/RESPONSE INTERACTION Most web browsers perform object caching and thus perform a conditional GET when retrieving an HTTP object Make sure your browser s cache is empty Firefox, select Tools->Clear Recent History Internet Explorer, select Tools->Internet Options- >Delete 7

STEPS 1. Start up your web browser 2. Start up the Wireshark packet sniffer 3. Enter the following URL into your browser http://gaia.cs.umass.edu/wiresharklabs/http-wireshark-file2.html 4. Select the refresh button on your browser 5. Stop Wireshark packet capture, and enter http in the filter window 8

QUESTIONS 1. Do you see an IF-MODIFIED-SINCE line in the first HTTP GET? 2. Did the server explicitly return the contents of the file? How can you tell? 3. Do you see an IF-MODIFIED-SINCE: line in the second HTTP GET? If so, what information follows the IF-MODIFIED-SINCE: header? 4. What is the HTTP status code and phrase returned from the server in response to this second HTTP GET? Did the server explicitly return the contents of the file? 9

3. RETRIEVING LONG DOCUMENTS 1. Start up your web browser 2. Start up the Wireshark packet sniffer 3. Enter the following URL into your browser http://gaia.cs.umass.edu/wiresharklabs/http-wireshark-file3.html 4. Stop Wireshark packet capture, and enter http in the filter window 10

QUESTIONS 1. How many HTTP GET request messages were sent by your browser? 2. How many data-containing TCP segments were needed to carry the single HTTP response? 3. What is the status code and phrase associated with the response to the HTTP GET request? 11

4. HTML DOCUMENTS WITH EMBEDDED OBJECTS 1. Start up your web browser 2. Start up the Wireshark packet sniffer 3. Enter the following URL into your browser http://gaia.cs.umass.edu/wiresharklabs/http-wireshark-file4.html 4. Stop Wireshark packet capture, and enter http in the filter window 12

QUESTIONS 1. How many HTTP GET request messages were sent by your browser? To which Internet addresses were these GET requests sent? 2. Can you tell whether your browser downloaded the two images serially, or whether they were downloaded from the two web sites in parallel? Explain. 13

5. HTTP AUTHENTICATION 1. Start up the Wireshark packet sniffer 2. Enter the following URL into your browser http://gaia.cs.umass.edu/wiresharklabs/protected_pages/httpwiresharkfile5.html, username is wiresharkstudents, quotes), and the password is network 3. Stop Wireshark packet capture, and enter http in the filter window 14

QUESTIONS 1. What is the server s response (status code and phrase) in response to the initial HTTP GET message from your browser? 2. When your browser s sends the HTTP GET message for the second time, what new field is included in the HTTP GET message? 15