600 likes | 734 Views
Networking & Wireless Routers VIII Wireshark. 20 Points TU Networking 3342 Dr. Thomas Hicks. ---------------------- Integrity Check ---------------------- As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any Of Your Labs. . Your Name _________________
E N D
Networking & Wireless Routers VIII • Wireshark • 20 PointsTU Networking 3342Dr. Thomas Hicks
---------------------- Integrity Check ----------------------As You Well Know, It Is A Violation Of Academic IntegrityTo Fake The Results On Any Of Your Labs.
Your Name _________________ Name This Presentation: Tom-Hicks-7-Router-Wireless-Lab.pptx{Substitute Your First & Last Names}
Use Visual Studio To Create A File, Called DataTransfer.txtThe File Is To Contain Approximately 75 MB Of Letters A-Z In The Following Format:Replace The Screen Capture Below With Yours!
Use Visual Studio To Create A File, Called DataTransfer.TxtDisplay The File Size.Replace The Screen Capture Below With Yours! This Is Close Enough!
You Will Need Three • Computers • For This Lab
Name System 1, System 2, & Your System CS-_??_ & CS-_??_ & CS-_??_ DataTransfer.txt
Connect All Three Computers To Your Router With A Wireless Adapter
Configure Your D-Link N Access Point To The Proper Static IPCS-1 to CS-4 CS-1 Static DNS = CS-1.cs.trinity.edu Static IP = 131.194.71.119 Router DNS = CS-8.cs.trinity.edu Router IP = 131.194.71.141 Router Gateway = 192.168.1.1Wireless Adapter IP = 192.168.1.20 CS-2 Static DNS = CS-2.cs.trinity.edu Static IP = 131.194.71.120 Router DNS = CS-9.cs.trinity.edu Router IP = 131.194.71.142 Router Gateway = 192.168.1.1Wireless Adapter IP = 192.168.1.21 CS-3 Static DNS = CS-3.cs.trinity.edu Static IP = 131.194.71.121 Router DNS = CS-10.cs.trinity.edu Router IP = 131.194.71.143 Router Gateway = 192.168.1.1Wireless Adapter IP = 192.168.1.22 CS-4 Static DNS = CS-4.cs.trinity.edu Static IP = 131.194.71.179 Router DNS = CS-11.cs.trinity.edu Router IP = 131.194.71.146 Router Gateway = 192.168.1.1Wireless Adapter IP = 192.168.1.23
Configure Your D-Link N Access Point To The Proper Static IPCS-5 to CS-7 CS-5 Static DNS = CS-5.cs.trinity.edu Static IP = 131.194.71.52 Router DNS = CS-12.cs.trinity.edu Router IP = 131.194.71.147 Router Gateway = 192.168.1.1Wireless Adapter IP = 192.168.1.24 CS-6 Static DNS = CS-6.cs.trinity.edu Static IP = 131.194.71.167 Router DNS = CS-13.cs.trinity.edu Router IP = 131.194.71.148 Router Gateway = 192.168.1.1Wireless Adapter IP = 192.168.1.25 CS-7 Static DNS = CS-7.cs.trinity.edu Static IP = 131.194.71.140 Router DNS = CS-14.cs.trinity.edu Router IP = 131.194.71.149 Router Gateway = 192.168.1.1Wireless Adapter IP = 192.168.1.25
Your System Wireless Access Point You May Use Any Device You LikeIdentify & Add PhotoConnect It To Your Router!Replace The Screen Capture Below With Yours! Access Point : ______________________________________ Access Point = _?_ (D-Link USB DWA-130/ Belkin USB Wireless G F5D7050 / Netgear Wireless G PCI Card WG311NA / D-Link USB DWL-G132 / etc.) Made By : __________________________________________ (D-Link, Belkin, Netgear, Linksys, etc.)Attach A Photo Of The Device: (Do Internet Search!)
System 1 Wireless Access Point You May Use Any Device You LikeIdentify & Add PhotoConnect It To Your Router!Replace The Screen Capture Below With Yours! Access Point : ______________________________________ Access Point = _?_ (D-Link USB DWA-130/ Belkin USB Wireless G F5D7050 / Netgear Wireless G PCI Card WG311NA / D-Link USB DWL-G132 / etc.) Made By : __________________________________________ (D-Link, Belkin, Netgear, Linksys, etc.)Attach A Photo Of The Device: (Do Internet Search!)
System 2 Wireless Access Point You May Use Any Device You LikeIdentify & Add PhotoConnect It To Your Router!Replace The Screen Capture Below With Yours! Access Point : ______________________________________ Access Point = _?_ (D-Link USB DWA-130/ Belkin USB Wireless G F5D7050 / Netgear Wireless G PCI Card WG311NA / D-Link USB DWL-G132 / etc.) Made By : __________________________________________ (D-Link, Belkin, Netgear, Linksys, etc.)Attach A Photo Of The Device: (Do Internet Search!)
Configure Your D-Link N Access Point To The Proper Static IPCS-1 to CS-4 CS-1 Static DNS = CS-1.cs.trinity.edu Static IP = 131.194.71.119 Router DNS = CS-8.cs.trinity.edu Router IP = 131.194.71.141 Router Gateway = 192.168.1.1Wireless Adapter IP = 192.168.1.20 CS-2 Static DNS = CS-2.cs.trinity.edu Static IP = 131.194.71.120 Router DNS = CS-9.cs.trinity.edu Router IP = 131.194.71.142 Router Gateway = 192.168.1.1Wireless Adapter IP = 192.168.1.21 CS-3 Static DNS = CS-3.cs.trinity.edu Static IP = 131.194.71.121 Router DNS = CS-10.cs.trinity.edu Router IP = 131.194.71.143 Router Gateway = 192.168.1.1Wireless Adapter IP = 192.168.1.22 CS-4 Static DNS = CS-4.cs.trinity.edu Static IP = 131.194.71.179 Router DNS = CS-11.cs.trinity.edu Router IP = 131.194.71.146 Router Gateway = 192.168.1.1Wireless Adapter IP = 192.168.1.23
Configure Your D-Link N Access Point To The Proper Static IPCS-5 to CS-7 CS-5 Static DNS = CS-5.cs.trinity.edu Static IP = 131.194.71.52 Router DNS = CS-12.cs.trinity.edu Router IP = 131.194.71.147 Router Gateway = 192.168.1.1Wireless Adapter IP = 192.168.1.24 CS-6 Static DNS = CS-6.cs.trinity.edu Static IP = 131.194.71.167 Router DNS = CS-13.cs.trinity.edu Router IP = 131.194.71.148 Router Gateway = 192.168.1.1Wireless Adapter IP = 192.168.1.25 CS-7 Static DNS = CS-7.cs.trinity.edu Static IP = 131.194.71.140 Router DNS = CS-14.cs.trinity.edu Router IP = 131.194.71.149 Router Gateway = 192.168.1.1Wireless Adapter IP = 192.168.1.25
Co • DisableEthernet Cat-5Adapter On All • Three Systems
Disable All Access Points Except The WirelessOn Your System!Replace The Screen Capture Below With Yours!
Disable All Access Points Except The WirelessSystem 1!Replace The Screen Capture Below With Yours!
Disable All Access Points Except The WirelessOn System 2!Replace The Screen Capture Below With Yours!
Co • Install • WiresharkOn Your System
Remote Into Your SystemReplace The Screen Capture Below With Yours
Co • Capture Packets Being Sent To Your System • Grab The Packets
Put a Copy Of DataTransfer.txt In The Share Folder On System 1. Start WireShark. Copy DataTransfer.txt From The Share Folder Of System 1 To Your Desktop Capture Using The Wireless Adapter
Stop The Ethernet Card Capture. Sort By Source. Show Some Of The DataTransfer.txt FileReplace The Capture Below With Yours.
Co • Capture Packets Being Sent From Your System • Grab The Packets
Open The Share Folder Of System 2. Start WireShark. Copy DataTransfer.txt From Your Desktop To The Share Folder Of System 2 Capture Using The Wireless Adapter
Stop The Ethernet Card Capture. Sort By Source. Can You See Data Being Transferred Out? If So, Add A Capture Below; If Not, Explain Below!
Co • Capture Packets Transferred Between Two Other Systems • Grab The Packets
Go To System 1. Open The Share Folder Of System 2. Start WireShark On Your System (No Longer Involved In the Transfer). Copy DataTransfer.txt From System 2 To Desktop System 1 Capture Using The Wireless Adapter
Stop The Ethernet Card Capture. Sort By Source. Can You See Data Being Transferred By Other Systems? If So, Add A Capture Below; If Not, Explain Below!
Co • EnableEthernet Cat-5Adapter On All • Three Systems • Remove The WirelessAdapters
Re-Enable The Cat-5 Adapter On Your SystemRemove The Wireless Adapter.Replace The Screen Capture Below With Yours!
Re-Enable The Cat-5 Adapter On System 1Remove The Wireless Adapter.Replace The Screen Capture Below With Yours!
Re-Enable The Cat-5 Adapter On System 2Remove The Wireless Adapter.Replace The Screen Capture Below With Yours!
Co • Ethernet Cat-5CaptureOn Your System
Start A Capture On Your System. Start A Browser On Your System. Navigate To Carme.cs.trinity.eduShow The HTTP Traffic To Carme.Replace The Screen Capture Below With Yours.
Plug Your System & System 1 Into The Same Switch. Start Wireshark On Your System. Take The Browser On System 1 To Carme . Do You See Carme Browser Request From Other Systems? If So, Add A Capture Below; If Not, Explain Below!
Co • Promiscuous Ethernet Monitoring
Questions #1 Explain : What Is The Difference Between Promiscuous And Non-Promiscuous Wireless Capture? ________________________________________________ ________________________________________________ ________________________________________________ ________________________________________________ ________________________________________________ ________________________________________________ ____ {T/F} Any Ethernet adapter can be used for promiscuous mode monitoring in a wired Ethernet network ____ {T/F} Any Wireless Ethernet adapter is equally good for strength, and other important statistics and indicators.
Questions #2 ____ {T/F} Standard drivers for wireless NICs support promiscuous mode ("RF Monitoring") While the adapter can receive radio signals on a given frequency regardless of the destination MAC address in the packet, the packets that are not addressed to this adapter are _?_ by the driver, and there is no way to make the standard driver pass them to the network monitoring software. _____ {T/F} A number of network monitoring software vendors make special RF monitoring drivers for all wireless adapters.
Questions #3 In order to do promiscuous packet gathering, the user must obtained a supported wireless _?_, install the wireless monitoring program, replace the original driver by the special RF monitoring driver List the Make, Model, and Vendor Of All Wireless Adapters Made Available To You By Dr. Hicks. ______________________________________________ ______________________________________________ ______________________________________________ ______________________________________________ ______________________________________________ ______________________________________________ ______________________________________________
Questions #4 The Real Question : [ "Is there a RF monitoring driver for my Wi-Fi card and operating system?"]Do An Internet Search For Each Of The Adapters Listed On The Previous Slide. Adapter RF Monitoring Driver _________________________________ _______ {Y/N} _________________________________ _______ {Y/N} _________________________________ _______ {Y/N} _________________________________ _______ {Y/N} _________________________________ _______ {Y/N} _________________________________ _______ {Y/N} _________________________________ _______ {Y/N}
Questions #5 Software to do promiscuous packet gathering is called a W_?_ A_?_ Aside from the problems related to NIC drivers, wireless traffic is sometimes encrypted using WEP (an older standard) or WPA. A good WLAN Analyzer must be capable of _?_ encrypted network traffic on the fly utilizing a user-provided WEP or WPA-PSK key. A WLAN analyzer may not be required if all you need to monitor is the traffic between the wireless stations and the Internet. Using a standard, non-wireless monitor on a M_?_ port would make it possible to capture the packets being sent and received through the access point. A network layout illustrating this method is shown below.
Questions #6 Software to do promiscuous packet gathering is called a W_?_ A_?_ Aside from the problems related to NIC drivers, wireless traffic is sometimes encrypted using WEP (an older standard) or WPA. A good WLAN Analyzer must be capable of _?_ encrypted network traffic on the fly utilizing a user-provided WEP or WPA-PSK key. A WLAN analyzer may not be required if all you need to monitor is the traffic between the wireless stations and the Internet. Using a standard, non-wireless monitor on a M_?_ port would make it possible to capture the packets being sent and received through the access point. A network layout illustrating this method is shown below.
Co • Packet Monitoring Software