Steps:
- If you have not already, go ahead and download/install the Wireshark software to your own personal computer -- for use in this lab, as well as your own practice and experimentation. Go to the Wireshark homepage and click Get Acquainted, followed by Download. Choose the version pertinent to your own operating system, of course
- Watch the Introduction to Wireshark video, indicated above.
- Open Wireshark on your computer . This may require admin privileges, but by this version, it hopefully should not. Depending on your OS, your experience may differ...
- Choose a website, ideally one where the interaction is over HTTP and not HTTPS. This is because HTTPS uses encryption -- whereas we would like to have the data in unencrypted form.
- For your site, do the following:
- Start capturing
- Navigate to the page
- Stop capturing
- Make note of the capture time, and mention this in your admin log.
- Choose 3-5 frames, where each frame is using a different protocol (TCP, TLSv1.2, QUIC, etc.)
(Because of the number of data packets, you should spend only a few seconds capturing!)
Upon Completion:
- Complete the entry (or entries) for this lab, and put those contents into your lab report
- Following the entry (or entries), covering the above work, also include the following discussion questions, along with your answers:
- For each of your frames, identify the following info:
- Time
- Source
- Destination
- Protocol
- Length
- Info
- Briefly define what each of these mean, in the context of the Wireshark software, specifically. Consult the Wireshark documentation, if needed.
- Frame Length
- Destination MAC
- Source MAC
- Sequence Number
- Acknowledgement Number
For 2-3 of your frames, identify each of the aforementioned items.
- Where do you see each of the four lower layers of the OSI model at work in the data provided by Wireshark?
- Which parts were easiest to understand, and why?
- Which parts were hardest to understand, and why?
- Do a little bit of research into Wireshark. What are some of the most important ways these captured data packets can be useful to a system or network administrator?
- What are some of the main questions that you have about the material in this lab, moving forward?