Mobile and Distributed Computing Systems Semester 1 2009 Wireshark Tutorial – Part 1 HTTP and TCP Objective In this tutorial, you will learn how to use Wireshark. Wireshark is a live network monitoring and packet analysing tool. In this exercise, you will use Wireshark to capture live network packets while making a HTTP connection and investigate the packets trying to answer the questions below. Procedure: 1. 2. 3. 4. Start wireshark Click on Capture->Interfaces Click on options next to the interface named DLink DWA547 Leave all options to default except the option “Capture packets in promiscuous mode” ->In windows this option does not work 5. Click on start 6. Open Internet explorer 7. Open any website 8. Click a few links 9. Close IE 10. Stop the packet capture (Capture->stop) Analysis: 1. DNS ? What is it. Do you see DNS packets. Why are they used ? Identify the IP address of the webserver to which you connected from the DNS packet (If you don’t see DNS packets, try to enter a new website and not just www.google.com as this might be in the cache) 2. Which underlying protocol does HTTP use ? Identify the TCP three way handshake from the captured packets 3. Use the Follow TCP Stream from Analyse->Follow TCP Stream to look at the HTTP packets 4. Do you see FIN in the packet. Use step 3 to reconstruct the entire TCP stream and identify why FIN is used PS: Using wireshark to monitor data link layer packets in promiscuous mode is possible but does not work under windows with the DLINK network card. You can still try it at your own time on a linux machine. The following are some useful links to get it working Wireshark Information on WLAN capture setup using Linux http://wiki.wireshark.org/CaptureSetup/WLAN#head7d5b1ad712c3556edc8f0687640caaa056a75706 A open source Linux driver that support Wireshark promiscuous monitoring showing data link layer packets. http://en.opensuse.org/Atheros_madwifi The PDF document resource Wireless Sniffing with Wireshark.pdf