Beruflich Dokumente
Kultur Dokumente
Location: *
Equipment: Fujitsu Laptop running Win 8.1 (64bit)
Browser : Chrome
Local IP address : 192.168.2.74
Task I
The first task was to capture all TCP traffic to/from Facebook while logging into a
Facebook Account and then analyze the Data.
A filter to record only TCP traffic to and from 31.13.71.96 (The IP address of
Facebook) was set and the capture was saved to Facebook 31.13.71.96.pcapng.
This was accomplished using the Capture Filter:
tcp and host 31.13.71.96
The login process was completed and the capture was stopped. A total of 315
Packets were captured over the 15 seconds that the process took to complete.
Display filters to filter these packets by destinations were used to trace the
ip.dst==31.13.71.96
ip.dst==192.168.2.74
number of packets to and from Facebook and we determined that we received
212 packets from Facebook while we sent 103 packets to it. Close to a 2:1 ratio
for the number of packets received to that sent.
Display filters were then written to analyze the flags set in the captured packets.
The following provides a summary of the Filter expressions used and the data that
was gathered from the results.
To Determine number of TCP packets with SYN flag set and sent to
Facebook:
Display Filter =
tcp.flags.syn==1 && ip.dst==31.13.71.96
Packets Sent With SYN flag set = 2
To Determine number of TCP packets with PSH Flag set and sent to host:
Display Filter =
tcp.flags.push==1 && ip.dst==192.168.2.74
Packets Received With PSH flag set = 85
To Determine number of TCP packets with PSH flag set and sent to
Facebook:
Display Filter =
tcp.flags.push==1 && ip.dst==31.13.71.96
Packets Sent With PSH flag set = 28
To Determine number of TCP packets with PSH or SYN flags set and sent to
Facebook:
Display Filter =
(tcp.flags.push==1||tcp.flags.syn==1) &&
ip.dst==31.13.71.96
Packets Sent With SYN flag set = 30
Summary of Analysis
From A, we can see that the percentage of Packets with SYN set is 1.3%, with 4 in
315 packets having SYN set. Two of these packets were sent to Facebook while
two were received. So these are the two packets initially broadcasted when the
connection is setup and the two response acknowledgement packets sent from
Facebook.
From B, we can see that the percentage of Packets with PSH set is 35.9% with 113
in 202 packets having PSH set. 28 of these were sent to Facebook and 85 were
received, implying that a total of 28 Data segments were Sent to Facebook and 85
segments were received.
From C, we can see that a total of 87 Packets were sent with SYN or PSH set were
received and a total of 30 Packets were received.
From D, We see that no reset was triggered and that the connection remained the
same for the entire duration of the capture.
Task II
The next task was to capture all HTTP traffic to and from Facebook while logging
into an Account.
For this a Capture Filter was used to isolate TCP data headed to port 80 at
Facebooks IP:
tcp port 80 and host 31.13.71.96
The login process was completed and the capture was saved to raw.pcapng. 14
HTTP packets were captured over the duration of 20 seconds.
The number of Packets sent to Facebook was determined using the filter
ip.dst==31.13.71.96
A total of 8 Packets were sent to Facebook. i.e. 8/14 Packets
The number of Packets received from Facebook was determined by using the
filter:
ip.dst==192.168.2.74
A total of 6 Packets were received. i.e. 6/14 Packets.
Task III
The last task was to capture all traffic to and from YouTube while playing a
popular video.
For this task we picked The Flash - Extended Trailer
https://www.youtube.com/watch?v=Yj0l7iGKh8g).
(URL
No capture filters were utilized as YouTube servers may change during streaming.
The capture was saved to flashmovietrailer.pcapng. A total of 16889 Packets
were received, within the 5.76 minutes of capture.
Large amounts of traffic have been observed to IP 173.194.130.18, but
communication to YouTube isnt limited to this single server. For the sake of
Histogram
12
10
8
6
4
2
0
20
40
60
80
100 120 140 160 180 200 220 240 260 280 300 320 340
TIME (seconds)
Histogram
NO OF PACKET WITH PSH FLAG SET
160
140
120
100
80
60
40
20
0
0
20
40
60
80 100 120 140 160 180 200 220 240 260 280 300 320 340
TIME (seconds)
When A and B are observed, a correlation can be found between the number of
push instances and sync instances for majority of the transmission, it could be
related to a reestablishment of connection after a segment is transmitted, since
more push instances mean more data segments are transmitted.
Histogram
11000
NO OF PACKETS
9000
7000
5000
3000
1000
-1000
SIZE RANGES
We can see from C that close to 1/3rd of all transmissions take place with very
small Packet sizes and 2/3rd of all transmissions take place with very large packet
sizes and only an ignorable fraction of packets are of sizes in between.
References:
http://www.ece.rutgers.edu/~marsic/books/CN/projects/wireshark/ws-project-1.html
https://ask.wireshark.org
https://www.wireshark.org
http://wiki.wireshark.org/CaptureFilters#Default_Capture_Filters
http://www.howtogeek.com/104278/how-to-use-wireshark-to-capture-filter-and-inspect-packets/
http://www.webyield.net/ip/index.php
https://www.youtube.com/watch?v=RyxPp22x9PU
http://www.youtube.com/watch?v=Yj0l7iGKh8g
http://packetlife.net/library/cheat-sheets/