{"id":130,"date":"2025-11-24T01:38:28","date_gmt":"2025-11-24T01:38:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/?p=130"},"modified":"2025-11-24T01:38:33","modified_gmt":"2025-11-24T01:38:33","slug":"cyse-301-assignment-2-using-wireshark","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/2025\/11\/24\/cyse-301-assignment-2-using-wireshark\/","title":{"rendered":"CYSE 301 Assignment 2: Using Wireshark"},"content":{"rendered":"\n<p>Carter Hendrick<\/p>\n\n\n\n<p>CYSE 301<\/p>\n\n\n\n<p>9\/30\/24<\/p>\n\n\n\n<p>Assignment #2<\/p>\n\n\n\n<p>Task A:<\/p>\n\n\n\n<p>Q1. How many packets are captured in total? How many packets are displayed?<\/p>\n\n\n\n<p>Total Packets: 132<\/p>\n\n\n\n<p>Total Packets Displayed: 132<\/p>\n\n\n\n<p><br>Q2. Apply \u201cICMP\u201d as a display filter in Wireshark. Then repeat the previous question (Q1).<\/p>\n\n\n\n<p>ICMP filter packets: 24<\/p>\n\n\n\n<p><br>Q3. Select an Echo (replay) message from the list. What are the source and destination IPs of this packet? What are the sequence number and the size of the data? What is the response time?<\/p>\n\n\n\n<p>Echo message: source 192.168.217.3, Destination: 192.168.10.18, Sequence #: 1\/256, Size: 98 bytes, 784 bits, response time: 0.002151500 seconds<\/p>\n\n\n\n<p><br>Q4. Apply \u201cDNS\u201d as a display filter in Wireshark. How many packets are displayed?<\/p>\n\n\n\n<p>DNS packets displayed: 104<\/p>\n\n\n\n<p><br>Q5. Find a DNS query packet. What is the domain name this host is trying to resolve? What is the source IP and port number, destination IP and port number? Please express in the format: IP: port.<\/p>\n\n\n\n<p>Domain Name: contile.services.mozilla.com<\/p>\n\n\n\n<p>Source IP: 192.168.217.3: Port 40864 Destination IP: 192.168.217.2 Port: 53<\/p>\n\n\n\n<p><br>Q6. Find the corresponding DNS response to the query you selected at the previous step, and what is the source IP and port number, destination IP and port number? What is the message replied from the DNS server?<\/p>\n\n\n\n<p>Source IP: 192.168.217.2 Port: 53, Destination IP: 192.168.217.3 Port: 40864<\/p>\n\n\n\n<p>Response: Refused<\/p>\n\n\n\n<p>1. Sniff ICMP traffic (10 + 10 = 20 points)<br>Open two terminals on External Kali VM. Use one ping Ubuntu VM and use the other ping<br>Internal Kali.<br>a. Apply proper display or capture filter on Internal Kali VM to show active ICMP traffic.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"660\" src=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt1-1024x660.png\" alt=\"\" class=\"wp-image-131\" srcset=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt1-1024x660.png 1024w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt1-300x193.png 300w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt1-768x495.png 768w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt1-750x484.png 750w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt1.png 1290w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><br>b. Apply a proper display or capture filter on the internal Kali VM that ONLY displays the<br>ICMP request that originated from the external Kali VM and goes to the Ubuntu 64-bit<br>VM.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"597\" src=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt2-1024x597.png\" alt=\"\" class=\"wp-image-132\" srcset=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt2-1024x597.png 1024w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt2-300x175.png 300w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt2-768x448.png 768w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt2-750x437.png 750w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt2.png 1226w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>*I Applied this filter by going to Statistics, then conversations, selected the External kali to ubuntu conversation and selected the A \uf0e0 B option and applied it from there.<\/p>\n\n\n\n<p><br>2. Sniff FTP traffic<br>a. Ubuntu VM is also serving as an FTP server inside the LAN network. Now, you need to<br>use External Kali to access this FTP server by using the command: ftp [ip_addr of ubuntu<br>VM]. The username for the FTP server is cyse301, and the password is password.<\/p>\n\n\n\n<p><br>b. Unfortunately, Internal Kali, the attacker, is also sniffing into the communication.<br>Therefore, all of your communication is exposed to the attacker. Now, you need to find<br>out the password used by External Kali to access the FTP server from the intercepted<br>traffic on Internal Kali. You need to take a screenshot and explain how you found the<br>password.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"578\" src=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt3-1024x578.png\" alt=\"\" class=\"wp-image-134\" srcset=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt3-1024x578.png 1024w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt3-300x169.png 300w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt3-768x433.png 768w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt3-750x423.png 750w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt3.png 1430w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>*For some reason the password was not working or I missed something<\/p>\n\n\n\n<p>To find this information, I followed the packets until I saw the packets that had codes like 210,230, and 331 which were codes also shown when attempting to gain access to the FTP server. Then I noticed the \u201cHidden segment\u201d packet that was under the request password. I right clicked that packet then went to follow and clicked the option for the TCP stream which then showed me the entire interaction between the connection of the external Kali machine and the FTP server of the Ubuntu machine.<\/p>\n\n\n\n<p><br>c. After you successfully find the username &amp; password from the FTP traffic, repeat the<br>previous step (2.a), and use your MIDAS ID as the username and UIN as the password to<br>access the FTP server from External Kali. Although External Kali may not access the<br>FTP server, you need to intercept the packets containing these \u201csecrets\u201d from the<br>attacker VM, which is Internal Kali.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"594\" src=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt4-1024x594.png\" alt=\"\" class=\"wp-image-133\" srcset=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt4-1024x594.png 1024w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt4-300x174.png 300w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt4-768x446.png 768w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt4-750x435.png 750w, https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-content\/uploads\/sites\/40163\/2025\/11\/Assignment2_pt4.png 1515w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>For this one I did the same thing but instead went straight to the USER request and followed the TCP stream which showed me the rest of the interaction<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Carter Hendrick CYSE 301 9\/30\/24 Assignment #2 Task A: Q1. How many packets are captured in total? How many packets are displayed? Total Packets: 132 Total Packets Displayed: 132 Q2. Apply \u201cICMP\u201d as a display filter in Wireshark. Then repeat the previous question (Q1). ICMP filter packets: 24 Q3. Select an Echo (replay) message from &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/2025\/11\/24\/cyse-301-assignment-2-using-wireshark\/\">Continue reading<\/a><\/p>\n","protected":false},"author":25850,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":8},"categories":[8],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/posts\/130"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/users\/25850"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/comments?post=130"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/posts\/130\/revisions"}],"predecessor-version":[{"id":135,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/posts\/130\/revisions\/135"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/media?parent=130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/categories?post=130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/carterhendrick-eportfolio\/wp-json\/wp\/v2\/tags?post=130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}