Wednesday, March 10, 2010

Lab 6 Packet Sniffing with Ethereal

Objective: lab 6 was all about using software called Ethereal to view packets that were being transmitted during various network activities.

A sample packet

Type: DNS
Length: 60
Source IP: 10.10.2.204
Destination IP: 129.130.176.1

During the lab I discovered the lack of security when talking about file transfer protocol servers. It is very easy using a free program on the internet to see the FTP password. This just reinforces the idea that one should only use FTP when transmitting files they wouldn't mind anyone seeing. It is too easy to hop on and view anything on an FTP without permission.

The lab also involved ICMP, or Internet Control Message Protocol. It is typically not used to send and receive data between end systems, but rather to send error messages. Within approximately 100 frames you could see 5 different protocols working together; DNS, TCP, NBNS, ARP, and HTTP.

ARP is used to acquire a MAC address from an IP address

No comments:

Post a Comment