Question: This is wireshark capture. There 3 questions asked on there. And the anwers are also there. i need someone to show me and explain exatly
1. List the PDU at layers 2, 3, and 4 that were used to transmit your HTTP GET packet. a. Locate your HTTP Get packet in the Packet List and click on it. b. Look in the Packet Detail window to get the PDU information In Layer 2 it is a frame, in Layer 3 it is a packet and in Layer 4 it is a segment. PDU has four fields: the destination service access point, source service access point, control field and information field. 59537993747000 192.168.03.172.162204226 HTTP 277 GET dinapas-83317607 Frane 505: 277 bytes on wire (2216 bits), 277 bytes captured (2216 bits) on interface B Ethernet II, SEC: Horaire_32:eb:ed (08:38:8::e:ed), st: Asustelc cf:be:fx (x:90:17:cf:be:ft) Destination: Asustekc_cf :be:f4 (ac:90:17:cf:be:64) Address: Asustekc_cf :be:fe (ac:9:17:cf:be:ft) .......................... bit: Globally unique address (factory default) ........................ Il bit: Individual stress (unicast) Source: Honzipr_3a:eb:ed (08:2e:8e:3a:eb:ed) Address: Horair_3a:eb:ed (08:3e:8e:3a:eb:ed) ............................ La bit: Globally unique attress (factory default) ... IG bit: Individual address (unicast) Type: IP (0x800) Internet Protocol version 4, Sre: 192.168.43.34 (192.168.23.34), Dst: 178.162.264.226 (178.162.204.226 505354000 21654041170225 HTTP 277 GET /da117606 Frane 505: 277 bytes on wire (2216 bits), 277 bytes captured 2226 bits) on Interface Ethernet 1, Sre: od 00:e: et: Aufbee Cachetefiberf4) ternet Protocol version 4. Se: 192.165.41. C.161.41.3). 178.10.204.226 176.162.204.326) version 4 Header Length 20 bytes Differentiated services Field: Oude CCOO: Outult to 00:-CT (not con capable transport 000000... Differentiated Services Codepine Defit (0) .......taplicit congestion tification: E-ACT Hotel Transport (0) Total Length: 265 Identification O (4838) Flags: O2 Con't Fragment) 0... Reserved bitt otse - Don't fragment Set - More fragments: Not et Fragrant offset: Time to tve: 128 Protocol: TCP (6) reader checksunt Ox7688 [validation disabled Goodt False [Sad: False) source: 192.168.43.192.168.13.4) Destination: 176.10.204.226 78.163.204.2013 (Source GP: ) Destination RP: Unknown SOS 37.593747000 192.168.43.34 178.162 Transmission Control Protocol, Src Port37127 (37127), Dst Port: 80 Source Port: 37127 (37127) Destination Port: 80 (80) [stream Index: 38] (TCP Segment Len: 223) Sequence number: 1 Crelative sequence number) [Next sequence number: 224 (relative sequence number)] Acknowledgment number: 1 Crelative ack number) Header Length: 20 bytes .... 0000 0001 1000 - Flags: Ox018 (PSH, ACK) 000. - Reserved: Not set -Nonce: Not set 0... - congestion window Reduced (CWR): Not set - ECN-Echo: Not set - urgent : Not set Acknowledgment Set 1... - Push: Set .0.. - Reset! Not set ..0. - Syn: Not set ..0-Fin: Not set : (Calculated window Size: 16384] [window size scaling factor : 256) checksum: Ox7f71 [validation disabled) [Good checksum: False) [sad checksum: False] urgent pointer: 0 (SEQ/ACK analysis] [1RTT: 0.274952000 seconds) (bytes in flight: 223] 2. How many different HTTP GET packets were sent by your browser? Not all the HTTP packets are GET packets, so you'll have to look through them to answer this question. 505 37.993747000 192.168.43.34 178.162.204.226 HTTP 277 GET /din.aspx? s=83317607&client=DynGate&p=10000156 HTTP/1.1 347 17.627467000 192.168.43.34 173.194.120.144 HTTP 623 GET /uds/css/small-logo.png HTTP/1.1 345 17.627005000 192.168.43.34 216.58.196.14 HTTP 535 GET /generate_204 HTTP/1.1 343 17.625711000 192.168.43.34 173.194.120.144 HTTP 631 GET /uds/css/v2/search_box_icon.png HTTP/1.1 336 17.585468000 192.168.43.34 173.194.120.144 HTTP 652 GET /uds/css/v2/clear.png HTTP/1.1 277 15.074001000 192.168.43.34 173.194.120.144 HTTP 581 GET /cse/cse.js?cx=010470622406686203020:_xpfzicvcbs HTTP/1.1 213 10.260128000 192.168.43.34 178.162.204.226 HTTP 277 GET /din.aspx?s=83317607&client=DynGate&p=10000155 HTTP/1.1 3. List at least five other protocols that Wireshark displayed in the Packet List window. You will need to clear the filter by clicking on the "Clear" icon that is on the right of the Filter toolbar. 1. ICMPv4 and ICMPv6 (Internet Control and Message Protocol) 2. TCP (Transmission Control Protocol) 3. ARP (Address Resolution Protocol) 4. QUIC 4. DNS (Domain Name System) 5. TLSv1.2 (Transport Layer Security) 1. List the PDU at layers 2, 3, and 4 that were used to transmit your HTTP GET packet. a. Locate your HTTP Get packet in the Packet List and click on it. b. Look in the Packet Detail window to get the PDU information In Layer 2 it is a frame, in Layer 3 it is a packet and in Layer 4 it is a segment. PDU has four fields: the destination service access point, source service access point, control field and information field. 59537993747000 192.168.03.172.162204226 HTTP 277 GET dinapas-83317607 Frane 505: 277 bytes on wire (2216 bits), 277 bytes captured (2216 bits) on interface B Ethernet II, SEC: Horaire_32:eb:ed (08:38:8::e:ed), st: Asustelc cf:be:fx (x:90:17:cf:be:ft) Destination: Asustekc_cf :be:f4 (ac:90:17:cf:be:64) Address: Asustekc_cf :be:fe (ac:9:17:cf:be:ft) .......................... bit: Globally unique address (factory default) ........................ Il bit: Individual stress (unicast) Source: Honzipr_3a:eb:ed (08:2e:8e:3a:eb:ed) Address: Horair_3a:eb:ed (08:3e:8e:3a:eb:ed) ............................ La bit: Globally unique attress (factory default) ... IG bit: Individual address (unicast) Type: IP (0x800) Internet Protocol version 4, Sre: 192.168.43.34 (192.168.23.34), Dst: 178.162.264.226 (178.162.204.226 505354000 21654041170225 HTTP 277 GET /da117606 Frane 505: 277 bytes on wire (2216 bits), 277 bytes captured 2226 bits) on Interface Ethernet 1, Sre: od 00:e: et: Aufbee Cachetefiberf4) ternet Protocol version 4. Se: 192.165.41. C.161.41.3). 178.10.204.226 176.162.204.326) version 4 Header Length 20 bytes Differentiated services Field: Oude CCOO: Outult to 00:-CT (not con capable transport 000000... Differentiated Services Codepine Defit (0) .......taplicit congestion tification: E-ACT Hotel Transport (0) Total Length: 265 Identification O (4838) Flags: O2 Con't Fragment) 0... Reserved bitt otse - Don't fragment Set - More fragments: Not et Fragrant offset: Time to tve: 128 Protocol: TCP (6) reader checksunt Ox7688 [validation disabled Goodt False [Sad: False) source: 192.168.43.192.168.13.4) Destination: 176.10.204.226 78.163.204.2013 (Source GP: ) Destination RP: Unknown SOS 37.593747000 192.168.43.34 178.162 Transmission Control Protocol, Src Port37127 (37127), Dst Port: 80 Source Port: 37127 (37127) Destination Port: 80 (80) [stream Index: 38] (TCP Segment Len: 223) Sequence number: 1 Crelative sequence number) [Next sequence number: 224 (relative sequence number)] Acknowledgment number: 1 Crelative ack number) Header Length: 20 bytes .... 0000 0001 1000 - Flags: Ox018 (PSH, ACK) 000. - Reserved: Not set -Nonce: Not set 0... - congestion window Reduced (CWR): Not set - ECN-Echo: Not set - urgent : Not set Acknowledgment Set 1... - Push: Set .0.. - Reset! Not set ..0. - Syn: Not set ..0-Fin: Not set : (Calculated window Size: 16384] [window size scaling factor : 256) checksum: Ox7f71 [validation disabled) [Good checksum: False) [sad checksum: False] urgent pointer: 0 (SEQ/ACK analysis] [1RTT: 0.274952000 seconds) (bytes in flight: 223] 2. How many different HTTP GET packets were sent by your browser? Not all the HTTP packets are GET packets, so you'll have to look through them to answer this question. 505 37.993747000 192.168.43.34 178.162.204.226 HTTP 277 GET /din.aspx? s=83317607&client=DynGate&p=10000156 HTTP/1.1 347 17.627467000 192.168.43.34 173.194.120.144 HTTP 623 GET /uds/css/small-logo.png HTTP/1.1 345 17.627005000 192.168.43.34 216.58.196.14 HTTP 535 GET /generate_204 HTTP/1.1 343 17.625711000 192.168.43.34 173.194.120.144 HTTP 631 GET /uds/css/v2/search_box_icon.png HTTP/1.1 336 17.585468000 192.168.43.34 173.194.120.144 HTTP 652 GET /uds/css/v2/clear.png HTTP/1.1 277 15.074001000 192.168.43.34 173.194.120.144 HTTP 581 GET /cse/cse.js?cx=010470622406686203020:_xpfzicvcbs HTTP/1.1 213 10.260128000 192.168.43.34 178.162.204.226 HTTP 277 GET /din.aspx?s=83317607&client=DynGate&p=10000155 HTTP/1.1 3. List at least five other protocols that Wireshark displayed in the Packet List window. You will need to clear the filter by clicking on the "Clear" icon that is on the right of the Filter toolbar. 1. ICMPv4 and ICMPv6 (Internet Control and Message Protocol) 2. TCP (Transmission Control Protocol) 3. ARP (Address Resolution Protocol) 4. QUIC 4. DNS (Domain Name System) 5. TLSv1.2 (Transport Layer Security)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
