Lab – Wireshark and Packet Capture with ICMP (v4/v6).
Lab Objectives
1. Install a Windows 10 VM from .iso file
2. Install Wireshark on a VM in your network environment
3. Generate IPv4 and IPv6 traffic for a Wireshark capture
4. Explore and Analyze a packet with Wireshark
Introduction
This lab focuses on the practical application of adding to more important operating systems to the network environment. Windows Workstation is one of the expected OS’s you will find on your network and for this lab we will use the network that you have created already and adding 1 more VM machines to the environment. You can use Wireshark on Windows or Linux platforms. This lab may be completed by in pairs or by yourself (your original work), and collaboration in class and working in groups outside of class is acceptable for working through the hurdles and roadblocks that you may run into during the lab work.
The purpose of the tasks in this lab is to build from last week’s lab, install important network based tools (Wireshark) and to identify elements of a real packet within a packet capture.
Specs and Expected Knowledge
Understanding of VMware, including custom network and custom hardware configurations
Understanding of networking, interface configuration and subnets
Understanding of Wireshark
Virtual Environment
Virtual Machine OS. The virtual machines you will use in this lab will be Windows 10 and Linux. You already have 2 Linux VMs. So, only 1 new machine is being built this week. No Windows license key needed at this point.
All tools that are installed or demonstrated in class are for educational purposes and must only be used on AACC controlled systems where you have expressed access and/or permission, and never to attack a real-world system without legal authority or expressed permission of the network/system owner.
You have permission to conduct active and passive reconnaissance within the course virtual environment.
TASK 1: Growing/Updating the Virtual Environment
Goal: Create 1 additional VMs: a Windows 10 Workstation
Additional applications will need to be installed to complete the lab (Wireshark).
Wireshark can be installed on either Windows or Linux environment.
Iso location will be provided by instructor.
Build Your Environment
Using the guidance below to add additional machines. In general you will:
1. Use the Windows ISO located on your external drive or via dropbox link (Window 10).
If license keys are required I will let you know.
2. Do a Network Check – Once your additional VM is installed, check that it is talking on
the same network with the other 2 linux machines. This is a good time to update your
network topology map for your lab reports.
3. Download and install Wireshark (from the Internet) and install on the Windows or Linux
machine.
4. Once your machines are successfully installed and configured and running with the
wireshark, move onto task 2.
TASK 2: Running Standard Network Commands for
Capture of ICMP IPv4 and IPv6
1. Determine which of your host machines will be generating traffic, and document source and
destination devices and IPs.
2. Open Wireshark and begin capture.
3. Generate traffic for ICMP (IPv4) from another host (or hosts).
4. Capture and save it.
5. Generate traffic for ICMP (IPv6) from another host (or hosts).
6. Capture and save it.
Then continue to task 3.
TASK 3: Analyze Packet Capture
1. In Wireshark, filter for each type of traffic you are looking to locate and identify (ICMP v4 and
v6).
2. Once the packet/frame identified, highlight it.
3. Open the respective layers of the decode to show the following:
a. ICMP – open the ICMP to show you have the correct packets captured/highlighted
4. Note: for each ping, be sure you can see the source IP, destination IP, and payload information respective to each capture. Take screen shots of each. Also include a snapshot of the interface configuration data from each host in your lab experiment.
5. Your IPv6 result should be similar to Figure 2‐16 (page 76 in your textbook). Investigate the IPv4 and IPv6 headers in light of the information in the chapter. Pay particular attention to the Neighbor Solicitation Message. Compare the Type field value to those in Table 2‐15 (page 74, textbook) to verify the type of ICMPv6.
6. NOTE: In your report include a figure (similar to the header structures in your book) that shows the structure of the Neighbor Solicitation message. This means you are drawing this out.
7. Explore the Echo Request and Echo Reply packets in the rest of the capture. Verify the ICMPv6 message types by consulting the following table:
Lab – Wireshark and Packet Capture with ICMP (v4/v6).
Module 2_ Learning Resources_ CTS2400012020FA Module Lab 2 – IPv6 and Wireshark
APA formatting.