aboutsummaryrefslogtreecommitdiff
path: root/netsec-assignment2-S4498062/exercise3/exercise3d
blob: 26dea2df48e2ed57b07f1acd88b4b70f41314ac0 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
The comments summary:

    Summary created by Wireshark  (Git Rev Unknown from unknown)
    
    File: 
       Name: /.../netsec-assignment2-S4498062/exercise3/outputnetsec-01-dec.cap
       Length: 140897136 bytes
       Format: Wireshark/tcpdump/... - pcap
       Encapsulation: IEEE 802.11 Wireless LAN
       Packet size limit: 65535 bytes
    
    
    Time:
       First packet: 2015-09-11 08:52:12
       Last packet: 2015-09-11 09:16:57
       Elapsed: 00:24:45
    
    
    Capture:
    
       Unknown interface:
          Dropped packets: unknown
          Capture filter: unknown
          Link type: IEEE 802.11 Wireless LAN
          Packet size limit 65535 bytes
    
    Statistics:
       Packets: 200052
       Between first and last packet:1485.708 sec
       Avg. packets/sec: 134.651
       Avg packet size: 688.302 bytes
       Bytes: 137696296
       Avg bytes/sec: 92680.617
       Avg Mbit/sec: 0.741

The IP conversations:

    "Address A","Address B","Packets","Bytes","Packets A→B","Bytes A→B","Packets A←B","Bytes A←B","Rel Start","Duration","bps A→B","bps A←B"
    "192.168.84.40","192.168.84.79","4743","550188","2791","323756","1952","226432","0.000000000","1485.2227","1743.88","1219.65"
    "192.168.84.51","192.168.84.68","97598","57695108","61316","5156724","36282","52538384","-0.000003000","1485.7076","27767.10","282900.27"
    "192.168.84.10","192.168.84.62","85260","78089584","51881","75285124","33379","2804460","-0.000004000","1485.6989","405385.64","15101.10"
    "192.168.84.10","192.168.84.47","5570","646120","2788","323408","2782","322712","0.066556000","1485.1628","1742.07","1738.33"
    "192.168.84.10","192.168.84.60","4682","543112","2721","315636","1961","227476","0.975936000","1484.1761","1701.34","1226.14"
    "192.168.84.10","192.168.84.56","1832","150164","919","66168","913","83996","1.014845000","1482.2693","357.12","453.34"

Conversation .10 and .62:
    
    These clients only use TCP. The data seems to be hexadecimal ascii
    characters. I did not convert that to see what they're sending.

Conversation .51 and .68:

    This is similar to the one above.

The protocol hierarchy looks more interesting now (percentages are given in % 
packets):

    - There's some ARP messages (0.18%)
    - But mostly IP (99.82%)
    - Of which most are TCP (92.32%)
    - But also some ICMP (7.5%)

NOTE:
As it turns out, there was something wrong with the network when I sniffed. Another student had the same problem, but retrying later gave
him UDP packets with something like "Insert your student number here". I did not have the time to sniff again and look at the details again.
As a result, I didn't understand what was the point of exercise 4b (see note there as well).
As a proof, I can send you the cap file. Because of its size I will only do that on request (info@camilstaps.nl).