Question

In: Computer Science

Capture DNS records in wireshark You can capture DNS records by executing a nslookup command You...

  1. Capture DNS records in wireshark

You can capture DNS records by executing a nslookup command

You must report which packets represent your DNS query and its DNS response

  1. Capture DHCP records in wireshark

The easiest way to capture DHCP records in wireshark is to

  1. Start wireshark capture
  2. Execute the following command

ipconfig /renew

You must report which packets represent a DHCP query and a DHCP response.

show the steps with the step by step images.

Solutions

Expert Solution

- Kindly upvote if this helped


Steps to follow:
- Open wireshark
- Add filter - port 53 (for DNS)
- Start capturing
- Hit nslookup for google in command prompt.
- Notice captures packets.
- Using Wifi as my system is connected to wifi (refer image below)




This DNS activity has been done for google nslookup.

- 1st represents the request
- 4threpresents the reponse for the DNS.
- Other packets provide additional info about the DNS packets.

1   0.000000        192.168.43.194  192.168.43.1    DNS     85      Standard query 0x0001 PTR 1.43.168.192.in-addr.arpa
2       0.004350        192.168.43.1    192.168.43.194  DNS     85      Standard query response 0x0001 No such name PTR 1.43.168.192.in-addr.arpa
3       0.005915        192.168.43.194  192.168.43.1    DNS     74      Standard query 0x0002 A www.google.com
4       0.751219        192.168.43.1    192.168.43.194  DNS     90      Standard query response 0x0002 A www.google.com A 216.58.197.68
5       0.761750        192.168.43.194  192.168.43.1    DNS     74      Standard query 0x0003 AAAA www.google.com
6       1.405024        192.168.43.1    192.168.43.194  DNS     102     Standard query response 0x0003 AAAA www.google.com AAAA 2404:6800:4002:808::2004
7       10.844031       192.168.43.194  192.168.43.1    DNS     87      Standard query 0x07ef A img-s-msn-com.akamaized.net
8       10.844475       192.168.43.194  192.168.43.1    DNS     87      Standard query 0xd541 AAAA img-s-msn-com.akamaized.net
9       10.981931       192.168.43.1    192.168.43.194  DNS     232     Standard query response 0x07ef A img-s-msn-com.akamaized.net CNAME a1834.dspg2.akamai.net A 23.48.245.201 A 23.48.245.178 A 23.48.245.162 A 23.48.245.171 A 23.48.245.170 A 23.48.245.169 A 23.48.245.179
10      10.981995       192.168.43.1    192.168.43.194  DNS     176     Standard query response 0xd541 AAAA img-s-msn-com.akamaized.net CNAME a1834.dspg2.akamai.net AAAA 2600:140f:e00::1730:f508 AAAA 2600:140f:e00::1730:f511




Related Solutions

[Wireshark ] Using the Wireshark program, capture all the network traffic that is related to opening...
[Wireshark ] Using the Wireshark program, capture all the network traffic that is related to opening a webpage of your choice. In order to get maximum benefit/knowledge from the assignment, it’s recommended to choose a non-trivial web portal for the assignment. Using the captured information (Wireshark Capture), answer the questions below. Explain your answer. Define a display filter that finds the DNS queries and DNS responses. Narrow down the filter so that only these DNS packets are shown that were...
Perform a wireshark capture on your machine and use the wireshark filter to examine ARP packets...
Perform a wireshark capture on your machine and use the wireshark filter to examine ARP packets Save your wireshark capture and submit it Tell me which packet represents an ARP request What is the destination MAC address for the packet ? show step by step with pictures
what is the purpose of DHCP server. what is the purpose of DNS server. what command...
what is the purpose of DHCP server. what is the purpose of DNS server. what command do we use to troubleshoot connectivity between Hosts. what command do we use to lookup ip address. what is the purpose of VPN server. what is the purpose of PROXY server. what is the purpose of FIREWALL server.
Creating and Configuring DNS Zones and Records give the reference also
Creating and Configuring DNS Zones and Records give the reference also
how to Creating and Configuring DNS Zones and Records. provide the reference APA
how to Creating and Configuring DNS Zones and Records. provide the reference APA
Can you figure out of the value at risk is a measure that attempts to capture...
Can you figure out of the value at risk is a measure that attempts to capture the risk within a firm or investment portfolios. And the way of calculating value at risk assumes that daily returns are distributed according to a normal distribution and with high confidence of 95 percent, we can then calculate the value at risk as 1.65 standard deviations below the mean. That approach has been criticized following the financial crisis of 2008. Do you know the...
In 3–4 paragraphs: Enumerate as many DNS errors as you can, and propose a method to...
In 3–4 paragraphs: Enumerate as many DNS errors as you can, and propose a method to detect one of them, or a small cluster of related ones. Analyze the errors you have chosen for their potential to be used as a deliberate or accidental attack (for example, a man-in-the middle attack). Propose a method to reduce or eliminate the risk. Since some problems are only truly fixed by updated software or infrastructure, there may be interim workarounds, so you may...
in order to destroy a DNS server what kind of attack can you propose? discuss possible...
in order to destroy a DNS server what kind of attack can you propose? discuss possible protections to your proposals
GDP and GNP are useless measures as they can not capture the true well-being of a...
GDP and GNP are useless measures as they can not capture the true well-being of a nation - do you agree or disagree? WHY?
A successful attack to the Internet DNS would be devastating. Explain what type of attacks can...
A successful attack to the Internet DNS would be devastating. Explain what type of attacks can be made towards DNS. Why, to-date, such attacks in practice have not been successful? In your answer, you should consider caching in particular. Why such technique has not only proven to provide better performance, which is its original goal, but also protection against security attacks.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT