0% found this document useful (0 votes)
4 views11 pages

21MIS7154 Exp-2

The document outlines an experiment conducted by Rajavari Yeshwanth to demonstrate the use of Wireshark, a network protocol analyzer, for sniffing router traffic. It includes details about the software required, the theory behind Wireshark, and a comparison table of traffic data from three websites: Google, Facebook, and Flipkart. The conclusion confirms the successful demonstration of the experiment.

Uploaded by

Yeshwanth Yesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views11 pages

21MIS7154 Exp-2

The document outlines an experiment conducted by Rajavari Yeshwanth to demonstrate the use of Wireshark, a network protocol analyzer, for sniffing router traffic. It includes details about the software required, the theory behind Wireshark, and a comparison table of traffic data from three websites: Google, Facebook, and Flipkart. The conclusion confirms the successful demonstration of the experiment.

Uploaded by

Yeshwanth Yesh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

CYBER SECURITY AND DIGITAL FORENSICS

EXPERIMENT NO 2

NAME: Rajavari Yeshwanth REG NO:21MIS7154

Aim: Perform Experiment to demonstrate the use of Wire shark Network analyser to sniff for
router traffic.
Software Required: Wire shark Software Tool
Theory:Wireshark is a network protocol analyzer, or an application that captures packets from a
network connection, such as from your computer to your home office or the internet. Packet is
the name given to a discrete unit of data in a typical Ethernet network. Wireshark is the most
often-used packet sniffer in the world.

Website 1:Facebook.com
Verification:

Website 2 : Google.com
Verification:
Website 3 : flipkart.com
Comparison table:
Parameter www.google.com www.facebook.co www.flipkart.com
m

Frame No. 430 83 21

Interface ID 0 0 0
66 bytes (528 bits)
Frame Length 66 bytes (528 66 bytes (528
bits) bits)

Bytes on Wire 66 bytes 66 bytes 66 bytes

Source MAC Address Sophos_6b:fe:b4 Sophos_6b:fe:b4 Sophos_6b:fe:b4

Destination MAC Address IntelCor_fc:08:5a IntelCor_fc:08:5a IntelCor_fc:08:5a

Ethernet Type 0x0800 0x0800 0x0800

IP Version 4 4 4

IP Header Length 20 bytes 20 bytes 20 bytes

Source IP Address 13.107.4.52 185.148.3.78 20.189.173.10

Destination IP Address 172.18.145.159 172.18.145.159 172.18.145.159

Source Port 80 50868 443

Destination Port 54971 55161 55338

TCP Payload Size - - -

Checksum Status Unverified Unverified Unverified


Conclusion:Hence we have Perform Experiment to demonstrate the use of Wire shark Network

analyser to sniff for router traffic.

You might also like