Course: NET-101, Week 12 Time: ~7 hours total across days 2-5 of the week Tools: tcpdump or Wireshark for capture; pcap-tools or Wireshark for analysis; Git for submission Output: Network Snapshot report submitted as a Git repository
Overview
This lab IS the NET-101 capstone. See CAPSTONE.md in this course directory for the full specification, grading rubric, and submission instructions.
This file is a structured checklist for the week. Use it alongside CAPSTONE.md to stay on pace.
Day 1: Capture and first look (~1-2 hours)
Step 1 -- Set up your capture:
You need a network you are authorized to capture traffic on. Options:
- Your home network (you own it; you are authorized)
- The class-provided virtual lab network (your instructor will distribute credentials)
- A dedicated test network you set up (two laptops connected directly, or a VM with a NAT interface)
Step 2 -- Capture traffic:
# On Linux/macOS with tcpdump:
sudo tcpdump -i eth0 -w lab-capture.pcap
# On Windows (Git Bash or WSL2):
# Use Wireshark GUI: Capture > Start on your main interface
# Run for 5-15 minutes while doing normal browsing/activity
# Then Ctrl+C to stop tcpdump
If you want to limit file size to just the required protocols:
sudo tcpdump -i eth0 -w lab-capture.pcap 'port 53 or port 80 or port 443 or arp or port 67 or port 68'
Step 3 -- First look:
Load your capture in pcap-tools or Wireshark.
- What protocols appear in Statistics > Protocol Hierarchy?
- How many packets are in the capture?
- What is the time range of the capture?
- Can you see ARP packets? DHCP packets? DNS queries? TCP connections? TLS sessions?
Write 3-4 sentences in your report's introduction section describing what the capture contains.
Day 2: ARP and DHCP annotation (~1-2 hours)
Step 4 -- Trace ARP:
Apply arp in pcap-tools.
- Find at least one ARP request-reply pair
- Record: who asked, what IP they asked for, who replied, what MAC they provided
- Note: is there any anomalous ARP traffic? (unusual rate, unusual sender?)
Write a paragraph in your report for ARP.
Step 5 -- Trace DHCP:
Apply dhcp in pcap-tools.
- Find the DORA sequence (or the REQUEST/ACK if your capture started after DISCOVER/OFFER)
- Record: what IP was assigned; what lease time; what DNS server was advertised
Write a paragraph in your report for DHCP.
Day 3: DNS and TCP annotation (~1-2 hours)
Step 6 -- Trace DNS:
Apply dns in pcap-tools.
- Find at least 3 DNS queries and their responses
- For each: queried name, record type, returned value, TTL
- Note: are there any NXDOMAIN responses? Any queries to unexpected resolvers?
Write a section in your report for DNS.
Step 7 -- Trace a TCP session:
Apply tcp.flags.syn == 1 and tcp.flags.ack == 0 to find new connection starts.
Pick one TCP session (not TLS -- find a plain TCP session if possible, or use the TLS handshake packets before the encrypted application data).
- Record the three-way handshake: SEQ and ACK numbers at each step
- Record what application-layer protocol appears on top of TCP (HTTP, TLS, SSH, etc.)
- Note: is there a clean teardown (FIN/ACK) or a RST?
Write a section in your report for the TCP session.
Day 4: TLS and anomaly identification (~1-2 hours)
Step 8 -- Trace a TLS session:
Apply tls.handshake.type == 1 to find ClientHellos.
Pick one TLS session.
- Record: SNI value, TLS version negotiated, cipher suite chosen
- What happened after the Finished messages? (application data records)
Write a section in your report for TLS.
Step 9 -- Find an anomaly:
Look for something that does not fit the expected pattern. Examples:
- An ARP request rate that is higher than one request per few minutes
- A DNS query to an unexpected resolver IP (not your router or 8.8.8.8/1.1.1.1)
- A TCP connection that was immediately reset (SYN, RST -- never established)
- A TLS connection where the SNI does not match any domain you browsed to
- A packet with an unexpected protocol on a well-known port
Write a section in your report describing: what you observed, why it looks anomalous, and what you would investigate next.
Day 5: Write-up, review, and submit (~1 hour)
Step 10 -- Write the report:
Your decoding-report.md must have these 5 sections (see CAPSTONE.md for word-count targets):
- What I captured (the network, conditions, tools, duration)
- Protocol inventory (protocols present; time range; packet counts)
- Key conversations (ARP + DHCP + DNS + TCP + TLS traces you performed)
- What was anomalous (the anomaly from Step 9)
- What I could not decode (what remains opaque, and what you would need to learn next)
Step 11 -- Check your repository:
- Is
lab-capture.pcapin the repo? (or a note explaining you used a class-provided capture) - Is
decoding-report.mdpresent and complete? - Do you have at least 3 commits? Check with
git log --oneline - Are the commit messages meaningful?
Step 12 -- Submit:
Push your repository to GitHub or GitLab and email the URL to interested@virtuscyberacademy.org with subject NET-101 capstone, {your-name}.
Notes
- You do NOT need to decode encrypted TLS application data; only the handshake (which is visible in the clear) is required
- If you cannot capture ARP or DHCP (many cloud lab environments suppress them), note this in your report and substitute from a catalog PCAP fixture
- Keep your capture file under 50 MB; filter at capture time if needed