Course: NET-101, Week 2
Time: ~90 minutes
Tools: Academy pcap-tools workbench at /pcap-tools/
Captures: fundamentals-arp-request-reply.pcap, arp-storm.pcap
Part 1: Normal ARP exchange (~30 minutes)
Load fundamentals-arp-request-reply.pcap in pcap-tools. This capture contains two packets: one ARP request and one ARP reply.
Exercise 1.1 -- Ethernet header:
Click the ARP request packet. Expand "Ethernet II" in the packet detail pane.
- What is the destination MAC address? (Write it out in full: XX:XX:XX:XX:XX:XX)
- What does that destination MAC tell you about the type of this frame? (Hint: compare to
ff:ff:ff:ff:ff:ff) - What is the source MAC address?
- What is the EtherType field value? What protocol does it indicate?
Click the ARP reply packet. Expand "Ethernet II."
- What is the destination MAC address of the reply? Is this a broadcast or unicast?
- The reply's destination MAC should be the same as the request's source MAC. Verify this.
Exercise 1.2 -- ARP fields:
Click the ARP request packet. Expand "Address Resolution Protocol (request)."
- What is the Operation field value? What does it mean?
- What is the Sender Protocol Address (sender's IP)?
- What is the Target Protocol Address (the IP being queried)?
- What is the Target Hardware Address? Why is it all zeros?
Click the ARP reply packet. Expand "Address Resolution Protocol (reply)."
- What is the Operation field value?
- What is the Sender Hardware Address in the reply? This is the answer to the ARP question.
- What is the Sender Protocol Address in the reply?
Write a one-paragraph summary: In plain English, describe what happened in this two-packet exchange. Include: who asked, what they asked, who answered, and what information was exchanged.
Part 2: ARP anomaly -- the storm (~30 minutes)
Load arp-storm.pcap. Apply the display filter arp.
Exercise 2.1 -- Statistics:
- How many total ARP packets are in the capture?
- Apply
arp.opcode == 1. How many ARP requests? - Apply
arp.opcode == 2. How many ARP replies? - What is the ratio of requests to replies? Is this what you would expect from normal ARP behavior?
Exercise 2.2 -- Source analysis:
Remove the filter and look at the packet list.
- Is there one source MAC address responsible for most of the ARP requests, or many sources?
- What IP address is being requested most frequently?
- What is the approximate time (in seconds) between consecutive ARP requests? You can see the Time column in the packet list. Wireshark > Preferences > Columns to add "Time Delta" if needed.
Exercise 2.3 -- Anomaly reasoning:
- In a normal network, when does a host send an ARP request? How often does it need to do this?
- Based on the rate and volume you observed, what do you think is generating these ARP requests? (Hypothesize; you do not need to be certain.)
- If you were monitoring this network and saw this pattern, what would you do next?
Part 3: Write a display filter and artifact
Exercise 3.1:
Write a single Wireshark display filter that would show ONLY the ARP requests from arp-storm.pcap where the source MAC is the main offender you identified in Exercise 2.2.
Hint: arp.src.hw_mac == "XX:XX:XX:XX:XX:XX" and arp.opcode == 1
Test your filter. How many packets match?
Artifact:
Create a file lab-2-1.md in your net-101/ Git repository with:
- Your answers to Exercises 1.1, 1.2 (summary paragraph), 2.1, 2.2, 2.3
- Your display filter from Exercise 3.1
- One additional observation from either capture that you found interesting and were not prompted to record
Commit the file with a meaningful commit message.
Grading criteria
- Exercise 1.1-1.2: all fields correctly identified and described (10 pts)
- Part 1 summary paragraph: accurate, in your own words (10 pts)
- Exercise 2.1-2.3: anomaly identified; questions answered accurately (10 pts)
- Exercise 3.1: filter correct and tested (5 pts)
- Artifact committed to Git (5 pts)