Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Need screenshots of the lab , my computer not working with this software. 10.5 C

ID: 3687286 • Letter: N

Question

Need screenshots of the lab , my computer not working with this software. 10.5 COMMAND-LINE PACKET SNIFFING (WINDUMP WinDmp is a command-line packet sniffer. The originalversion, called tepdump, is still widely used on Linux/UNLX systems. Similar to Wireshark, it can be used as a packet sniffer to read network traffic, or as a packet analyzer to identify and resolve networking issues Learning how to use WinDump at the command prompt is valuable because similar commands can be used on Windows-based and Linux-based systems. It is also quick and easy to use once you are familiar with the general syntax. 1. Download WinDump from: http/www.winpcap.or 2. Click on Download Get WinPcap. (You will need to download and install WinPcap before you install WinDump.) 3. Click on Download Get WinPcap (again). 4. Save the file in your C.lsecurity directory 5. Click on the WinDump link at the top of the page. 6. Click on Download Get WinDump 7. Click on Download Get WinDump (again). 8. Save the file in your C:security folder. 9. Open Windows Explorer 10. Browse to your Csecurity folder. 11. Right-click on WinPcap 412 exe. (Always download the latest version of WinPcap. The name of the executable will change as newer versions are released.) 12. Select Run as administrator. 13. Click Next, Next, I agree, Install, and Finish 14. Click Start 15. In the search box type CMD 16. Press Enter. 17. Type ed 18. Press Enter. (Repeat this until you get back to C: 19. Type cd security 20. Press Enter. 21. Type dir 22. Press Enter. Note: If you type the command "windump without options, it may appear that your command prompt has "locked up." This is not the case. Windump is actually running. You can press Ctri+C to cancel the current windump task It will retun you to your command prompt. 23. Type windump -D 24. Press Enter. (This will display all of the available network adapters on your computer. See Figure 10-18.) Note: You will need to be able to determine which adapter you are using for the remainder of the project. In this case, the wired adapter was 6 on the list. The remaining steps will use adapter #6. However, it is likely that you are using a different adapter. You can see a listing of the available adapters in the Control Panel here: Control Panel Network and Internet Network Connections. Page 163

Explanation / Answer

Suppose you want to sniff live HTTP web traffic (i.e., HTTP requests and responses) on the wire for some reason. For example, you may be testing experimental features of a web server. Or you may be debugging a web application or a RESTful service. Or you may be trying to troubleshoot PAC (proxy auto config) or check for any malware files surreptitiously downloaded from a website. Whatever the reason is, there are cases where HTTP traffic sniffing is helpful, for system admins, developers, or even end users.

While packet sniffing tools such as tcpdump are popularly used for live packet dump, you need to set up proper filtering to capture only HTTP traffic, and even then, their raw output typically cannot be interpreted at the HTTP protocol level so easily. Real-time web server log parsers such as ngxtop provide human-readable real-time web traffic traces, but only applicable with a full access to live web server logs.

What will be nice is to have tcpdump-like sniffing tool, but targeting HTTP traffic only. In fact, httpry is extactly that: HTTP packet sniffing tool. httpry captures live HTTP packets on the wire, and displays their content at the HTTP protocol level in a human-readable format. In this tutorial, let's see how we can sniff HTTP traffic with httpry.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote