3.8.8 Lab - Explore DNS Traffic

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 10

Name: Rigzen Ghising Student ID: 301317743

Lab – Explore DNS Traffic


Objectives
Part 1: Capture DNS Traffic
Part 2: Explore DNS Query Traffic
Part 3: Explore DNS Response Traffic

Background / Scenario
Wireshark is an open source packet capture and analysis tool. Wireshark gives a detailed breakdown of the
network protocol stack. Wireshark allows you to filter traffic for network troubleshooting, investigate security
issues, and analyze network protocols. Because Wireshark allows you to view the packet details, it can be
used as a reconnaissance tool for an attacker.
In this lab, you will install Wireshark on a Windows system and use Wireshark to filter for DNS packets and
view the details of both DNS query and response packets.

Required Resources
 1 Windows PC with internet access and Wireshark installed

Instructions
Step 1: Capture DNS traffic.
a. Open Wireshark and start a Wireshark capture by double clicking a network interface with traffic.

b. At the Command Prompt, enter ipconfig /flushdns clear the DNS cache.
C:\Users\Student> ipconfig /flushdns

 2017 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 1 of 10 www.netacad.com
Lab – Explore DNS Traffic

Windows IP Configuration

Successfully flushed the DNS Resolver Cache.


c. Enter nslookup at the prompt to enter the nslookup interactive mode.
d. Enter the domain name of a website. The domain name www.cisco.com is used in this example. Enter
www.cisco.com at the > prompt.
C:\Users\Student> nslookup
Default Server: UnKnown
Address: 68.105.28.16

> www.cisco.com
Server: UnKnown
Address: 68.105.28.16

Non-authoritative answer:
Name: e2867.dsca.akamaiedge.net
Addresses: 2001:578:28:68d::b33
2001:578:28:685::b33
96.7.79.147
Aliases: www.cisco.com
www.cisco.com.akadns.net
wwwds.cisco.com.edgekey.net
wwwds.cisco.com.edgekey.net.globalredir.akadns.net

e. Enter exit when finished to exit the nslookup interactive mode. Close the command prompt.
f. Click Stop capturing packets to stop the Wireshark capture.

Step 2: Explore DNS Query Traffic


a. Observe the traffic captured in the Wireshark Packet List pane. Enter udp.port == 53 in the filter box and
click the arrow (or press enter) to display only DNS packets.
b. Select the DNS packet labeled Standard query 0x0002 A www.cisco.com.

 2017 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 2 of 10 www.netacad.com
Lab – Explore DNS Traffic

In the Packet Details pane, notice this packet has Ethernet II, Internet Protocol Version 4, User Datagram
Protocol and Domain Name System (query).

c. Expand Ethernet II to view the details. Observe the source and destination fields.

 2017 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 3 of 10 www.netacad.com
Lab – Explore DNS Traffic

Question:

What are the source and destination MAC addresses? Which network interfaces are these MAC
addresses associated with?
The source and destination MAC addresses are 6c:77:a1:9a:28 and 0c:ac:8a:ec:31:34. The MAC address
is associated with the NIC on the PC and the destination MAC is associated with the default gateway.
Type your answers here.

a. Expand Internet Protocol Version 4. Observe the source and destination IPv4 addresses.

Question:

What are the source and destination IP addresses? Which network interfaces are these IP addresses
associated with?
The source and destination IP addresses are 192.168.2.32 and 192.168.2.1. The source IP address is
associated with the NIC on the PC and the destination is associated with DNS server.

 2017 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 4 of 10 www.netacad.com
Lab – Explore DNS Traffic

b. Expand the User Datagram Protocol. Observe the source and destination ports.

Question:

What are the source and destination ports? What is the default DNS port number?
The source port is 59504 and destination port is 53. The default DNS port number is also 53.
Type your answers here.

c. Open a Command Prompt and enter arp –a and ipconfig /all to record the MAC and IP addresses of the
PC.
C:\Users\Student> arp -a

Interface: 192.168.1.10 --- 0x4


Internet Address Physical Address Type
192.168.1.1 cc-40-d0-18-a6-81 dynamic
192.168.1.122 b0-a7-37-46-70-bb dynamic
192.168.1.255 ff-ff-ff-ff-ff-ff static
224.0.0.22 01-00-5e-00-00-16 static
224.0.0.252 01-00-5e-00-00-fc static
239.255.255.250 01-00-5e-7f-ff-fa static
255.255.255.255 ff-ff-ff-ff-ff-ff static

C:\Users\Studuent> ipconfig /all

Windows IP Configuration

 2017 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 5 of 10 www.netacad.com
Lab – Explore DNS Traffic

Host Name . . . . . . . . . . . . : DESKTOP


Primary Dns Suffix . . . . . . . :
Node Type . . . . . . . . . . . . : Hybrid
IP Routing Enabled. . . . . . . . : No
WINS Proxy Enabled. . . . . . . . : No

Ethernet adapter Ethernet:

Connection-specific DNS Suffix . :


Description . . . . . . . . . . . :
Intel(R) PRO/1000 MT Desktop Adapter
Physical Address. . . . . . . . .
08-00-27-80-91-DB:
DHCP Enabled. . . . . . . . . . Yes . :
Autoconfiguration Enabled . . . Yes . :
Link-local IPv6 Address . . . . . :
fe80::d829:6d18:e229:a705%4(Preferred)
IPv4 Address. . . . . . . . . . . :
192.168.1.10(Preferred)
Subnet Mask . . . . . . . . . . 255.255.255.0. :
Lease Obtained. . . . . . . . . . :
Tuesday, August 20, 2019 5:39:51 PM
Lease Expires . . . . . . . . . . :
Wednesday, August 21, 2019 5:39:50 PM
Default Gateway . . . . . . . . 192.168.1.1 . :
DHCP Server . . . . . . . . . . 192.168.1.1 . :
DHCPv6 IAID . . . . . . . . . . 50855975 . :
DHCPv6 Client DUID. . . . . . . . :
00-01-00-01-24-21-BA-64-08-00-27-80-91-DB
DNS Servers . . . . . . . . . . 68.105.28.16 . :
68.105.29.16
NetBIOS over Tcpip. . . . . . . . : Enabled
Question:

Compare the MAC and IP addresses in the Wireshark results to the results from the ipconfig /all results.
What is your observation?
The Mac and IP addresses captured in wireshark are same as addresses listed in command prompt.
Te your answers here.

d. Expand Domain Name System (query) in the Packet Details pane. Then expand the Flags and
Queries.

 2017 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 6 of 10 www.netacad.com
Lab – Explore DNS Traffic

Observe the results. The flag is set to do the query recursively to query for the IP address to
www.cisco.com.

 2017 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 7 of 10 www.netacad.com
Lab – Explore DNS Traffic

Step 3: Explore DNS Response Traffic


a. Select the corresponding response DNS packet labeled Standard query response 0x0002 A
www.cisco.com.

Questions:

What are the source and destination MAC and IP addresses and port numbers? How do they compare to
the addresses in the DNS query packets?
The source and destination are 0c:ac:8a:ec:31:34 and 6c:6a:77:a1:9a:28, and the port number is 53. The
source IP, MAC address and port number in the DNS query packets are now destination addresses and
the destination IP, MAC address and port number in the DNS query packets are now source addresses.
Type your answers here.

 2017 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 8 of 10 www.netacad.com
Lab – Explore DNS Traffic

b. Expand Domain Name System (response). Then expand the Flags, Queries, and Answers. Observe
the results.

Question:

Can the DNS server do recursive queries?


Yes, the DNS can handle recursive queries.
Type your answers here.

c. Observe the CNAME and A records in the answers details.


Question:

How do the results compare to nslookup results?


The results in the wireshark is same as the results from nslookup in the command prompt.
Type your answers here.

Reflection Question
1. From the Wireshark results, what else can you learn about the network when you remove the filter?
By removing the filter, the result shows other packets, such as DHCP and ARP.
Type your answers here.

 2017 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 9 of 10 www.netacad.com
Lab – Explore DNS Traffic

2. How can an attacker use Wireshark to compromise your network security?


An attacker can use wireshark to observe the network traffic and can get sensitive information that’s in packet
details.
Type your answers here.

End of Document

 2017 - 2024 Cisco and/or its affiliates. All rights reserved. Cisco Public Page 10 of 10 www.netacad.com

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy