Digital Assignment (Lab) - 2: LAB SLOT: L31+32 Name: REG. NO.
Digital Assignment (Lab) - 2: LAB SLOT: L31+32 Name: REG. NO.
Digital Assignment (Lab) - 2: LAB SLOT: L31+32 Name: REG. NO.
DIGITAL ASSIGNMENT(LAB)-2
LAB SLOT: L31+32
Gateway:- 192.168.43.77
AKSHIT SAWNANI
18BIT0318
Wireshark [6 marks]
1. Send a packet to vulnerable website and capture the username
and password of the website in TCP stream of wireshark
[ clear snapshot of username: regno, password: firstname in
wireshark panel and snapshot of website where username and
password is entered]
USERNAME: 18BIT0318
PASSWORD: AKSHIT
To sniff username and passwords we need to use the TCP stream on a http POST
request, so we use the command to extract out the http POST request, i.e.,
http.request.method==POST
AKSHIT SAWNANI
18BIT0318
To sniff out the username and password we go to HTML Form URL Encoded, and
we get the username and password mentioned.
To sniff out the username and password following TCP Stream we need to go to
cookies and click on follow and then click on TCP Stream.
AKSHIT SAWNANI
18BIT0318
Result obtained:-
AKSHIT SAWNANI
18BIT0318
This gives us information about the gateway for the switching between routers
from server side and the client side, generally the IP address for both source and
destination.
AKSHIT SAWNANI
18BIT0318
This provides us information about the Source IP and Destination IP of the hosts,
whether it is a IPv4 or IPv6, total length of this header, flags if any, Offset bits, the
protocol used, and the header checksum to check when it reaches the destination.
This gives us information about the source and destination port number related to
each data packet on where transmission takes place, it also contains information
about the length of this segment.
AKSHIT SAWNANI
18BIT0318
Nmap [4 marks]:-
clear snapshot of your ipaddr
Ipaddr=192.168.43.153
AKSHIT SAWNANI
18BIT0318
Digital Signature