计算机网络--从服务器上传输大文件到客户端,并用wireshark抓包并分析(英文生肉)

Parsing the packets caught by wireshark (Computer Network Final project)

In this report, I will introduce how I established my server on public net. How I established the file transportation. And using the wireshark to parse the packets caught by it.

According to the homework requirements, here is the table corresponding to it.

Tasks Corresponding directory
1.Build a server and client 1 and 2
2.Transmit video 4.3.3
3.Capture TCP/IP packets 3
3.Analyze TCP/IP packets 4

1. Server build

My server is on the public net. And it is from aliyun. Just buy a server first.

在这里插入图片描述

在这里插入图片描述

After perchasing it, we could use ping command to check if we could connect successfully:
we could use cmd command “Ping + IP” to check it.

在这里插入图片描述

And because we are going to use port 21 to transfer, we should configure the firewall.

在这里插入图片描述

2. Establish the file transportation

Here we used the FileZilla application to handle the file transportation. First we put it on the server and configure it.

2.1 Server Configuration

First we download the server edition of FileZilla. And Enter the information like the picture below:

在这里插入图片描述

After entered it without error, you are supposed to click the 1st button, and click “General” and “add”, then it is your work to input a new user.

在这里插入图片描述

And set the shared folder.

在这里插入图片描述

Also here you could configure which of the authorities you are going to give to the user. For example, I gave the user all of the autorities.

在这里插入图片描述

Then just click OK, you could finish the configuration of server.

2.2 Client Configuration

First we downloaded the FileZilla client editon and open it.

Click the connect configuration button and add a new site. Input the host address and User and password in the corresponding blanket.

在这里插入图片描述

Here you may meet thousands of kinds of errors, which I meet here is 425 error. I failed to retrieve directory listing.

在这里插入图片描述

To hanlde this problem, go to server and edit : User->General->Force SSL for user login.

在这里插入图片描述

And then, we could establish the connection.

3. Start the file transportation and sniffing the packets

Open the wireshark application and start to sniff the packets:

In order to help us analysis the packets we have caught, we should add a filter otherwise the number of packets is to large to analysis.

The filter is to filt out the packets which source IP address or destination IP address is my server’s IP address. We could use command below to do this.

ip.addr == xxxx.xxxx.xxxx.xxxx
(ip.src == xxxx.xxxx.xxxx.xxxx) or (ip.dst == xxxx.xxxx.xxxx.xxxx)

[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-CCuHc13V-1607931929278)(https://pad.degrowth.net/uploads/upload_9d5c884c0546b417c1cf2e0ebcd5896f.png =300x)]

Then open the FileZilla to download the file from the server.

在这里插入图片描述

Then you could find the wireshark has been working to sniff the packets.

[外链图片转存失败,源站可能有防盗链机制,建议将图片保存下来直接上传(img-k5uClQRZ-1607931929282)(https://pad.degrowth.net/uploads/upload_8adfa68091587ec10b69a4cf89a39ddf.png =600x)]

Finally it is the analysis part.

4. Paring the packets

The procedure of the network is like this:

Created with Raphaël 2.2.0 Start
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值