Skip to content

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.
  • Labs icon Lab
  • A Cloud Guru
Google Cloud Platform icon
Labs

Packet Capture and Analysis

It's crucial for any security or systems administrator to be able to capture and analyze network traffic. This allows for advanced troubleshooting as well as security review. Furthermore, having a working knowledge of the traditional capture filters, like those used in the `tcpdump` and `wireshark` utilities, is a requirement of some certification exams, such as the LPIC-3 303-200.

Google Cloud Platform icon
Labs

Path Info

Level
Clock icon Intermediate
Duration
Clock icon 1h 0m
Published
Clock icon Nov 05, 2018

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Table of Contents

  1. Challenge

    Use a `tshark` capture filter to collect TCP traffic on port 80.

    1. Use a tshark capture filter to collect TCP traffic on port 80. Store the capture command output in /root/http_out.

      	tshark -f "tcp port 80" -V -R http > http_out
      
    2. In another SSH session, run curl www.example.com/index.html during the capture.

      	curl www.example.com/index.html
      

      Note: curl may produce output but it does not need to be recorded.

  2. Challenge

    Use a `tshark` display filter to collect HTTP traffic and print only HTTP response codes.

    1. Use a tshark display filter to collect HTTP traffic and print only HTTP response codes. Store the capture command output in /root/http_response.

      	tshark -Y http -Tfields -e http.response.code > http_response
      
    2. In a separate SSH session, run curl www.example.com/index.html and then curl www.example.com/error.html during the capture:

      	curl www.example.com/index.html
      
      	curl www.example.com/error.html
      

      Note: curl may produce output but it does not need to be recorded.

  3. Challenge

    Use a `tshark` capture filter that prints the IP address of hosts sending traffic to the test workstation on TCP port 22.

    1. Use a tshark capture filter that prints the IP address of hosts sending traffic to the test workstation on TCP port 22. Observe any IP addresses printed after several seconds.

      	tshark -f "tcp src port 22" -Tfields -e ip.dst
      

      Add the IP address(es) to /root/ssh_ip in a newline-delimited format.

The Cloud Content team comprises subject matter experts hyper focused on services offered by the leading cloud vendors (AWS, GCP, and Azure), as well as cloud-related technologies such as Linux and DevOps. The team is thrilled to share their knowledge to help you build modern tech solutions from the ground up, secure and optimize your environments, and so much more!

What's a lab?

Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.

Provided environment for hands-on practice

We will provide the credentials and environment necessary for you to practice right within your browser.

Guided walkthrough

Follow along with the author’s guided walkthrough and build something new in your provided environment!

Did you know?

On average, you retain 75% more of your learning if you get time for practice.

Start learning by doing today

View Plans