Networks Problem Set 1 Due Oct 3 Bonus Date Oct 2

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 22 World Wide Web and HTTP.
Workshop 5: IPSec Security Ricky Mok 4 Apr Preparation Group yourself into groups of 2 people. – You will take turn to be “client” and “server”.
Microsoft Excel 2003 Illustrated Complete Excel Files and Incorporating Web Information Sharing.
6 C H A P T E R © 2001 The McGraw-Hill Companies, Inc. All Rights Reserved1 Electronic Mail Electronic mail has revolutionized the way people communicate.
1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Chapter 2 Application Layer Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross Addison-Wesley, July.
Web, HTTP and Web Caching
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
DVG-N5402SP.
2/9/2004 Web and HTTP February 9, /9/2004 Assignments Due – Reading and Warmup Work on Message of the Day.
Cookies COEN 351 E-commerce Security. Client / Session Identification HTTP does not maintain state. State Information can be passed using: HTTP Headers.
Chapter 9 Collecting Data with Forms. A form on a web page consists of form objects such as text boxes or radio buttons into which users type information.
Mail (smtp), VoIP (sip, rtp)
Rensselaer Polytechnic Institute Shivkumar Kalvanaraman, Biplab Sikdar 1 The Web: the http protocol http: hypertext transfer protocol Web’s application.
Web application architecture
Characteristics of Communication Systems
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
JavaScript, Fourth Edition
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
Web Research © Copyright William Rowan Objectives By the end of this you will be able to: Use search engines and *URL’s on the internet as a research.
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
1 Welcome to CSC 301 Web Programming Charles Frank.
11 1 Cookies CGI/Perl Programming By Diane Zak Objectives In this chapter, you will: Learn the difference between temporary and persistent cookies.
XP Tutorial 8 Adding Interactivity with ActionScript.
Computer Networking.  The basic tool for observing the messages exchanged between executing protocol entities  Captures (“sniffs”) messages being sent/received.
2: Application Layer 1 Chapter 2: Application layer r 2.1 Principles of network applications  app architectures  app requirements r 2.2 Web and HTTP.
Web Design and Development. World Wide Web  World Wide Web (WWW or W3), collection of globally distributed text and multimedia documents and files 
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
JavaScript and Ajax (Internet Background) Week 1 Web site:
COMP2322 Lab 2 HTTP Steven Lee Jan. 29, HTTP Hypertext Transfer Protocol Web’s application layer protocol Client/server model – Client (browser):
Computer Skills (1) Internet Explorer. To open the Internet Explorer: –Double click on the Internet Explorer icon on Desktop. –Or, from Start  All Programs.
Unit-6 Handling Sessions and Cookies. Concept of Session Session values are store in server side not in user’s machine. A session is available as long.
Free Powerpoint Templates Page 1 Free Powerpoint Templates CHAPTER 1 LAB 1.1 Web Server.
© Janice Regan, CMPT 128, Jan 2007 CMPT 371 Data Communications and Networking HTTP 0.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
Web fundamentals: Clients, Servers, and Communication
Tonga Institute of Higher Education IT 141: Information Systems
Networks Problem Set 3 Due Nov 10 Bonus Date Nov 9
Block 5: An application layer protocol: HTTP
Instructor Materials Chapter 5 Providing Network Services
How HTTP Works Made by Manish Kushwaha.
JavaScript and Ajax (Internet Background)
資料通訊與網路 教授: 吳照輝 助教: 鄺福全.
Authentication & .htaccess
Lesson 4: Web Browsing.
CNIT 131 Internet Basics & Beginning HTML
Lecture: Protocols in Detail
COMP2322 Lab 2 HTTP Steven Lee Feb. 8, 2017.
Chapter 19 PHP Part III Credits: Parts of the slides are based on slides created by textbook authors, P.J. Deitel and H. M. Deitel by Prentice Hall ©
Hypertext Transport Protocol
Networks Problem Set 3 Due Oct 29 Bonus Date Oct 26
Introducing the World Wide Web
Networking for Home and Small Businesses – Chapter 6
Networking for Home and Small Businesses – Chapter 6
IS333D: MULTI-TIER APPLICATION DEVELOPMENT
Computer Communication & Networks
Tonga Institute of Higher Education IT 141: Information Systems
WEB PROGRAMMING JavaScript.
Configuring Internet-related services
Tonga Institute of Higher Education IT 141: Information Systems
HyperText Transfer Protocol
Computer Skills (1) Internet Explorer.
Wireshark(Ethereal).
World Wide Web Uniform Resource Locator hostname [:port]/path
Networking for Home and Small Businesses – Chapter 6
Chapter 7 Network Applications
HTTP Hypertext Transfer Protocol
Presentation transcript:

Networks Problem Set 1 Due Oct 3 Bonus Date Oct 2 Name(s) ______________________________ ______________________________ Run Wireshark on your own machine or on one of the machines in Morken 240. 1. Simple HTTP Do the following: 1. Start up your web browser. 2. Start up the Wireshark packet sniffer, Enter “http” (just the letters, not the quotation marks) in the display-filter window, so that only captured HTTP messages will be displayed later in the packet-listing window. 3. Wait a bit more than one minute and then begin Wireshark (or ethereal) packet capture. 4. Enter the following to your browser http://gaia.cs.umass.edu/wireshark-labs/HTTP-wireshark-file1.html Your browser should display the very simple, one-line HTML file. 5. Stop Wireshark packet capture. 15

Questions Is your browser running HTTP version 1.0 or 1.1? What version of HTTP is the server running? c. What is the IP address of your computer? d. Of the gaia.cs.umass.edu server? e. What is the status code returned from the server to your browser? f. When was the HTML file that you are retrieving last modified at the server? g. How many bytes of content are being returned to your browser?

2. Conditional GET Response Most web browsers perform object caching and thus perform a conditional GET when retrieving an HTTP object. Before performing the steps below, make sure your browser’s cache is empty. To do this under Netscape 7.0, select Edit-> Preferences->Advanced->Cache and clear the memory and disk cache. For Firefox, select Tools->Clear Private Data, or for Internet Explorer, select Tools->Internet Options->Delete File; these actions will remove cached files from your browser’s cache. Do the following: Start up your web browser, and make sure your browser’s cache is cleared, as discussed above. • Start up the Wireshark (or ethereal) packet sniffer • Enter the following URL into your browser http://gaia.cs.umass.edu/wireshark-labs/HTTP-wireshark-file2.html Your browser should display a very simple five-line HTML file. • Quickly enter the same URL into your browser again (or simply select the refresh button on your browser) • Stop Wireshark packet capture, and enter “http” in the display-filter window, 15

a. Inspect the contents of the first HTTP GET request from your browser to the server. Do you see an “IF-MODIFIED-SINCE” line in the HTTP GET? b. Inspect the contents of the server response. Did the server explicitly return the contents of the file? How can you tell? c. Now inspect the contents of the second HTTP GET request from your browser to the server. Do you see an “IF-MODIFIED-SINCE:” line in the HTTP GET? If so, what information follows the “IF-MODIFIED-SINCE:” header? 11. What is the HTTP status code and phrase returned from the server in response to this second HTTP GET? Did the server explicitly return the contents of the file? Explain.

3. Retrieving Long Documents Do the following • Start up your web browser, and make sure your browser’s cache is cleared, as discussed above. • Start up the Wireshark packet sniffer • Enter the following URL into your browser http://gaia.cs.umass.edu/wireshark-labs/HTTP-wireshark-file3.html Your browser should display the rather lengthy US Bill of Rights. • Stop Wireshark packet capture, and enter “http” in the display-filter-specification window, so that only captured HTTP messages will be displayed. a. How many HTTP GET request messages were sent by your browser? b. How many data-containing TCP segments were needed to carry the single HTTP response? c. What is the status code and phrase associated with the response to the HTTP GET request? c. Are there any HTTP status lines in the transmitted data associated with a TCPinduced “Continuation”? 15

4. Embedded Objects 15 Do the following: • Start up your web browser, and make sure your browser’s cache is cleared. • Start up the Wireshark packet sniffer • Enter the following URL into your browser http://gaia.cs.umass.edu/wireshark-labs/HTTP-wireshark-file4.html Your browser should display a short HTML file with two images. These two images are referenced in the base HTML file. That is, the images themselves are not contained in the HTML; instead the URLs for the images are contained in the downloaded HTML file. Your browser will have to retrieve these logos from the indicated web sites.. • Stop Wireshark packet capture, and enter “http” in the display-filter-specification window, so that only captured HTTP messages will be displayed. a. How many HTTP GET request messages were sent by your browser? To which Internet addresses were these GET requests sent? b. Can you tell whether your browser downloaded the two images serially, or whether they were downloaded from the two web sites in parallel? Explain. 15

4. Authentication 15 Do the following: • Make sure your browser’s cache is cleared and close down your browser. Then, start up your browser • Start up the Wireshark packet sniffer • Enter the following URL into your browser http://gaia.cs.umass.edu/wireshark-labs/protected_pages/HTTP-wiresharkfile5. html Type the requested user name and password into the pop up box. Username – wireshark-students Password - network • Stop Wireshark packet capture, and enter “http” in the display-filter-specification window, so that only captured HTTP messages will be displayed later in the packet-listing window. a. What is the server’s response (status code and phrase) in response to the initial HTTP GET message from your browser? b. When your browser’s sends the HTTP GET message for the second time, what new field is included in the HTTP GET message? 15

Observation The username (wirehsark-students) and password (network) that you entered are encoded in the string of characters (d2lyZXNoYXJrLXN0dWRlbnRzOm5ldHdvcms=) following the “Authorization: Basic” header in the client’s HTTP GET message. While it may appear that your username and password are encrypted, they are simply encoded in a format known as Base64 format. The username and password are not encrypted! To see this, go to http://www.securitystats.com/tools/base64.php and enter the base64-encoded string d2lyZXNoYXJrLXN0dWRlbnRz and press decode. Voila! You have translated from Base64 encoding to ASCII encoding, and thus should see your username! To view the password, enter the remainder of the string Om5ldHdvcms= and press decode. Since anyone can download a tool like Wireshark and sniff packets (not just their own) passing by their network adaptor, and anyone can translate from Base64 to ASCII (you just did it!), it should be clear to you that simple passwords on WWW sites are not secure unless additional measures are taken.