preview

What Is The IP Address Of A Web Server?

Decent Essays

The address of a web server can be easily retrieved on Wireshark by looking at the “Destination” tab. Also, I could open command prompt and ping the entire domain and receive the IP address in relation to it. Therefore, the IP address of the “gaia.cs.umass.edu” server is 128.119.245.12. See Figures 9 and 10.

Once I set up the date and time I was able to determine the time it took my computer to receive an answer from the HTTP server. The time it takes from when a message is sent to when a reply is received depends on the web server. Depending on how many web servers the request has to navigate through until it gets to the destination server and vice versa will be how long the messages will travel.

The only filtered protocol on this lab …show more content…

Next, I stopped the capture and the results were as in Figure 5.

Wireshark will capture packets in the background, even when we are not aware of. There is always network communication going on between devices in a network.
To see how Wireshark captures the packets I accessed the website: http://gaia.cs.umass.edu/wireshark-labs/INTRO-wireshark-file1.html. Which looks just like Figure 4

To begin capturing messages and packets, I simply double-clicked the Local Area Network (LAN) on top, which is the one that is actually producing traffic. All sorts of communications were going on when I looked at the screen. Wireshark is now capturing all packets being sent/received from/by your computer! As shown in Figure 3.

To start Wireshark, I went through my computer and found the installer .exe file. Once installed I opened it and the first thing on the screen was the Internet Interfaces. The screenshot below shows that my computer has two Local Area Connections, however, only one is actively receiving/sending packets.

Wireshark is one of the tools cyber security experts should always keep in the toolbox because it is one of the most complete networking tools that exist. Wireshark can be used for either troubleshooting a network or optimizing the network's security. The tool allows us to examine packets that are being sent and received which is an excellent method to mitigate vulnerabilities. Also, by analyzing

Get Access