Download the file CapturedData.zip onto one of the lab 2 machines, csl2su1.cs.ust.hk - csl2su41.cs.ust.hk and unzip it to be CapturedData.snp. Run the command:
snoop -i CapturedData.snp -v
If that doesn't work then your path probably doesn't include /usr/sbin, so try
/usr/sbin/snoop -i CapturedData.snp -v
CapturedData.snp is a file containing a dump of data that was
captured using a packet sniffer while a web browser was accessing
http://course.cs.ust.hk/comp361/fall2004/index.html
and associated files.
snoop will show you many (but not all) of the protocol packets that were exchanged
between the user's machine and the server hosting the web page. The first word
on a line identifies the type of protocol/packet, e.g., IP, TCP, HTTP, etc..
The purpose of this lab is to give you the chance to examine an http exchange,
so we use an awk filter to strip out the http packets:
snoop -i CapturedData.snp -v | awk '{ if ( $1 ==
"HTTP:") print $0}'
Examine the output and see if you can figure out what each line is doing. Note that for each http packet. the file will only show the first few lines of the packet (so you will not see all of the text in the http packets)
For a more detailed view of messages exchanged we recommend installing
Ethereal on your machines and running the Ethereal labs
while you access the same files.
References:
http://www.ietf.org/rfc/rfc1945.txt?number=1945 (Http 1.0)
http://www.ietf.org/rfc/rfc2068.txt?number=2068 (Http 1.1)
Last updated by M.J. Golin
02/28/2005 04:38:05 PM
Back to class home page