Homework 3 hints

In this screenshot you’ll see a lot of DNS traffic that is local. You should ignore all of it, it’s not related to the attack or assignment.

In this screenshot you’ll see a filter you can apply to easily ignore all the local DNS stuff.

In this screenshot you’ll see what you get if you right click on packet 481 in the attacker pcap and say “Follow” and “UDP Stream”. This is what a normal VPN conection looks like. The client connects to the server and nothing is funny or out of the ordinary about this flow where the attacker successfully connects to the VPN server.

In this screenshot note the frame number (695), which pcap it’s in (the attacker), and the IPID (0x2eaa).

In this screenshot note the same (frame 1557 in the victim PCAP, IPID is the same). Then check out Figure 18 in this blog post. Step 3.1 is where this packet is generated, and you’re seeing it in both packet captures. The blog post is not easy to follow, but we’ll go over it in class on 11/22 and can go over it again in future classes. When two VPN clients send connection requests to the same VPN server, the server should recieve both of those requests. For one client to recieve the other client’s request is definitely not something you’ll see with proper security and privacy that is in line with what VPN users expect. That’s what half of HW3 is about.