Week 2 - asheesh8/NET-150-TECH-JOURNAL GitHub Wiki
Reflection
In Week 2, we're diving into Packet Tracer and we downloaded the Windows Virtual Machines.
Lab 1-0
Got into our Kali machines, used IPADDR to find IP vals for my Kali Virtual machine.
Lab 2-0
Got into our Windows Machine, used IPCONFIG /ALL to find all IP vals for my Windows Virtual machine.!
Lab 2-2 Observing Lan Activity
In this lab, I got into my windows virtual machine, downloaded wireshark.
Started capturing ethernet on Wireshark Then opened terminal to use CMD : IPCONFIG /ALL to find the gateway ip. (192.168.1.250). Using this, I sent another CMD : ping 192.168.1.250 .... this sent a ping to the gateway and back. After, I was able to see the source and destination MAC addresses
What is the MAC address of your workstation's NIC? - 08:00:27:89:6e:4f What is the MAC address of the Default Gateway Router interface (NIC)? - 00:00:5e:01:ca
Then for part 2, I did an external ping from my VM to www.timeslive.co.za.... Went to the capture, then found the request packet from source IP 192.168.1.50 (me) to dst IP 2.18.67.66 (timeslive) ICMP Ping Request - Source MAC: 08:00:27:89:6e:4f (my workstation's NIC) Ping Request - Destination MAC: 00:00:5e:00:01:ca (gateway)