Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
52 views26 pages

Wireshark Notes

Wireshark is a free and open-source network protocol analyzer that captures and displays network traffic in real-time, making it essential for network engineers and cybersecurity professionals. It offers features such as deep protocol inspection, customizable filters, and statistical analysis tools to facilitate network troubleshooting and monitoring. Users can analyze individual packets, follow TCP streams, extract files, and identify cyber attacks through its user-friendly interface.

Uploaded by

yp213473
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
52 views26 pages

Wireshark Notes

Wireshark is a free and open-source network protocol analyzer that captures and displays network traffic in real-time, making it essential for network engineers and cybersecurity professionals. It offers features such as deep protocol inspection, customizable filters, and statistical analysis tools to facilitate network troubleshooting and monitoring. Users can analyze individual packets, follow TCP streams, extract files, and identify cyber attacks through its user-friendly interface.

Uploaded by

yp213473
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 26

Wireshark

What is wireshark?

Wireshark is a free and open-source network protocol analyzer used for network troubleshooting,
analysis, software development, and cybersecurity monitoring. It captures packets in real time and
displays them in a human-readable format, allowing users to inspect network traffic at various levels.

Wireshark is considered an essential tool for network engineers, penetration testers, cybersecurity
analysts, and IT professionals.

Wireshark Features
Captures live network traffic in real time
Supports deep inspection of over 2,000 network protocols
Allows filtering of captured traffic using powerful display filters
Highlights packets using customizable color rules for better visibility
Reconstructs complete TCP/HTTP conversations using the “Follow Stream” feature
Supports multiple platforms: Windows, Linux, macOS, and Unix
Enables marking and commenting on packets for easy reference
Provides export options in various formats such as .pcap, .txt, and .csv
Includes VoIP analysis tools with call flow diagrams and audio playback
Supports decryption of SSL/TLS and WPA2 traffic (when keys are available)
Offers command-line tools like tshark for automated or remote analysis
Allows plugin support and custom dissectors for protocol extension
Displays detailed statistics: protocol hierarchy, endpoint conversations, I/O graphs
Offers customizable layouts and filter profiles for different analysis needs

Step1: Open the Wireshark Application


Or you can simply write on terminal wireshark and it will open the wireshark Application
Step2: Select a networking interface to capture Traffic on:
Wi-Fi – Captures traffic from your wireless internet connection
Ethernet – Captures traffic from a wired network (LAN cable)
Loopback (lo) – Captures internal traffic within your own computer (e.g., localhost)
VMware/VirtualBox – Captures traffic from virtual machines or virtual networks
Bluetooth – Captures Bluetooth-related network activity
Step3: Stopping the Packet Capture
Double-Clicking on the capture Interface you want to Capture Traffic to start Capturing Packet

To Stop Capture Packets, Click on red Stop Capture Button

This will Capture into temporary file and allow you to perform your analysis
to save Your data into a specific file. Select File > Save As, then enter the location and name of
the file under which you want to save this data
To start a new packet capture, select the Start Capture button, Any unsaved capture data will
be automatically deleted

When capturing network traffic with Wireshark, you can use the tool’s capture filters to limit the network
packets that should be captured by the tool using specific criteria a packet must meet. They help you
narrow the scope of the network traffic captured to only what is relevant to you and reduce Wireshark’s
processing overhead.

However, you usually want to capture all the network traffic on an interface and use Wireshark’s display
filters to filter a saved packet capture. This means you won’t miss any relevant network traffic that the
capture filter may have excluded.

Understanding the Interface


Once you have Captured network traffic or imported a saved packet capture file, you will be greeted
by wireshark’s default interface. this interface is compromised of four componenets

The Menu Bar

1. File

Open, save, close capture files


Export packets in various formats
Capture file properties
Print selected packets

2. Edit

Find packets (by string, hex, or display filter)


Mark, unmark, or ignore packets
Configuration profiles and preferences

3. View

Customize layout, packet bytes, and colorization


Show/hide interface elements
Zoom in/out on packet list or data
4. Go

Navigate through packets: next, previous, last marked, etc.


Useful for quickly jumping between points of interest

5. Capture

Start, stop, or restart a live capture


Select input interfaces
Set capture filters and options

6. Analyze

Apply or disable display filters


Follow TCP/HTTP streams
Decode as specific protocol
Enable/disable protocol dissectors

7. Statistics

View summaries like protocol hierarchy, endpoints, conversations, IO graphs


Analyze flow of traffic and packet types

8. Telephony

Analyze VoIP, RTP, SIP calls


Useful for voice traffic inspection

9. Tools

Access additional tools and external plugins

10. Help

Access Wireshark documentation


About Wireshark, plugin info, and keyboard shortcuts

The main Toolbar


Below the menu bar is Wireshark’s main toolbar. These shortcut buttons let you
start/stop your packet capture, adjust your capture options, open/close capture files,
search for packets, and resize interface panes

The display filter bar


Next down is Wireshark’s display filter bar. This allows you to filter the network traffic
you have captured based on protocol, source/destination IP address, port number,
MAC address, packet type (e.g., ICMP, ARP, etc.), packet length, time range, and packet
content. You will see this in action later.

The packet list pane

This is the main area of Wireshark’s interface. It summarizes the key details of each
packet captured, which you can scroll through or sort using the various columns. You
can also right-click on an individual packet to perform various actions, such as marking
a packet, applying filters, or following a packet stream.

The Packet details pane


Once you select a packet, the packet detail pane will populate. This includes the
specific network packet details broken down based on TCP/IP network layer. You will
see how to inspect individual packets later.

The Packet bytes pane

To the right of the packet details pane is the packet bytes pane. This shows the
corresponding bytes Wireshark extracted from the wire to reconstruct the network
packet data. These bytes are shown in hexadecimal format and are highlighted when
you select information within the packet details pane. This pane is often used for
troubleshooting when Wireshark cannot parse network data.

Analysing Captured Traffic

You can take several actions in Wireshark to analyze the network traffic you have
captured. The first of these is examining the individual packets captured

Examining Packets

To examine a packet, select it within the packet list pane. This will populate the packet
details pane with that packet's network information.
Here packet number 11 has been selected. You see a right-facing arrow indicating a
request in Wireshark’s packet list pane and a left-facing arrow indicating a response
several packets down (packet 14). This is a classic HTTP request and response network
conversation.

You will also see the packet details pane populated with network information about
packet number 11, including information at the link, Internet, transport, and TCP/IP
stack application layer.

To start, you can analyze the network information at the link layer. This includes the
source and destination MAC addresses of the two communicating devices and the
type of Internet protocol used (IPv4 or IPv6).

You can then move on to the information included within the Internet layer. This
example contains information specific to the IPv4 protocol, such as IP flags, the
source and destination IP address, Time to Live (TTL), the transport protocol
encapsulated within this packet (e.g., TCP), and other header information.
Following the IP layer is the transport layer. This network protocol is responsible for
the end-to-end data delivery between hosts and will be either UDP or TCP. It includes
the source and destination port of the segment, TCP-specific header flags, the size of
the encapsulated application message, and other header information.

Finally, the packet details pane will show you network information about the packet's
application protocol (if an application protocol is used). In this case, HTTP is the
application protocol, so you can see information about the request method, request
URI, and other common HTTP headers. This will be where you find most of the network
information you want to analyze.
Refining your view with display filters

You must sift through thousands of network packets when analyzing traffic. To make
this task more efficient, Wireshark has built-in display filters that you can use to
narrow down the packets displayed in its packet list pane.

To use these filters, enter them into Wireshark’s display filter bar (below the main
toolbar).

In this screenshot, the filter icmp has been used. This filter will only display packets
that use the Internet Control Message Protocol (ICMP) as their network-layer protocol.
Now you can analyze all relevant packets without searching through thousands of
irrelevant ones. Wireshark will show you how many packets have been filtered out by
your display filter at the bottom right of its interface.

Performing statistical analysis


Aside from analyzing individual network packets, Wireshark also has a powerful
statistical analysis feature that lets you quickly summarise your network traffic.

Select the Statistic menu from Wireshark’s main menu bar. This will provide options
for showing summary information about the protocols being used, the endpoints
communicating, and the network conversations between those endpoints.

Select the Protocol Hierarchy option to discover the protocols used within your
captured network traffic. This will generate a window summarizing the network
protocols used at each TCP/IP stack layer.
Select the Endpoints option to find out what endpoints are present in your network
traffic. This will list all the unique endpoint devices communicating within the network
packets you have captured based on Ethernet address, IP address, and TCP/UDP port.

In the example below, the IPv4 tab has been selected. This shows that four devices are
communicating in this packet capture, with two being the primary exchangers of data.
Select the Conversations option to delve into the network conversations within your
packet capture. This will show you the network traffic traveling between endpoints.
Here you can see a lot of data is traveling between 10.0.200.13 and 10.0.200.10, while
very little is between 10.0.200.13 and 10.0.200.11.

You can use Wireshark’s statistical analysis feature to quickly identify outliers within
your packet capture and refine your search using display filters to analyze these
outliers.

Techniques
Now that you have a basic understanding of capturing and analyzing traffic with
Wireshark let’s look at how you can use this powerful network protocol analyzer in the
real world. The following are three use cases you will likely encounter whether you are
on the red or blue team in cyber security.

Following TCP Streams

One of the most common use cases for Wireshark is following TCP streams. By
following this stream, you can see the conversation between the two devices and the
data they exchanged. This is useful for troubleshooting network issues or discovering
hidden information.

To follow a TCP stream in Wireshark, right-click on a packet whose TCP stream you
want to follow.
Here packet number 5 has been selected. It is a TCP connect request (TCP SYN flag)
sent to port 8000 on machine 10.0.200.20 and is the start of the TCP three-way
handshake. A drop-down arrow on the left of the packet list pane indicates the entire
network conversation down to packet number 17. To follow this TCP stream, right-click
on packet number 5 and select Follow > TCP Stream.
Wireshark will automatically apply a display filter that only shows packets from this
TCP stream.

Wireshark will also generate a summary view of the TCP stream in a new window. In
this case, it highlights the HTTP messages sent between a client and server.
Extracting Files

If you are on the red team, you often use Wireshark to extract sensitive information,
such as usernames, passwords, and files. Wireshark can reconstruct files from the
capture packets. This feature is incredibly useful as it allows you to extract various file
types from network packets.

To extract files in Wireshark, select File > Export Objects. You can then select the
object type you want to export based on the protocol used to transmit said object. In
this case, an image was transferred using HTTP.
Selecting HTTP opens a new window populated by all the objects transferred using
HTTP in the packet capture file. There are two objects; a static HTML page and a PNG
image.

To extract the image, select the packet (41) and click Save.
Now choose a location to save the image file to, and you can open the image in your
favorite image viewer.
Using Wireshark, you can extract compressed files, executables, images, videos, email
attachments, and other binary file types.

Identifying Attacks

If you are on the blue team, you will likely use Wireshark to identify cyber attacks by
analyzing network traffic. This includes brute force attacks, port scans, and data
exfiltration. Let’s look at identifying an FTP brute force attack in Wireshark. The
following packet capture was performed after running the Hydra online cracking tool
against an FTP server.

To see the FTP traffic, you can use the Wireshark display filter ftp.response.code ==
530. This is the FTP response code for “Not logged in” and indicates an authentication
failure. Seeing several of these errors with the same username but a different
password indicates an FTP brute force attack.
To find out if they belong to the same user, change the display filter to
ftp.request.command == USER. This will show you all the FTP login requests where a
username was specified
Next, to determine if different passwords are being tried, right-click on a network
packet, and select Follow > TCP Stream.
Here the same user tries multiple passwords to log in, indicating a password spray
attack against the user stationx-admin.

To determine if any attempts were successful, use the display filter ftp.response.code
== 230 to look for “User logged in, proceed.”

No login attempts were successful!

Conclusion
Wireshark is a powerful open-source network protocol analyzer that turns bytes on
the wire into network traffic you can analyze. Its simple-to-use interface provides an
overview of your capture traffic in the list pane and specific information about each
packet in the details pane.

You have seen how to examine network packets in granular detail, refine your view
using Wireshark’s display filters, and summarize network traffic with statistical analysis
tools. These skills allow you to use Wireshark in the real world for following TCP
streams to uncover conversations, extracting files, and identifying cyber attacks

Fun Part

You can find out what cyber security team you should join in the Red Team vs Blue
Team: Which Is the Best Choice for You?

You might also like