SlideShare a Scribd company logo
1 of 53
WIRESHARK Basics Moshe Haviv January 2010 [email_address]
Contents ,[object Object],[object Object],[object Object],[object Object],[object Object]
What is WIRESHARK? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Who needs/uses WIRESHARK? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Installing WIRESHARK ,[object Object],[object Object],[object Object]
Basic WIRESHARK features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Platform/Media support table
How do we capture packets from  the network? Where to connect? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basic Architecture Capturing ,[object Object],[object Object],[object Object],[object Object],[object Object]
Network Capturing Architecture WIRESHARK
Network Capture Architecture- Both entities connected to a HUB – Shared Media Simply start capturing WIRESHARK Hub
Network Capture Architecture- Multimedia entity/PC connected to a switch(1) ,[object Object],[object Object],[object Object],WIRESHARK HUB SWITCH
Network Capture Architecture- Multimedia entity/PC both connected to a switch(2) ,[object Object],[object Object],WIRESHARK SWITCH
Basic Network packet capturing-1-   When you activate the WIRESHARK you get the following view
Basic Network packet capturing -2-
Basic Network packet capturing -3-
Basic Network packet capturing -4-
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],WIRESHARK preferences
Basic displayed/captured packet manipulations ,[object Object],[object Object],[object Object],[object Object],[object Object]
 
 
Display filtering ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Display filtering-  by changing display sort order
Display Filter configuration ,[object Object],[object Object],[object Object],[object Object],[object Object]
Filter elements ,[object Object],[object Object],[object Object],[object Object],[object Object]
Some basic filter field examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Filter Comparison operators ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Some simple filter examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How to build filter from the GUI ,[object Object],[object Object]
How to build filter from the GUI-2-
 
Filter save-activate ,[object Object],[object Object],[object Object]
Display filter logical operators ,[object Object],[object Object],[object Object]
Display filter logical operators (Contd.) and && Logical and or || Logical or xor ^^ Logical XOR not ! Logical Not […] Substring operator
Capture filtering ,[object Object],[object Object],[object Object],[object Object]
Capture filtering-2- ,[object Object],[object Object],[object Object]
Capture filtering  – 3 -
[object Object],[object Object],Capture filtering  – 4 –   Activating capture filter
Capture filtering  – 5 –
Capture filtering  – 6 –
Capture filter syntax by examples ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basic Capture filter syntax ,[object Object],[object Object],[object Object],[object Object],[object Object]
Statistics and data analysis ,[object Object],[object Object],[object Object],[object Object]
Statistics menu  –    Statistics  Summary
Statistics menu   –    Statistics  Hierarchy Statistics
I/O Statistics – Real-time or offline
VOIP statistics     Statistics  VOIP
VOIP statistics   Statistics  VOIP (Contd.)
[object Object],[object Object],[object Object],[object Object],[object Object],RTP Stream Analysis
RTP streams – Outline   Statistics  RTP   Show all Streams
RTP streams – Outline   Statistics  RTP   Show all Streams Choose one of the streams   Analyze
 
References and important URLs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic Analysis
David Sweigert
 
Wireshark
WiresharkWireshark
Wireshark
btohara
 

What's hot (20)

Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
wireshark
wiresharkwireshark
wireshark
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic Analysis
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark
WiresharkWireshark
Wireshark
 
Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark
 
Workshop Wireshark
Workshop Wireshark Workshop Wireshark
Workshop Wireshark
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Wireshark.pptx
Wireshark.pptxWireshark.pptx
Wireshark.pptx
 
Wireshark ppt
Wireshark pptWireshark ppt
Wireshark ppt
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Wireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance toolsWireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance tools
 
NMap
NMapNMap
NMap
 
Wireshark course, Ch 03: Capture and display filters
Wireshark course, Ch 03: Capture and display filtersWireshark course, Ch 03: Capture and display filters
Wireshark course, Ch 03: Capture and display filters
 
Wireshark
WiresharkWireshark
Wireshark
 
Firewall ppt
Firewall pptFirewall ppt
Firewall ppt
 

Similar to Wireshark Inroduction Li In

26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
Freddy Buenaño
 
PACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATIONPACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATION
Goutham Royal
 

Similar to Wireshark Inroduction Li In (20)

TekTape Manual
TekTape ManualTekTape Manual
TekTape Manual
 
wireshark.pdf
wireshark.pdfwireshark.pdf
wireshark.pdf
 
Traffic monitoring
Traffic monitoringTraffic monitoring
Traffic monitoring
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
 
How to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux SystemsHow to Use GSM/3G/4G in Embedded Linux Systems
How to Use GSM/3G/4G in Embedded Linux Systems
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.ppt
 
Backtrack Manual Part4
Backtrack Manual Part4Backtrack Manual Part4
Backtrack Manual Part4
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 
MikroTik Basic Training Class - Online Moduls - English
 MikroTik Basic Training Class - Online Moduls - English MikroTik Basic Training Class - Online Moduls - English
MikroTik Basic Training Class - Online Moduls - English
 
Traffic-Monitoring.ppt
Traffic-Monitoring.pptTraffic-Monitoring.ppt
Traffic-Monitoring.ppt
 
Traffic-Monitoring.ppt
Traffic-Monitoring.pptTraffic-Monitoring.ppt
Traffic-Monitoring.ppt
 
Traffic-Monitoring.ppt
Traffic-Monitoring.pptTraffic-Monitoring.ppt
Traffic-Monitoring.ppt
 
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
 
Presentation on wireshark
Presentation on wiresharkPresentation on wireshark
Presentation on wireshark
 
Introduction to ns3
Introduction to ns3Introduction to ns3
Introduction to ns3
 
B.Eng-Final Year Project interim-report
B.Eng-Final Year Project interim-reportB.Eng-Final Year Project interim-report
B.Eng-Final Year Project interim-report
 
Ccna Imp Guide
Ccna Imp GuideCcna Imp Guide
Ccna Imp Guide
 
PACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATIONPACKET Sniffer IMPLEMENTATION
PACKET Sniffer IMPLEMENTATION
 
Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)
Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)
Cotopaxi - IoT testing toolkit (Black Hat Asia 2019 Arsenal)
 
MTCNA Show.pptx
MTCNA Show.pptxMTCNA Show.pptx
MTCNA Show.pptx
 

Wireshark Inroduction Li In

Editor's Notes

  1. Wireshark can display, analyze and collect packets from the network.
  2. Information on LUA can be found at http://en.wikipedia.org/wiki/Lua_(programming_language) or in the WIRESHARK User manual. By default LUA is disabled and can be enabled by editing the init.lua file at the WIRESHARK global configuration directory. Changing the disable_lua from true to false will do the trick. Now when the WIRESHARK is initialized if LUA is enabled it will activate the init.lua file from the user’s directory .
  3. The full list of protocols can be found
  4. 1 Linux Affix Bluetooth stack only. 2 PPP non-control frames only. 3 Latest libpcap CVS required 4 On some platforms: WLAN non-control frames only, with fake Ethernet headers, and only traffic to and from the machine doing the capturing. 5 Windows does not have a UNIX-style loopback interface.
  5. In this architecture the PC where the WIRESHARK is installed is assumed to have the multimedia software as well. That can be a softphone like eConf from France Telecom, SJPhone (An ASTERIX based softphone), IP softphone 6.x from AVAYA etc. Or the computer is a third party equipment that is sending commands or receiving information from another network element directly involved with that. That may be the case where there is a WEB interface that manages the gateway, the SIP proxy, the multimedia system etc.
  6. We are assuming that we want to capture signaling and/or RTP packets from the multimedia equipment.
  7. In a HUB/Shared media all packets, unicasts to other stations as well as ours, multicasts and broadcast can be observed.
  8. In a switch unicast packets not directed to the entity cannot be seen.
  9. Most medium priced Ethernet switches support port mirroring/copying (Spanning). When port mirroring is configured between from one switch port (source) to a to another (destination) port then packets coming to/from source will also appear on the destination- NO the reverse won’t be true!! In sophisticated networks it is even possible to see all the traffic from one port/vlan on another switch port not necessarily on the same switch. Cisco has that. By the way Cisco names copy porting as Spanning. http://wiki.wireshark.org/SwitchReference
  10. As a matter of fact after choosing an interface from the background of the picture above and then stopping the capture you can get the small window for choosing the same or another interface.
  11. By clicking Capture  Interfaces  Options on the Interface menu you choose the interface you want to collect packets from. There are some important fields here.
  12. “ Capture Packets in promiscuous mode ” If you do not click you will only be able to see packets specifically addressed to your computer, unless another process in your computer put the mode to promiscuous mode. Display Options: Update list of packets in real time The packets will be displayed while in capture. If not ticked then all packets will be visible only after the capturing is stopped in WIRESHARK. Automatic scrolling in live capture When ticked the scrolling to the last captured packet is done automatically. Hide capture info dialog By not ticking that option you will already see some statistics when capturing. Percentage of specific protocols in capture, total captured packets etc. While capturing the packets are stored in a small buffer. It is possible to save packets while capturing, in a single file or multiple files by limiting the size of each file. When you press start capturing starts.
  13. From the main WIRESHARK window choose Edit  Preferences . Some useful fields: Time format- Normally it is relative. The first packet arriving at 0.000 seconds. You can choose absolute time or one packet’s arrival can serve as a REFERENCE from which all the other packets’ arrival times are recomputed.
  14. Some protocols do not have default port numbers and/or unrecognized and as such we need to tell WIRESHARK how to parse them.
  15. .
  16. The display above has been obtained on a previously captured file. It is ordered by source address. It is achieved by clicking on the “Source” column. Other types of ordering can also be used. I advise to play with that.
  17. Compound filters are built by combining simple filters with logical operations such as “and”, “or”.
  18. A simple filter example: ip.addr==192.168.1.1
  19. Examples : frame.len < 30 ip.src ne 10.0.0.5 ip.addr == 123.78.10.34
  20. You do not need to know the exact syntax of the filter expression. The WIRESHARK GUI helps you on that. When you click the “Expression” button a new window as shown above opens. By clicking on the relevant protocol’s “+” sign all the available fields appear and you can easily build the filter you want. As in the classical filter typing the last thing to do would be to press “Apply” to see packets displayed according to your filter. You can filter the display in real-time while collecting and over a capture file. In real-time you might get the wrong impression that it is also capturing according to that filter. That is not true!!
  21. The filter above when activated will show only the H.245 packets among all the captured packets.
  22. The lines you see in the filter window are the filters defined. If we want to define a new filter for saving purposes: 1- Click new 2- Type the name of the filter- free text 3- Type the filter string 4- Click OK Now the filter is saved. Next time the filter edit/apply button is clicked the name of this filter will also appear in the filter names window. By choosing any filter and then clicking Apply will activate the filter.
  23. Among the logical operators the most interesting is the string operator which can have a couple of formats: [n:m] In this syntax n is the start of the field and m is the length of the string. For example eth.src[0:3] == 00:00:83 searches packets with MAC addresses which have the first three bytes as above. [n-m] In this syntax n is the start of the field and m is the end. If we want to have a similar filter as above in this syntax we can use eth.src[0-2] ==00:00:83. This type of filtering in the example can be very useful if you need to capture packets from/to specific company product NICs. Another simple example. (ip.src == 10.0.0.1) and (ip.dst==10.0.0.3)
  24. When you click the capture filter icon you get a small window. If you want to configure a new capture filter click the “ New ” button. By default the name of the capture filter and the capture string is “ new ”. Change the name of the capture filter and enter a capture filter string as will be explained. If some capture filters are already defined as is the case in the picture above then simply choose one and do whatever editing you want to do. At this stage you have only saved the new filter.
  25. If we click on the new1 filter the ascii text of the filter also appears. In this example we are interested in capturing packets from /to IP address 192.168.122.123.
  26. By choosing Statistic  VOIP  Clicking one of the streams in the new window and  Graph. At the graph clicking on any SIP messages will take the mouse to that packet.
  27. The delay/jitter all relate to the sending station and not from source to destination all the way. To do that we need to buffer packets at the source and at the destination.