Security Camp 2012
網路攻擊與封包分析-
Wireshark	
 
講師:鄭毓芹	
 博士生	
 
	
 
服務單位:國立成功大學電機系
	
 
E-mail:julia.yc.cheng@gmail.com
2Security Camp 2012
Agenda	
 
n  Basics
n What is “Network Security Analysis” ?
n How useful for your security activities?
n Who Uses Network Analyzers
n  Tool Introduction
n About Wireshark
n Sniffer Positioning
n Features & Panels
n  Exercise
3Security Camp 2012
What is “Network Security Analysis” ?
n  Important activities for incident responders
and security analyst
n  Currently data just travels around your
network like a train. With a packet sniffer, get
the ability to capture the data and look inside
the packets to see what is actually moving
along the tracks.
4Security Camp 2012
What is “Network Security
Analysis” ?
n  Related to many security activities
n Network monitoring
n  To detect on-going incident
n Network forensics:
n  To find evidence in the specific incident
n Malware analysis:
n  To find capability of malware such as “sending
important data to malicious servers” or “Bot
command & control”
n  Process of capturing, decoding, and analyzing
network traffic
5Security Camp 2012 5
Who Uses Network Analyzers
n  System administrators
n  Understand system problems and performance
n  Intrusion detection
n  Malicious individuals (intruders)
n  Capture cleartext data
n  Passively collect data on vulnerable protocols
n  FTP, POP3, IMAP, SMATP, rlogin, HTTP, etc.
n  Capture VoIP data
n  Mapping the target network
n  Traffic pattern discovery
n  Actively break into the network (backdoor techniques)
6Security Camp 2012
Network security analysis –
Flow based
n  Feature
n Focus on network flow/traffic instead of each
packet
n Good approach to get high level overview or
accounting
n  Tools
n Netflow / sFlow
n MRTG/RRDTool
7Security Camp 2012
Network security analysis –
Packet based
n  Feature
n Focus on each packet or group of packets
n Can analyze thoroughly but high cost
n  Tools / Techniques
n Tcpdump
n Wireshark / tshark
8Security Camp 2012
Network security analysis –
Packet based (Cont.)
n  Capture packet
n Don’t use Wireshark to capture packets
n Avoid running Wireshark with root privilege
n Use more simple program instead
n  E.g. tcpdump, dumpcap
n  Analyze packet:
n Wireshark is the best friend for this purpose.
9Security Camp 2012
Tool Introduction:
About Wireshark
n  Wireshark is free and open-source tool
n  Run on many OSs
n Windows / Linux / *BSD / Solaris and others
n  User Interface
n GUI - Packet list / Packet details / Packet Bytes
n CUI – tshark (Command line modes)
n  Many Features
n Search / Filter/ Colorize / Statistics / others
n  Vulnerability: http://www.wireshark.org/security/
10Security Camp 2012 10
n  Decodes over 750 protocols
n  Compatible with many other sniffers
n  Plenty of online resources are available
n  Supports command-line and GUI interfaces
n  TSHARK (offers command line interface) has three
components
n  Editcap
n  Mergecap
n  text2pcap
Tool Introduction:
About Wireshark (Cont.)
11Security Camp 2012 11
Tool Introduction:
Sniffer Positioning
12Security Camp 2012
Hub
Tool Introduction:
Sniffer Positioning (Cont.)
13Security Camp 2012
Switches
Tool Introduction:
Sniffer Positioning (Cont.)
14
Wireshark (and WinPcap)
Wireshark – Application for Sniffing Packets
WinPcap – open source library for packet capture
Operating System – Windows & Unix/Linux
Network Card Drivers – Ethernet/WiFi Card
Ethernet Card
15Security Camp 2012 15
Getting Wireshark
n  Download the program from
n  www.wireshark.org/download.html
n  Requires to install capture drivers (monitor
ports and capture all traveling packets)
n  Windows: winpcap (www.winpcap.org)
n  Linux: libpcap
16Security Camp 2012 16
Running Wireshark
17Security Camp 2012
Simple Capture
18Security Camp 2012
Capture Options
19Security Camp 2012 19
Details of the
selected packet
(#215)
Raw data
(content of
packet # 215)
Packet
#215:
HTTP
packet
20Security Camp 2012
Menu Bar
21Security Camp 2012
Status Bar
22Security Camp 2012 22
Filtering
HTTP
packets
only
23Security Camp 2012
Right Click Filtering
24Security Camp 2012
Follow TCP Stream
25Security Camp 2012
26Security Camp 2012
Protocol Hierarchy
27Security Camp 2012
Protocol Hierarchy
28Security Camp 2012
Conversations
29Security Camp 2012
Conversations
30Security Camp 2012
Expert Info
31Security Camp 2012
Expert Info
32Security Camp 2012
Capture Filter
Security Camp 2012
Exercise 1
FTP Traffic
34Security Camp 2012
Exercise 1 : FTP Traffic
n  Q1: 封包擷取日期?
n  Q2: Protocol analysis ?
n  Q3. FTP server's IP address is
n  Q4. FTP client's IP address is
n  Q5. FTP Err Code 530 means
n  Q4. 10.234.125.254 attempt
Security Camp 2012
Exercise 2
Malware Communication Traffic
36Security Camp 2012
Exercise 2:
Malware Communication Traffic
n  Q1. What kind of malicious activity did this
malware do?
n  Q2. What is the malicious server's IP
address?
Security Camp 2012
Exercise 3
Malicious HTTP Traffic
38Security Camp 2012
n  Q1. Which site and which page were
defaced?
n  site
n  page
n  Q2. Which URL looks malicious?
n  Q3. Which software seemed to be the target
of this exploit?
n  Q4. What kind of malicioius activity was
executed after exploit?
39Security Camp 2012
HTTP Analysis
40Security Camp 2012
HTTP Analysis – Load
Distribution
41Security Camp 2012
HTTP Analysis – Packet Counter
42Security Camp 2012
HTTP Analysis – Requests
43Security Camp 2012
Export HTTP Objects
44Security Camp 2012
Packet Length
45Security Camp 2012
Packet Length

More Related Content

PDF
BackStabber Special: Supply chain attacks
PDF
Zero Day Malware Detection/Prevention Using Open Source Software
PDF
May The Data Stay with U! Network Data Exfiltration Techniques - Brucon 2017.
PDF
wolfSSL and TLS 1.3
PDF
An EyeWitness View into your Network
PDF
wolfSSL TLS 1.3 Support in 2018
PDF
FIPS 140-2 Validations in a Secure Enclave
PPTX
Leveraging Honest Users: Stealth Command-and-Control of Botnets
BackStabber Special: Supply chain attacks
Zero Day Malware Detection/Prevention Using Open Source Software
May The Data Stay with U! Network Data Exfiltration Techniques - Brucon 2017.
wolfSSL and TLS 1.3
An EyeWitness View into your Network
wolfSSL TLS 1.3 Support in 2018
FIPS 140-2 Validations in a Secure Enclave
Leveraging Honest Users: Stealth Command-and-Control of Botnets

What's hot (20)

PDF
Hardening Three - IDS/IPS Technologies
PDF
Wtf is happening_inside_my_android_phone_public
PDF
Fundamentals of network hacking
PDF
Java script and web cryptography (cf.objective)
PDF
Rpki with rpki.net tools
PDF
PDF
Suricata: A Decade Under the Influence (of packet sniffing)
PDF
Cryptography In The Browser Using JavaScript
PDF
Securing Data in Transit -
PDF
MTLS in a Microservices World
PPTX
OpenTelemetry For Operators
PDF
Container Security Mmanagement
PDF
Cryptographic Protocol is and isn't like LEGO.
PDF
Linux Security, from Concept to Tooling
PDF
Zerotrusting serverless applications protecting microservices using secure d...
PDF
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEA
PPTX
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
PDF
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
PDF
PhD Thesis Diogo Mónica
Hardening Three - IDS/IPS Technologies
Wtf is happening_inside_my_android_phone_public
Fundamentals of network hacking
Java script and web cryptography (cf.objective)
Rpki with rpki.net tools
Suricata: A Decade Under the Influence (of packet sniffing)
Cryptography In The Browser Using JavaScript
Securing Data in Transit -
MTLS in a Microservices World
OpenTelemetry For Operators
Container Security Mmanagement
Cryptographic Protocol is and isn't like LEGO.
Linux Security, from Concept to Tooling
Zerotrusting serverless applications protecting microservices using secure d...
ModSecurity and NGINX: Tuning the OWASP Core Rule Set - EMEA
BlueHat v17 || A Lustrum of Malware Network Communication: Evolution and Insi...
ContainerDays Boston 2016: "Hiding in Plain Sight: Managing Secrets in a Cont...
PhD Thesis Diogo Mónica
Ad

Similar to 網路攻擊與封包分析- Wireshark (20)

PDF
WebGoat.SDWAN.Net in Depth
PDF
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
ODP
Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...
PDF
wireshark.pdf
PDF
Security in distributed and remote network management protocols.pdf
PDF
Laporan Praktikum Keamanan Siber - Tugas 7 -Kelas C - Kelompok 3.pdf
PDF
Network forensics
PPTX
G3t R00t at IUT
PPTX
Network Security Forensics
PDF
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
ODP
Wireless security beyond password cracking by Mohit Ranjan
KEY
mod_security introduction at study2study #3
PDF
Chapter 8 security tools ii
PPTX
Sandbox kiev
PPTX
Open source network forensics and advanced pcap analysis
PPTX
Detect Threats Faster
ODP
Nagios Conference 2014 - Luke Groschen - Using Nagios Network Analyzer and NS...
PDF
The Art of defence: How vulnerabilites help shape security features and mitig...
PDF
Network traffic analysis course
WebGoat.SDWAN.Net in Depth
WebGoat.SDWAN.Net in Depth: SD-WAN Security Assessment
Nagios Conference 2013 - Spenser Reinhardt - Intro to Network Monitoring Usin...
wireshark.pdf
Security in distributed and remote network management protocols.pdf
Laporan Praktikum Keamanan Siber - Tugas 7 -Kelas C - Kelompok 3.pdf
Network forensics
G3t R00t at IUT
Network Security Forensics
MMIX Peering Forum and MMNOG 2020: Packet Analysis for Network Security
Wireless security beyond password cracking by Mohit Ranjan
mod_security introduction at study2study #3
Chapter 8 security tools ii
Sandbox kiev
Open source network forensics and advanced pcap analysis
Detect Threats Faster
Nagios Conference 2014 - Luke Groschen - Using Nagios Network Analyzer and NS...
The Art of defence: How vulnerabilites help shape security features and mitig...
Network traffic analysis course
Ad

More from Julia Yu-Chin Cheng (11)

PPTX
2022年_程式教育迎向未來新視野v2.pptx
PDF
Honeycon2016-honeypot updates for public
PDF
Honeywall roo 1
PDF
Honeywall roo 2
PDF
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
PDF
20100826-證交所-誘捕系統與殭屍網路(Botnet and honeypot)
PPTX
The Honeynet Project Introduction
PDF
Clientside attack using HoneyClient Technology
PDF
Malware Analysis - Example
PDF
Malware Analysis - Basic and Concept
PDF
Shellcode Analysis - Basic and Concept
2022年_程式教育迎向未來新視野v2.pptx
Honeycon2016-honeypot updates for public
Honeywall roo 1
Honeywall roo 2
Evolving Threat Landscapes Web-Based Botnet Through Exploit Kits and Scripts ...
20100826-證交所-誘捕系統與殭屍網路(Botnet and honeypot)
The Honeynet Project Introduction
Clientside attack using HoneyClient Technology
Malware Analysis - Example
Malware Analysis - Basic and Concept
Shellcode Analysis - Basic and Concept

Recently uploaded (20)

DOCX
Action plan to easily understanding okey
PPTX
3RD-Q 2022_EMPLOYEE RELATION - Copy.pptx
PPTX
Kompem Part Untuk MK Komunikasi Pembangunan 5.pptx
PPTX
Module_4_Updated_Presentation CORRUPTION AND GRAFT IN THE PHILIPPINES.pptx
PDF
5_tips_to_become_a_Presentation_Jedi_@itseugenec.pdf
PPTX
HOW TO HANDLE THE STAGE FOR ACADEMIA AND OTHERS.pptx
PPTX
Unit 8#Concept of teaching and learning.pptx
PPTX
CAPE CARIBBEAN STUDIES- Integration-1.pptx
PDF
Presentation on cloud computing and ppt..
PPTX
Sustainable Forest Management ..SFM.pptx
PDF
MODULE 3 BASIC SECURITY DUTIES AND ROLES.pdf
PDF
Yusen Logistics Group Sustainability Report 2024.pdf
PDF
Microsoft-365-Administrator-s-Guide_.pdf
PPTX
Phylogeny and disease transmission of Dipteran Fly (ppt).pptx
PPTX
ANICK 6 BIRTHDAY....................................................
PPTX
Knowledge Knockout ( General Knowledge Quiz )
PDF
PM Narendra Modi's speech from Red Fort on 79th Independence Day.pdf
PPTX
Research Process - Research Methods course
DOCX
CLASS XII bbbbbnjhcvfyfhfyfyhPROJECT.docx
PDF
Module 7 guard mounting of security pers
Action plan to easily understanding okey
3RD-Q 2022_EMPLOYEE RELATION - Copy.pptx
Kompem Part Untuk MK Komunikasi Pembangunan 5.pptx
Module_4_Updated_Presentation CORRUPTION AND GRAFT IN THE PHILIPPINES.pptx
5_tips_to_become_a_Presentation_Jedi_@itseugenec.pdf
HOW TO HANDLE THE STAGE FOR ACADEMIA AND OTHERS.pptx
Unit 8#Concept of teaching and learning.pptx
CAPE CARIBBEAN STUDIES- Integration-1.pptx
Presentation on cloud computing and ppt..
Sustainable Forest Management ..SFM.pptx
MODULE 3 BASIC SECURITY DUTIES AND ROLES.pdf
Yusen Logistics Group Sustainability Report 2024.pdf
Microsoft-365-Administrator-s-Guide_.pdf
Phylogeny and disease transmission of Dipteran Fly (ppt).pptx
ANICK 6 BIRTHDAY....................................................
Knowledge Knockout ( General Knowledge Quiz )
PM Narendra Modi's speech from Red Fort on 79th Independence Day.pdf
Research Process - Research Methods course
CLASS XII bbbbbnjhcvfyfhfyfyhPROJECT.docx
Module 7 guard mounting of security pers

網路攻擊與封包分析- Wireshark