SlideShare a Scribd company logo
Network Traffic Analysis
Presented By
Ahmed Elshaer
Security Operation Specialist
Agenda
● Why Traffic Analysis
● TCP/IP Review
● The Protocols
● Tcpdump/Tshark Basics
● Wireshark Foundation
● Hands-On Network Forensics
Why Traffic Analysis ?
● Gain special knowledge about the network.
● Investigate and troubleshoot abnormal behavior
– Abnormal packets.
– Network slow performance.
● Congestion.
● Retransmission.
– Unexpected traffic.
– Broken applications.
– Load balancer issues.
Why Traffic Analysis ?
● Network Forensics
– Collecting evidence.
– Incident Handling.
– Tracing attacks.
– Linking infected hosts.
– Determining patient zero.
● Stealing Sensitive information
● Pen-testing.
● Developing IPS/IDS signatures.
How Packet Sniffer Works
● Collection
– the packet sniffer collects raw binary data from the wire.
● Conversion
– the captured binary data is converted into a readable form
● Analysis
– the actual analysis of the captured and converted data.
– The packet sniffer verifies its protocol based on that
protocol’s specific features.
TCP/IP Overview: OSI Model
TCP/IP Overview: OSI Model
Network Traffic Analysis
Network Traffic Analysis
● Protocols
– Ethernet
– IP
– TCP/UDP
– DNS
– DHCP
– FTP
– Telnet
– HTTP
Ethernet Frame
IP Packet
TCP Packet
TCP session initiation/termination
TCP session initiation/termination
UDP
The Big Picture !!!
Network Traffic Analysis
● BPF Filters, what !!!
– Berkley Packet Filter
– A knowledge of BPF syntax is crucial as you dig
deeper into networks at the packet level.
– Allow you to specify exactly which packets you want to
capture.
– Get rid or Packets you don't want to capture
– BPF is how you talk to the Network Drivers :)
Network Traffic Analysis
Network Traffic Analysis
● Command Line Tools:
– TCPdump
– Tshark
– Dumpcap, why !!!
● Graphical Tools:
– Wireshark
Network Traffic Analysis
● TCPDUMP Basics (1)
Network Traffic Analysis
● TCPDUMP Basics (2)
Network Traffic Analysis
● TCPDUMP Basics (3)
Network Traffic Analysis
● TCPDUMP Examples (1):
– $sudo tcpdump -n -i eth0 -c 5
– $sudo tcpdump -n -i eth0 -c 10 -w test01.pcap
– $tcpdump -n -r test01.pcap
– $sudo tcpdump -n -i eth0 -c 10 - w icmp.pcap icmp
– $sudo tcpdump -n -i eth0 -s 0 port 53
– $sudo tcpdump -n -i eth0 -s 0 port 53 and tcp
– $sudo tcpdump -n -i eth0 -s 0 tcp port 53
– $sudo tcpdump -n -r icmp.pcap host 192.168.56.104
Network Traffic Analysis
●
TCPDUMP Examples (2):
– $sudo tcpdump -n -r icmp.pcap src host 10.10.5.10
– $sudo tcpdump -n -r icmp.pcap dst host 10.18.6.10
– $sudo tcpdump -n -r icmp.pcap net 10.10.56.0
– $sudo tcpdump -n -r icmp.pcap src net 10.10.56.0
– $sudo tcpdump -n -r icmp.pcap dst net 10.10.56.0
● Bash !!!
for file in ` find /pcaps/ -name '*.pcap' `; do 
tcpdump -r $file 'port 21' -A|grep -iE 'USER|PASS' 
; done
Network Traffic Analysis
● Tshark, Advanced analysis capabilities
● Tshark = tcpdump++
● Tshark Examples(1):
– To list the interfaces
● tshark -D
– To listen on interface
● tshark -i eth0
● tshark -i 1
Network Traffic Analysis
● Tshark Example (2):
● tshark -n -i wlan0 -p -a filesize:1000 -w 1MB.pcap
● tshark -n -i 7 -c 1000 -w test01.pcap -f 'tcp port 80'
● tshark -n -i 7 -f 'port 53'
● tshark -R "ip.addr == 192.168.56.101" -r test01.pcap
● tshark -R "not arp and not (udp.port == 53)" -r test.pcap
● tshark -Y "http contains user" -r httpcap.pcap -x
● tshark -T fields -e ip.src -e tcp.srcport -e ip.dst -e tcp.dstport
-E header=y -r test01.pcap
Network Traffic Analysis
● Dumpcap
– a network traffic dump tool
– It captures packet data from a live network and writes
the packets to a file.
– Why should I use it !!!
Network Traffic Analysis
● Wireshark Basic Operations
– Live Capture
– Open PCAP File
– Basic Filters
– Follow TCP Stream
– Time Stamps
– Expert Info
– Statistics
Network Traffic Analysis
● Wireshark Packet Inspection
– ARP
– IP
– TCP
– HTTP
– FTP
– DNS
– DHCP
Network Traffic Analysis
● Wireshark Advanced Tasks
– SSL Decryption
– Network Forensics and File Carving
● Extract Files from FTP
● Extract Files from HTTP
Network Traffic Analysis
CTF Time
References/more resources
● http://www.chrisbrenton.org/category/security/network/
● http://packetlife.net/library/cheat-sheets/
● Practical Packet Analysis - NoStarchPress
● http://packetlife.net/captures/
● http://wiki.wireshark.org/SampleCaptures
● http://www.netresec.com/?page=PcapFiles
● Network Analysis Sessions By Ahemd Adel

More Related Content

PDF
Wireshark Traffic Analysis
PPTX
Authentication service security
PPTX
Firewalls and packet filters
PDF
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
PPTX
Wireshark Packet Analyzer.pptx
PPT
Dns protocol design attacks and security
PPT
CCNA Security 02- fundamentals of network security
PPT
Wireshark Inroduction Li In
Wireshark Traffic Analysis
Authentication service security
Firewalls and packet filters
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Wireshark Packet Analyzer.pptx
Dns protocol design attacks and security
CCNA Security 02- fundamentals of network security
Wireshark Inroduction Li In

What's hot (20)

PPTX
Network traffic analysis with cyber security
PPT
Intrusion Detection Systems and Intrusion Prevention Systems
PDF
VPN - Virtual Private Network
PPT
PPTX
Packet sniffers
PPT
Wireshark Basics
PPTX
Software Defined Network - SDN
PDF
Introduction to Software Defined Networking (SDN)
PPTX
Intrusion prevention system(ips)
PPTX
Packet sniffing
PPTX
Bgp protocol
PPTX
Intrusion detection system
PPTX
Packet sniffers
PPTX
Routing algorithm
PPTX
Introduction of Iot and Logical and Physical design of iot
PPT
Intrusion Detection System
PPT
DDoS Attack PPT by Nitin Bisht
PPT
Intrusion detection system ppt
PPT
Security Attacks.ppt
PPT
Routing
Network traffic analysis with cyber security
Intrusion Detection Systems and Intrusion Prevention Systems
VPN - Virtual Private Network
Packet sniffers
Wireshark Basics
Software Defined Network - SDN
Introduction to Software Defined Networking (SDN)
Intrusion prevention system(ips)
Packet sniffing
Bgp protocol
Intrusion detection system
Packet sniffers
Routing algorithm
Introduction of Iot and Logical and Physical design of iot
Intrusion Detection System
DDoS Attack PPT by Nitin Bisht
Intrusion detection system ppt
Security Attacks.ppt
Routing
Ad

Viewers also liked (9)

PDF
Telecommunication switching system
PPT
Switching systems lecture1
PPT
Switching systems lecture2
PPT
Telecommunications and networks
PPT
Switching systems lecture3
PDF
1 Telecommunication Switching Systems And Networks
PPTX
Traffic analysis
PDF
Design and Simulation Microstrip patch Antenna using CST Microwave Studio
PPTX
Basic of telecommunication presentation
Telecommunication switching system
Switching systems lecture1
Switching systems lecture2
Telecommunications and networks
Switching systems lecture3
1 Telecommunication Switching Systems And Networks
Traffic analysis
Design and Simulation Microstrip patch Antenna using CST Microwave Studio
Basic of telecommunication presentation
Ad

Similar to Network traffic analysis course (20)

PPTX
Wireshark, Tcpdump and Network Performance tools
PPT
Traffic-Monitoring.ppt
PPT
Traffic-Monitoring.ppt
PPT
Traffic-Monitoring.ppt
PDF
wireshark.pdf
DOCX
Experiment 7 traffic analysis
PPTX
Packet Analysis - Course Technology Computing Conference
PPT
Traffic monitoring
PPT
an_introduction_to_network_analyzers_new.ppt
PDF
Unit 2.3 Introduction to Cyber Security Tools and Environment.pdf
PPT
Day2
PDF
Ferramenta de análise de rede para windows e linux
PDF
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
PDF
Debugging applications with network security tools
PDF
Analysis of network traffic by using packet sniffing tool wireshark
PDF
CNIT 121: 9 Network Evidence
PDF
CNIT 152: 9 Network Evidence
PPTX
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
PDF
CNIT 50: 6. Command Line Packet Analysis Tools
PDF
(130511) #fitalk network forensics and its role and scope
Wireshark, Tcpdump and Network Performance tools
Traffic-Monitoring.ppt
Traffic-Monitoring.ppt
Traffic-Monitoring.ppt
wireshark.pdf
Experiment 7 traffic analysis
Packet Analysis - Course Technology Computing Conference
Traffic monitoring
an_introduction_to_network_analyzers_new.ppt
Unit 2.3 Introduction to Cyber Security Tools and Environment.pdf
Day2
Ferramenta de análise de rede para windows e linux
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
Debugging applications with network security tools
Analysis of network traffic by using packet sniffing tool wireshark
CNIT 121: 9 Network Evidence
CNIT 152: 9 Network Evidence
Detecting Reconnaissance Through Packet Forensics by Shashank Nigam
CNIT 50: 6. Command Line Packet Analysis Tools
(130511) #fitalk network forensics and its role and scope

Recently uploaded (20)

PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
cloud_computing_Infrastucture_as_cloud_p
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
STKI Israel Market Study 2025 version august
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
Getting Started with Data Integration: FME Form 101
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Architecture types and enterprise applications.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
Hybrid model detection and classification of lung cancer
PDF
WOOl fibre morphology and structure.pdf for textiles
A contest of sentiment analysis: k-nearest neighbor versus neural network
cloud_computing_Infrastucture_as_cloud_p
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
STKI Israel Market Study 2025 version august
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Enhancing emotion recognition model for a student engagement use case through...
Assigned Numbers - 2025 - Bluetooth® Document
Final SEM Unit 1 for mit wpu at pune .pptx
Chapter 5: Probability Theory and Statistics
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
NewMind AI Weekly Chronicles – August ’25 Week III
NewMind AI Weekly Chronicles - August'25-Week II
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Getting Started with Data Integration: FME Form 101
DP Operators-handbook-extract for the Mautical Institute
Architecture types and enterprise applications.pdf
Hindi spoken digit analysis for native and non-native speakers
Zenith AI: Advanced Artificial Intelligence
Hybrid model detection and classification of lung cancer
WOOl fibre morphology and structure.pdf for textiles

Network traffic analysis course

  • 1. Network Traffic Analysis Presented By Ahmed Elshaer Security Operation Specialist
  • 2. Agenda ● Why Traffic Analysis ● TCP/IP Review ● The Protocols ● Tcpdump/Tshark Basics ● Wireshark Foundation ● Hands-On Network Forensics
  • 3. Why Traffic Analysis ? ● Gain special knowledge about the network. ● Investigate and troubleshoot abnormal behavior – Abnormal packets. – Network slow performance. ● Congestion. ● Retransmission. – Unexpected traffic. – Broken applications. – Load balancer issues.
  • 4. Why Traffic Analysis ? ● Network Forensics – Collecting evidence. – Incident Handling. – Tracing attacks. – Linking infected hosts. – Determining patient zero. ● Stealing Sensitive information ● Pen-testing. ● Developing IPS/IDS signatures.
  • 5. How Packet Sniffer Works ● Collection – the packet sniffer collects raw binary data from the wire. ● Conversion – the captured binary data is converted into a readable form ● Analysis – the actual analysis of the captured and converted data. – The packet sniffer verifies its protocol based on that protocol’s specific features.
  • 9. Network Traffic Analysis ● Protocols – Ethernet – IP – TCP/UDP – DNS – DHCP – FTP – Telnet – HTTP
  • 15. UDP
  • 17. Network Traffic Analysis ● BPF Filters, what !!! – Berkley Packet Filter – A knowledge of BPF syntax is crucial as you dig deeper into networks at the packet level. – Allow you to specify exactly which packets you want to capture. – Get rid or Packets you don't want to capture – BPF is how you talk to the Network Drivers :)
  • 19. Network Traffic Analysis ● Command Line Tools: – TCPdump – Tshark – Dumpcap, why !!! ● Graphical Tools: – Wireshark
  • 20. Network Traffic Analysis ● TCPDUMP Basics (1)
  • 21. Network Traffic Analysis ● TCPDUMP Basics (2)
  • 22. Network Traffic Analysis ● TCPDUMP Basics (3)
  • 23. Network Traffic Analysis ● TCPDUMP Examples (1): – $sudo tcpdump -n -i eth0 -c 5 – $sudo tcpdump -n -i eth0 -c 10 -w test01.pcap – $tcpdump -n -r test01.pcap – $sudo tcpdump -n -i eth0 -c 10 - w icmp.pcap icmp – $sudo tcpdump -n -i eth0 -s 0 port 53 – $sudo tcpdump -n -i eth0 -s 0 port 53 and tcp – $sudo tcpdump -n -i eth0 -s 0 tcp port 53 – $sudo tcpdump -n -r icmp.pcap host 192.168.56.104
  • 24. Network Traffic Analysis ● TCPDUMP Examples (2): – $sudo tcpdump -n -r icmp.pcap src host 10.10.5.10 – $sudo tcpdump -n -r icmp.pcap dst host 10.18.6.10 – $sudo tcpdump -n -r icmp.pcap net 10.10.56.0 – $sudo tcpdump -n -r icmp.pcap src net 10.10.56.0 – $sudo tcpdump -n -r icmp.pcap dst net 10.10.56.0 ● Bash !!! for file in ` find /pcaps/ -name '*.pcap' `; do tcpdump -r $file 'port 21' -A|grep -iE 'USER|PASS' ; done
  • 25. Network Traffic Analysis ● Tshark, Advanced analysis capabilities ● Tshark = tcpdump++ ● Tshark Examples(1): – To list the interfaces ● tshark -D – To listen on interface ● tshark -i eth0 ● tshark -i 1
  • 26. Network Traffic Analysis ● Tshark Example (2): ● tshark -n -i wlan0 -p -a filesize:1000 -w 1MB.pcap ● tshark -n -i 7 -c 1000 -w test01.pcap -f 'tcp port 80' ● tshark -n -i 7 -f 'port 53' ● tshark -R "ip.addr == 192.168.56.101" -r test01.pcap ● tshark -R "not arp and not (udp.port == 53)" -r test.pcap ● tshark -Y "http contains user" -r httpcap.pcap -x ● tshark -T fields -e ip.src -e tcp.srcport -e ip.dst -e tcp.dstport -E header=y -r test01.pcap
  • 27. Network Traffic Analysis ● Dumpcap – a network traffic dump tool – It captures packet data from a live network and writes the packets to a file. – Why should I use it !!!
  • 28. Network Traffic Analysis ● Wireshark Basic Operations – Live Capture – Open PCAP File – Basic Filters – Follow TCP Stream – Time Stamps – Expert Info – Statistics
  • 29. Network Traffic Analysis ● Wireshark Packet Inspection – ARP – IP – TCP – HTTP – FTP – DNS – DHCP
  • 30. Network Traffic Analysis ● Wireshark Advanced Tasks – SSL Decryption – Network Forensics and File Carving ● Extract Files from FTP ● Extract Files from HTTP
  • 32. References/more resources ● http://www.chrisbrenton.org/category/security/network/ ● http://packetlife.net/library/cheat-sheets/ ● Practical Packet Analysis - NoStarchPress ● http://packetlife.net/captures/ ● http://wiki.wireshark.org/SampleCaptures ● http://www.netresec.com/?page=PcapFiles ● Network Analysis Sessions By Ahemd Adel