SlideShare a Scribd company logo
Wireshark Tutorial
These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license
(http://creativecommons.org/licenses/by-nc/4.0/)
Network Startup Resource Center
www.ws.nsrc.org
Who am I?
• Dean Pemberton
• Long time network engineer
– Ascend
– Lucent
– Juniper
– Telstra NZ
• Now in network security with
www.cassini.nz
Thanks to…
… for letting me use their office to present from
Network Packet Analysis…
with Wireshark
What you hope network packet analysis is like...
Photo by Mick Haupt on Unsplash
What network packet analysis is really like!
Overview
• Review of the OSI Model
• Wireshark
– Capturing Packets
– A tour of the Wireshark UI
– Reviewing/Analysing Packets
– Filtering
– Demos
Review of the OSI Model
Application
Presentation
Session
Transport
Network
Link
Physical
7
6
5
4
3
2
1
Our old friend the 7-layer OSI model
101101
Layer 1: Physical Layer
• Transfers a stream of bits
• Defines physical characteristics
– Connectors, pinouts
– Cable types, voltages, modulation
– Fibre types, lambdas
– Transmission rate (bps)
• No knowledge of bytes or frames
Layer 2: (Data) Link Layer
• Organises data into frames
• May detect transmission errors (corrupt frames)
• May support shared media
–Addressing (unicast, multicast) – who should receive this
frame
–Access control, collision detection
• Usually identifies the L3 protocol carried
• E.g. Ethernet, Wifi
Layer 3: (Inter)Network Layer
• Connects Layer 2 networks together
– Forwarding data from one network to another
– These different networks are called subnets (short for sub-network)
• Unified addressing scheme
– Independent of the underlying L2 network(s)
– Addresses organised so that it can scale globally (aggregation)
• Identifies the layer 4 protocol being carried
• Fragmentation and reassembly
• E.g. IP
Layer 4: Transport Layer
• Identifies the endpoint process
– Another level of addressing (port number)
• May provide reliable delivery
– Streams of unlimited size
– Error correction and retransmission
– In-sequence delivery
– Flow control
• Might just be unreliable datagram transport
• E.g. TCP, UDP
Layers 5 and 6
• Session Layer: long-lived sessions
– Re-establish transport connection if it fails
– Multiplex data across multiple transport connections
• Presentation Layer: data reformatting
– Character set translation
• Neither exist in the TCP/IP suite: the application is
responsible for these functions
Layer 7: Application layer
• The actual work you want to do
• Protocols specific to each application
• E.g. telnet, http, https, imap
Encapsulation
• Each layer provides services to the layer above
• Each layer makes use of the layer below
• Data from one layer is encapsulated in frames of the layer
below
L2 hdr L3 hdr L4
hdr
Application data
Encapsulation in action
• L4 segment contains part of stream of application protocol
• L3 datagram contains L4 segment
• L2 frame has L3 datagram in data portion
Wireshark
• …is a free and open-source packet analyser.
Downloading
• https://www.wireshark.org/download.html
Welcome Screen
Interface Selection
Starting a capture
• Click on the Shark icon
• Select Start from the menu
Stopping a Capture
• Click on the Stop icon
• Select Stop from the menu
Saving a capture file
• Click on the Save icon
• Select Save from the menu
Sample PCAP files
• https://wiki.wireshark.org/SampleCaptures
Opening a capture file
• Select the Folder icon
• Select Open from the menu
Why do we need more than tcpdump?
Wireshark can give us much more
information about a network capture
UI – Overview
Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial
UI - Statistics
UI – Protocol Hierarchy
Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial
UI – Conversations
Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial
Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial
UI – Flow Graph
Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial
Reviewing captured packets
Packet List
Packet List
• Columns
– Time – the timestamp at which the packet crossed the
interface.
– Source – the originating host of the packet.
– Destination – the host to which the packet was sent.
– Protocol – the highest-level protocol that Wireshark can detect.
– Length – the length in bytes of the packet on the wire.
– Info – an informational message pertaining to the protocol in
the protocol column.
Modifying time format
Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial
Reviewing specific captured packets
Layer 2
Layer 3
Layer 4
Layer 7
Raw Packet
Demo raw packet highlighting
Remember this?
Filtering
• Capture Filters
• Display Filters
– Enter Expression Directly
– Use Expressions Editor
Filtering
Network
Interface
Capture
Filter
Captured
Packets
Display
Filter
Displayed
Packets
Filtering – Capture Filters
Display Filters – Enter Expression Directly
Display Filter examples
– http.request – Display all HTTP requests.
– http.request || http.response – Display all HTTP request and responses.
– ip.addr == 127.0.0.1 – Display all IP packets whose source or destination
is localhost.
– tcp.len < 100 – Display all TCP packets whose data length is less than
100 bytes.
– http.request.uri matches “(gif)$” - Display all HTTP requests in which
the uri ends with “gif”.
– dns.query.name == “www.google.com” - Display all DNS queries for
“www.google.com”.
Display Filters – Use the expressions editor
Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial
Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial
Following a stream
Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial
Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial
Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial
Demo – Telnet
• Don’t forget to follow the TCP stream
Demo – SIP
• Don’t forget to play the telephone call
Demp – BGP
• Don’t forget to look for the disconnect message
Mystery
$ tcpdump -n -s 0 -r mystery.pcap
reading from file mystery.pcap, link-type EN10MB (Ethernet)
16:35:03.821897 IP6 2402:f000:1:8e01::5555 > 2607:fcd0:100:2300::b108:2a6b: IP
16.0.0.200 > 192.52.166.154: GREv1, call 6016, seq 430001, ack 539254, length 119: IP
172.16.44.3.40768 > 8.8.8.8.53: 42540+ AAAA? xqt-detect-mode2-97712e88-167a-45b9-93ee-
913140e76678. (71)
16:35:04.035791 IP6 2607:fcd0:100:2300::b108:2a6b > 2402:f000:1:8e01::5555: IP
192.52.166.154 > 16.0.0.200: GREv1, call 17, seq 539320, length 190: IP 8.8.8.8.53 >
172.16.44.3.40768: 42540 NXDomain 0/1/0 (146)
Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial
Demo – GRE
Demo – OSPF over GRE
Extending Wireshark - Lua
• Too long for this tutorial.
• https://wiki.wireshark.org/Lua/Dissectors
Questions?
Thank you

More Related Content

PDF
Wireshark lecture
PDF
Wireshark lecture
PPTX
Wireshark Packet Analyzer.pptx
PPT
Wireshark Basics
DOCX
Wireshark Lab Getting Started v6.0 Supplement to Co.docx
PPTX
Network Packet Analysis with Wireshark
PPTX
Wireshark.pptx
PPTX
Wireshark
Wireshark lecture
Wireshark lecture
Wireshark Packet Analyzer.pptx
Wireshark Basics
Wireshark Lab Getting Started v6.0 Supplement to Co.docx
Network Packet Analysis with Wireshark
Wireshark.pptx
Wireshark

Similar to Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial (20)

PPTX
Wireshark network analysing software
PDF
Ferramenta de análise de rede para windows e linux
PPTX
Workshop Wireshark
PPT
wiresharktslecturev10006july2009-12501942038813-phpapp03.ppt
DOCX
Wireshark lab getting started one’s unde
PPTX
Wireshark
PDF
Wireshark 101 - OWASP Chandigarh Meetup - CyberForge Academy
PDF
Network Monitoring with Wireshark
PDF
Network Analysis Using Wireshark Jan 18- seminar
PPTX
Wireshark
PDF
Wireshark tutorial
DOCX
Experiment 7 traffic analysis
PDF
wireshark.pdf
PDF
Wireshark tutorial
PDF
Introduction to Wireshark for Packet Tracker
PPTX
Wireshark, Tcpdump and Network Performance tools
PPT
Wireshark Inroduction Li In
PDF
Analysis of network traffic by using packet sniffing tool wireshark
PPT
Traffic-Monitoring.ppt
PPT
Traffic-Monitoring.ppt
Wireshark network analysing software
Ferramenta de análise de rede para windows e linux
Workshop Wireshark
wiresharktslecturev10006july2009-12501942038813-phpapp03.ppt
Wireshark lab getting started one’s unde
Wireshark
Wireshark 101 - OWASP Chandigarh Meetup - CyberForge Academy
Network Monitoring with Wireshark
Network Analysis Using Wireshark Jan 18- seminar
Wireshark
Wireshark tutorial
Experiment 7 traffic analysis
wireshark.pdf
Wireshark tutorial
Introduction to Wireshark for Packet Tracker
Wireshark, Tcpdump and Network Performance tools
Wireshark Inroduction Li In
Analysis of network traffic by using packet sniffing tool wireshark
Traffic-Monitoring.ppt
Traffic-Monitoring.ppt
Ad

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Encapsulation theory and applications.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Modernizing your data center with Dell and AMD
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Empathic Computing: Creating Shared Understanding
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
A Presentation on Artificial Intelligence
PDF
NewMind AI Monthly Chronicles - July 2025
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Encapsulation theory and applications.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Building Integrated photovoltaic BIPV_UPV.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Modernizing your data center with Dell and AMD
Agricultural_Statistics_at_a_Glance_2022_0.pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Empathic Computing: Creating Shared Understanding
Spectral efficient network and resource selection model in 5G networks
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
cuic standard and advanced reporting.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
MYSQL Presentation for SQL database connectivity
A Presentation on Artificial Intelligence
NewMind AI Monthly Chronicles - July 2025
Ad

Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial