1. Wireshark Tutorial
These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license
(http://creativecommons.org/licenses/by-nc/4.0/)
Network Startup Resource Center
www.ws.nsrc.org
2. Who am I?
• Dean Pemberton
• Long time network engineer
– Ascend
– Lucent
– Juniper
– Telstra NZ
• Now in network security with
www.cassini.nz
10. 101101
Layer 1: Physical Layer
• Transfers a stream of bits
• Defines physical characteristics
– Connectors, pinouts
– Cable types, voltages, modulation
– Fibre types, lambdas
– Transmission rate (bps)
• No knowledge of bytes or frames
11. Layer 2: (Data) Link Layer
• Organises data into frames
• May detect transmission errors (corrupt frames)
• May support shared media
–Addressing (unicast, multicast) – who should receive this
frame
–Access control, collision detection
• Usually identifies the L3 protocol carried
• E.g. Ethernet, Wifi
12. Layer 3: (Inter)Network Layer
• Connects Layer 2 networks together
– Forwarding data from one network to another
– These different networks are called subnets (short for sub-network)
• Unified addressing scheme
– Independent of the underlying L2 network(s)
– Addresses organised so that it can scale globally (aggregation)
• Identifies the layer 4 protocol being carried
• Fragmentation and reassembly
• E.g. IP
13. Layer 4: Transport Layer
• Identifies the endpoint process
– Another level of addressing (port number)
• May provide reliable delivery
– Streams of unlimited size
– Error correction and retransmission
– In-sequence delivery
– Flow control
• Might just be unreliable datagram transport
• E.g. TCP, UDP
14. Layers 5 and 6
• Session Layer: long-lived sessions
– Re-establish transport connection if it fails
– Multiplex data across multiple transport connections
• Presentation Layer: data reformatting
– Character set translation
• Neither exist in the TCP/IP suite: the application is
responsible for these functions
15. Layer 7: Application layer
• The actual work you want to do
• Protocols specific to each application
• E.g. telnet, http, https, imap
16. Encapsulation
• Each layer provides services to the layer above
• Each layer makes use of the layer below
• Data from one layer is encapsulated in frames of the layer
below
17. L2 hdr L3 hdr L4
hdr
Application data
Encapsulation in action
• L4 segment contains part of stream of application protocol
• L3 datagram contains L4 segment
• L2 frame has L3 datagram in data portion
41. Packet List
• Columns
– Time – the timestamp at which the packet crossed the
interface.
– Source – the originating host of the packet.
– Destination – the host to which the packet was sent.
– Protocol – the highest-level protocol that Wireshark can detect.
– Length – the length in bytes of the packet on the wire.
– Info – an informational message pertaining to the protocol in
the protocol column.
56. Display Filter examples
– http.request – Display all HTTP requests.
– http.request || http.response – Display all HTTP request and responses.
– ip.addr == 127.0.0.1 – Display all IP packets whose source or destination
is localhost.
– tcp.len < 100 – Display all TCP packets whose data length is less than
100 bytes.
– http.request.uri matches “(gif)$” - Display all HTTP requests in which
the uri ends with “gif”.
– dns.query.name == “www.google.com” - Display all DNS queries for
“www.google.com”.