SlideShare a Scribd company logo
2
Most read
4
Most read
6
Most read
Wireshark Workshop
Fabio Rosa / Systems Engineer
What is it?!










World’s most famous network protocol analyzer
Powerful live-capture and display filter
Used to be “Ethereal”
Deep inspection of hundred of protocols, and more being
added each day…
Multi-platform, runs on Windows, Linux, OS, Solaris, FreeBSD,
NetBSD,VxWorks, Android, and much more.
Open/save many capture formats: tcpdump (libpcap), Microsoft
Network Monitor, and proprietary (WildPackets *peek, CA
Sniffer, RADCOM, and many others)
The sponsorship (CACE) recently owned by Riverbed. (Don’t
want to talk about it…)
Agenda:












Tool introduction
The Capture Screen
Performing a Simple Capture
Capture options (promiscuous mode, name resolution,
buffer size, etc…)
Display Filters
Sample Capture - DNS and HTTP (www.ebay.com)
Sample Capture - ICAP
Annex A – Handling Duplicate Packets
Annex B – Useful Websites
Annex C – HTTP Status Codes.
Introduction



It’s a Network Analyzer!
Will capture network packets and display them as
detailed as possible


Custom Capture: All packets destined to the WS Wkst.




Good to sniff traffic intended to the PC or server where Wireshark is
installed

Promiscuous mode: All packets on the wire




Good to sniff communication between multiple devices (ex. From
Proxy, sniff DNS, Client, OCS, and so on…) / Diagnose problems.
Can be captured on a mirrored port, SPAN or Network TAP for full
network visibility.
How it works? Network If. Uses the L2 address of FF:FF:FF:FF:FF:FF
and parses all packets on the wire, instead of dropping the packets
intended to other network devices.
The Capture Screen

Captured Packet List

Protocol Decode
HEX Decode
Simple Capture
Capture Options
Enable Promiscuous mode
Limit packet size, if you
don’t want to analyze the
payload. (Only headers)
Personalize Display options
Personalize Name
Resolution
-

MAC: vendor list (very useful)
Network: RDNS resolution
Do not enable … can slow
down things
Transport: Protocol name (very
useful)
Display Filters




Use the filter box to
enter the filter
expression
The expressions can
be saved into the
Filter Profile, for
future use.
Display Filters (cont.)


Filter Expression example:


Ethernet






Internet Protocol






Ip.addr ==
Ip.src / Ip.dst ==
Ip.dsfield == 0x00

TIP
• You can see the whole expression list
using the “Expression” box on the
toolbar
• Its possible to search options using the
“/” key
• Use Boolean operators (AND, OR,
NOT)

TCP




Eth.addr ==
Eth.src / Eth.dst ==
Eth.vlan.id ==

Tcp.flag.syn / tcp.flag.ack / tcp.flag.fin == 0 or 1

Application or Protocol


HTTP, DNS, ICAP, ICMP, SOCKS…


In case a protocol is being decoded by a wrong “dissector” you can change it
with the “Decode As…” option.
Display Filters (cont. 2)


You can create filters based on the options, selected
directly from the packet capture.


Apply as a Filter




Prepare as a Filter




The filter is applied with the selected parameter
The filter expression is written at the “Filter” bar on the top.

Colorize as a Filter


The packets matched by the filter can be colorized with custom
colors.
Sample Capture #1











Capture: Open www.ebay.com at the browser
Open Summary (check throughput, size, packets)
Select: “Follow TCP Stream”
Configure “Manually Resolve Address”
Configure the “Delta Time” column – Check server
response time.
Show “Statistics > Endpoints”
Show “Statistics > Conversations”
Show “Statistics > IO Graphs”
Extract HTTP objects from the capture “File > Export >
Objects > HTTP”
Sample Capture #2











Open Capture with ICAP example
Check Origin and Destination Address
Configure “Manually Resolve Address” for Proxy, AV and
DNS
Create a Display Filter for ICAP traffic only
Check server response time on “Delta Time”
Select a session and “Follow TCP Stream”
Open Summary (check throughput, size, packets)
Check server requests, response and health-check.
Its also possible to retrieve HTTP objects from an ICAP
connection.
Annex A: Duplicate Packets


Dup. Packets due to Network Retransmission




If a sending host thinks a packet is not transmitted correctly
because of Packet Loss, it might Retransmit that packet. The
receiving host might already got the first packet, and will
receive a second one, which is a duplicated packet.
To remove this packets use the filter:




not tcp.analysis.duplicate_ack and not tcp.analysis.retransmission

Dup. Packets due to Routing or switching loop.



This packets can be seen when sniffing trough a mirrored port
or network TAP.
Use the “editcap.exe” at %ProgramFiles%/Wireshark/ to
remove them.


Example: editcap -d capture.pcap dedup.pcap
Annex B: Useful Websites


Download Wireshark!


www.wireshark.org




This workshop was created using version 1.6.0

Capture examples:


http://wiki.wireshark.org/SampleCaptures




The SampleCapture area at the wireshark.com website has a good list
of capture examples.

http://packetlife.net/captures/


One of the greatest IT/Telecom blogs … offer great capture examples
and Network Posters with protocol detail.
Annex C - HTTP Status Codes



1xx – Informational
Codes
2xx – Success










200 OK



3xx – Redirection







300 Multiple
Choices
301 Moved
Permanently
302 Found
304 Not Modified
307 Temporary
Redirect

4xx – Client Error





400 Bad Request
401 Unauthorized
403 Forbidden
404 Not Found
410 Gone

5xx – Server Error






500 Internal Server
Error
501 Not
Implemented
503 Service
Unavailable
550 Permission
denied
Questions?

More Related Content

PPTX
Packet analysis using wireshark
PPTX
Wireshark.pptx
PPTX
Network Packet Analysis with Wireshark
PPTX
EIGRP Protocol.pptx
PPT
Wireshark
PPT
Arp spoofing
PPT
Wireshark - presentation
PPTX
Grayhole
Packet analysis using wireshark
Wireshark.pptx
Network Packet Analysis with Wireshark
EIGRP Protocol.pptx
Wireshark
Arp spoofing
Wireshark - presentation
Grayhole

What's hot (20)

PPTX
Wireshark
PPTX
IPSec VPN & IPSec Protocols
PPT
Introduction To Cisco Switching – Part 1
PDF
Nmap commands
PPT
Tcp
PPTX
Wireshark
DOCX
Mikrotik basic configuration
PPT
Protocol for Secure Communication
PDF
Wireshark Traffic Analysis
PPTX
PPTX
Packet sniffing in LAN
PPTX
Media Access Control Address or MAC address
PPT
Ethernet
PPTX
Wireshark
PPT
Port Scanning
PDF
Introduction to firewalls through Iptables
PPT
Tcp Udp Icmp And The Transport Layer
PPTX
GRE (Generic Routing Encapsulation)
Wireshark
IPSec VPN & IPSec Protocols
Introduction To Cisco Switching – Part 1
Nmap commands
Tcp
Wireshark
Mikrotik basic configuration
Protocol for Secure Communication
Wireshark Traffic Analysis
Packet sniffing in LAN
Media Access Control Address or MAC address
Ethernet
Wireshark
Port Scanning
Introduction to firewalls through Iptables
Tcp Udp Icmp And The Transport Layer
GRE (Generic Routing Encapsulation)
Ad

Viewers also liked (7)

PPT
Energy from Brazil to Africa
PPT
Brazil presentation
PPT
Social entrepreneurship verses Business Entrepreneurship
PPT
Social entrepreneurship and venture philanthropy
PPT
Social entrepreneurship
PPT
Lecture 6 Social Entrepreneurship
PPTX
Social enterpreneurship ppt
Energy from Brazil to Africa
Brazil presentation
Social entrepreneurship verses Business Entrepreneurship
Social entrepreneurship and venture philanthropy
Social entrepreneurship
Lecture 6 Social Entrepreneurship
Social enterpreneurship ppt
Ad

Similar to Workshop Wireshark (20)

PPTX
Wireshark Packet Analyzer.pptx
PDF
Wireshark lecture
PDF
Wireshark lecture
PDF
Network analysis Using Wireshark 4: Capture Filters
PPT
Traffic-Monitoring.ppt
PPT
Traffic-Monitoring.ppt
PPT
Traffic-Monitoring.ppt
PDF
Ferramenta de análise de rede para windows e linux
PDF
Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial
PDF
Wireshark 101 - OWASP Chandigarh Meetup - CyberForge Academy
PDF
wireshark.pdf
PPT
Wireshark Inroduction Li In
PPTX
Wireshark
PPT
Traffic monitoring
PDF
Wireshark course, Ch 03: Capture and display filters
PPT
wiresharktslecturev10006july2009-12501942038813-phpapp03.ppt
PPT
Wireshark Basics
PDF
Network Analysis using Wireshark 5: display filters
PPTX
PDF
Wireshark_1714944796.pdf for troubleshooting
Wireshark Packet Analyzer.pptx
Wireshark lecture
Wireshark lecture
Network analysis Using Wireshark 4: Capture Filters
Traffic-Monitoring.ppt
Traffic-Monitoring.ppt
Traffic-Monitoring.ppt
Ferramenta de análise de rede para windows e linux
Wireshark Tutorial, Wireshark Tutorial, Wireshark Tutorial
Wireshark 101 - OWASP Chandigarh Meetup - CyberForge Academy
wireshark.pdf
Wireshark Inroduction Li In
Wireshark
Traffic monitoring
Wireshark course, Ch 03: Capture and display filters
wiresharktslecturev10006july2009-12501942038813-phpapp03.ppt
Wireshark Basics
Network Analysis using Wireshark 5: display filters
Wireshark_1714944796.pdf for troubleshooting

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Electronic commerce courselecture one. Pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Approach and Philosophy of On baking technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
sap open course for s4hana steps from ECC to s4
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Big Data Technologies - Introduction.pptx
Programs and apps: productivity, graphics, security and other tools
Review of recent advances in non-invasive hemoglobin estimation
MYSQL Presentation for SQL database connectivity
Cloud computing and distributed systems.
Encapsulation_ Review paper, used for researhc scholars
Electronic commerce courselecture one. Pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Chapter 3 Spatial Domain Image Processing.pdf
Understanding_Digital_Forensics_Presentation.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Spectral efficient network and resource selection model in 5G networks
Approach and Philosophy of On baking technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
sap open course for s4hana steps from ECC to s4
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Building Integrated photovoltaic BIPV_UPV.pdf

Workshop Wireshark

  • 1. Wireshark Workshop Fabio Rosa / Systems Engineer
  • 2. What is it?!        World’s most famous network protocol analyzer Powerful live-capture and display filter Used to be “Ethereal” Deep inspection of hundred of protocols, and more being added each day… Multi-platform, runs on Windows, Linux, OS, Solaris, FreeBSD, NetBSD,VxWorks, Android, and much more. Open/save many capture formats: tcpdump (libpcap), Microsoft Network Monitor, and proprietary (WildPackets *peek, CA Sniffer, RADCOM, and many others) The sponsorship (CACE) recently owned by Riverbed. (Don’t want to talk about it…)
  • 3. Agenda:           Tool introduction The Capture Screen Performing a Simple Capture Capture options (promiscuous mode, name resolution, buffer size, etc…) Display Filters Sample Capture - DNS and HTTP (www.ebay.com) Sample Capture - ICAP Annex A – Handling Duplicate Packets Annex B – Useful Websites Annex C – HTTP Status Codes.
  • 4. Introduction   It’s a Network Analyzer! Will capture network packets and display them as detailed as possible  Custom Capture: All packets destined to the WS Wkst.   Good to sniff traffic intended to the PC or server where Wireshark is installed Promiscuous mode: All packets on the wire    Good to sniff communication between multiple devices (ex. From Proxy, sniff DNS, Client, OCS, and so on…) / Diagnose problems. Can be captured on a mirrored port, SPAN or Network TAP for full network visibility. How it works? Network If. Uses the L2 address of FF:FF:FF:FF:FF:FF and parses all packets on the wire, instead of dropping the packets intended to other network devices.
  • 5. The Capture Screen Captured Packet List Protocol Decode HEX Decode
  • 7. Capture Options Enable Promiscuous mode Limit packet size, if you don’t want to analyze the payload. (Only headers) Personalize Display options Personalize Name Resolution - MAC: vendor list (very useful) Network: RDNS resolution Do not enable … can slow down things Transport: Protocol name (very useful)
  • 8. Display Filters   Use the filter box to enter the filter expression The expressions can be saved into the Filter Profile, for future use.
  • 9. Display Filters (cont.)  Filter Expression example:  Ethernet     Internet Protocol     Ip.addr == Ip.src / Ip.dst == Ip.dsfield == 0x00 TIP • You can see the whole expression list using the “Expression” box on the toolbar • Its possible to search options using the “/” key • Use Boolean operators (AND, OR, NOT) TCP   Eth.addr == Eth.src / Eth.dst == Eth.vlan.id == Tcp.flag.syn / tcp.flag.ack / tcp.flag.fin == 0 or 1 Application or Protocol  HTTP, DNS, ICAP, ICMP, SOCKS…  In case a protocol is being decoded by a wrong “dissector” you can change it with the “Decode As…” option.
  • 10. Display Filters (cont. 2)  You can create filters based on the options, selected directly from the packet capture.  Apply as a Filter   Prepare as a Filter   The filter is applied with the selected parameter The filter expression is written at the “Filter” bar on the top. Colorize as a Filter  The packets matched by the filter can be colorized with custom colors.
  • 11. Sample Capture #1          Capture: Open www.ebay.com at the browser Open Summary (check throughput, size, packets) Select: “Follow TCP Stream” Configure “Manually Resolve Address” Configure the “Delta Time” column – Check server response time. Show “Statistics > Endpoints” Show “Statistics > Conversations” Show “Statistics > IO Graphs” Extract HTTP objects from the capture “File > Export > Objects > HTTP”
  • 12. Sample Capture #2          Open Capture with ICAP example Check Origin and Destination Address Configure “Manually Resolve Address” for Proxy, AV and DNS Create a Display Filter for ICAP traffic only Check server response time on “Delta Time” Select a session and “Follow TCP Stream” Open Summary (check throughput, size, packets) Check server requests, response and health-check. Its also possible to retrieve HTTP objects from an ICAP connection.
  • 13. Annex A: Duplicate Packets  Dup. Packets due to Network Retransmission   If a sending host thinks a packet is not transmitted correctly because of Packet Loss, it might Retransmit that packet. The receiving host might already got the first packet, and will receive a second one, which is a duplicated packet. To remove this packets use the filter:   not tcp.analysis.duplicate_ack and not tcp.analysis.retransmission Dup. Packets due to Routing or switching loop.   This packets can be seen when sniffing trough a mirrored port or network TAP. Use the “editcap.exe” at %ProgramFiles%/Wireshark/ to remove them.  Example: editcap -d capture.pcap dedup.pcap
  • 14. Annex B: Useful Websites  Download Wireshark!  www.wireshark.org   This workshop was created using version 1.6.0 Capture examples:  http://wiki.wireshark.org/SampleCaptures   The SampleCapture area at the wireshark.com website has a good list of capture examples. http://packetlife.net/captures/  One of the greatest IT/Telecom blogs … offer great capture examples and Network Posters with protocol detail.
  • 15. Annex C - HTTP Status Codes   1xx – Informational Codes 2xx – Success       200 OK  3xx – Redirection      300 Multiple Choices 301 Moved Permanently 302 Found 304 Not Modified 307 Temporary Redirect 4xx – Client Error   400 Bad Request 401 Unauthorized 403 Forbidden 404 Not Found 410 Gone 5xx – Server Error     500 Internal Server Error 501 Not Implemented 503 Service Unavailable 550 Permission denied