SlideShare a Scribd company logo
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 1
Network analysis Using Wireshark
Lesson 10:
ARP and IP Analysis
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 2
• By the end of this lesson, the participant will be able to:
▫ Understand ARP and IP
▫ Isolate and fix basic IP/ARP networking problems
Lesson Objectives
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 3
yoram@ndi-com.com
For More lectures, Courses & Keynote Speaking
Contact Me to:
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 4
Analysing connectivity problems with
ARP
Using IP traffic analysis tools
Finding fragmentation problems
Finding duplicate IPs
Analysing DHCP problems
Chapter Content
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 5
What is ARP
MAC AddressesIP Addresses
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 6
How it Works?
192.168.1.1
AA-C1-23-DC-B8-C9
192.168.1.2
BB-C1-23-A1-B8-C9
192.168.1.3
CC-C1-23-F5-B8-C9
192.168.1.4
DD-C1-23-65-B8-C9
ARP Request
Ping (ICMP): 192.168.1.1  192.168.1.3
ARP Reply
ICMP Request/Reply
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 7
Resolving a Remote IP Address
192.168.1.1/24
AA-C1-23-DC-B8-C9
DG: 192.168.1.254/24
192.168.1.2/24
BB-C1-23-A1-B8-C9
DG: 192.168.1.254/24
192.168.1.3/24
CC-C1-23-F5-B8-C9
DG: 192.168.1.254/24
ARP Request (1)
Ping:
192.168.1.1  192.168.2.3
ARP Reply (2)
192.168.2.3
CC-C1-23-F5-B8-C9
DG: 192.168.2.254/24
192.168.2.4
DD-C1-23-65-B8-C9
DG: 192.168.2.254/24
ARP Request (4)
ARP Reply (5)
R
LAN1
LAN2
ICMP Request (3)
ICMP Request (6)
192.168.1.254/24
192.168.2.254/24
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 8
ARP Example
192.168.43.1 is at:
ac:f1:df:9f:0a:d8
10.0.0.5 is looking
for 10.0.0.138
Ping your neighbor and check with
Wireshark and the ARP cache
Example
10-1
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 9
ARP Example - Request
In the Ethernet header:
Destination - All 1’s
(Broadcast)
In the ARP header:
Destination - All 0’s
(Unknown)
Example
10-1
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 10
ARP Example - Reply
In the ARP header:
Requested MAC of the
destination
Ping your neighbor and check with
Wireshark and the ARP cache
Example
10-1
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 11
Gratuitous ARP
Standard ARP
Request
Gratuitous ARP Request:
Target MAC: All “F”s
Sender and Target IP are the same
Example
10-2
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 12
Scanning (Security issue)
Scanning (Network discovery tool)
ARP Sweep
Can be due to:
Example
10-3
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 13
ARP Poisoning / ARP Spoofing
IP: 192.168.1.103IP: 192.168.1.1
Alice
Bob
Trudy
ARP Request (Packets 5) :
Who has 192.168.1.103?
Tell 192.168.1.1MAC: 00:20:78:d9:0d:db
ARP Replies (Packets 6,7):
I am 192.168.1.103
My MAC address is 00:d0:59:12:9b:01 (Packet 6)
My MAC address is 00:d0:59:aa:af:80 (Packet 7)
MAC: 00:d0:59:aa:af:80
MAC: 00:d0:59:12:9b:01
Example
10-4
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 14
Analysing connectivity problems with
ARP
Using IP traffic analysis tools
Finding fragmentation problems
Finding duplicate IPs
Analysing DHCP problems
Chapter Content
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 15
IP Datagram Format
Bit stream
H Data E Ethernet (L2)
H Data IP (L3)
H Data TCP (L4)
H Data HTTP (L-5/6/7)
This is the IP header
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 16
IP Datagram Format
Ver Length
32 bits
Data
(variable length,
typically a TCP
or UDP segment)
16-bit identifier
Internet
checksum
Time to
live
32 bit source IP address
Head.
len
Type of
service
flgs
Fragment
offset
Upper
layer
32 bit destination IP address
Options (if any)
IP protocol
version
number
Header
Length
(in bytes
“Type” of
data Total datagram
length (in bytes)
For
fragmentation
and reassembly
Max. no. remaining
hops (decremented
at each router)
Upper layer protocol
to which payload is
delivered
E.g. timestamp,
record route taken,
specify list of
routers to visit
Packet
Checksum
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 17
IP Datagram
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 18
IPv4 Preferences
Checksum
validation
Checksum
validation
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 19
IPv4 - Filters
Look for a
pattern in filter
expression
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 20
IP Name Resolution
Source name and/or address Destination name and/or address
Reload
Source and
destination
presented in their
names
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 21
Analysing connectivity problems with
ARP
Using IP traffic analysis tools
Finding fragmentation problems
Finding duplicate IPs
Analysing DHCP problems
Chapter Content
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 22
What is Fragmentation
ID
=x
offset
=0
fragflag
=0
length
=4000
ID
=x
offset
=0
MF
=1
length
=1500
ID
=x
offset
=1480
MF
=1
length
=1500
ID
=x
offset
=2960
MF
=0
length
=1040
One large datagram fragmented to
several smaller ones
ID=X is equal to the
Whole frame
Fragment 1
Fragment 2
Fragment 3
DataDataData
Data
Original
packet
0
0
0
DF
=0
DF
=0
DF
=0
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 23
When can Problems Accrue (Example)
PC2
S2S1
SP Network
Remote office
with DB clients
Data Center with
DB servers
IPSec & GRE Tunnel
PC1
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 24
Captured File
Fragmented
packets
Example
10-5
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 25
Analysing connectivity problems with
ARP
Using IP traffic analysis tools
Finding fragmentation problems
Finding duplicate IPs
Analysing DHCP problems
Chapter Content
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 26
Duplicate IP - Example
Duplicate IP
discovered
Example
10-6
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 27
Analysing connectivity problems with
ARP
Using IP traffic analysis tools
Finding fragmentation problems
Finding duplicate IPs
Analysing DHCP problems
Chapter Content
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 28
DHCP Principles of Operation
The same transaction ID
for the DHCP process
The DHCP process:
Discover – Offer – Request -
Ack
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 29
DHCP Issues
Example
10-7
Example
10-8
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 30
Summary
• In this lesson we learned about
▫ Isolate and fix basic IP/ARP networking problems
▫ Understand IP fragmentation and the cases it can cause network
delays
▫ Discover duplicate addresses
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 31
yoram@ndi-com.com
For More lectures, Courses & Keynote Speaking
Contact Me to:

More Related Content

PDF
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
PPTX
wireless network IEEE 802.11
PPSX
Layering and Architecture
PPT
Comparison and Contrast between OSI and TCP/IP Model
PPTX
Advanced encryption standard (aes)
PPT
DATA COMMUNICATION PPT
PPSX
Subnetting
CCNAv5 - S1: Chapter 9 - Subnetting Ip Networks
wireless network IEEE 802.11
Layering and Architecture
Comparison and Contrast between OSI and TCP/IP Model
Advanced encryption standard (aes)
DATA COMMUNICATION PPT
Subnetting

What's hot (20)

PPT
Ch:2 The Physical Layer
PPTX
Subnet Mask
PPTX
Multiple access protocol
PPT
Ch6 1 v1
DOC
I pv4 address classes
PPTX
Huffman Algorithm and its Application by Ekansh Agarwal
PPTX
IPv4 addressing and subnetting
PPTX
Subnetting Presentation
PPTX
Introduction to ns3
PPT
ipv6 ppt
PPT
Ppt of socket
PPT
Chapter 10
PPT
SHA 1 Algorithm.ppt
PPTX
Print input-presentation
PPT
Wireless LANs PPT.ppt
PPTX
Wireshark
PPTX
Cisco Networking (Routing and Switching)
PPT
IP NETWORKING AND IP SUBNET MASKING
PPTX
Trible data encryption standard (3DES)
Ch:2 The Physical Layer
Subnet Mask
Multiple access protocol
Ch6 1 v1
I pv4 address classes
Huffman Algorithm and its Application by Ekansh Agarwal
IPv4 addressing and subnetting
Subnetting Presentation
Introduction to ns3
ipv6 ppt
Ppt of socket
Chapter 10
SHA 1 Algorithm.ppt
Print input-presentation
Wireless LANs PPT.ppt
Wireshark
Cisco Networking (Routing and Switching)
IP NETWORKING AND IP SUBNET MASKING
Trible data encryption standard (3DES)
Ad

Similar to Network Analysis Using Wireshark -10- arp and ip analysis (20)

PDF
lesson 7- Network analysis Using Wireshark - advanced statistics tools
PDF
Network analysis Using Wireshark 4: Capture Filters
PDF
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
PDF
Network Analysis Using Wireshark -Chapter 6- basic statistics tools
PDF
Network Analysis Using Wireshark Chapter 09 ethernet and lan switching
PDF
Network analysis Using Wireshark Lesson 12 - bandwidth and delay issues
PDF
Network analysis Using Wireshark Lesson 3: locating wireshark
PDF
Network Analysis using Wireshark 5: display filters
PDF
lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017
PPT
Wireshark Basics
PPTX
Traffic Data Analysis using Wireshark.pptx
DOCX
Chapter 11Networks of NetworksChapter 11 OutlineNetwor.docx
PPTX
Unit 4 - Network Layer
DOCX
Running head network design 1 netwo
PDF
Network Analysis Using Wireshark Chapter 08 the expert system
PDF
Network analysis Using Wireshark Lesson 1- introduction to network troublesho...
PDF
3.7.10 Lab Use Wireshark to View Network Traffic
PDF
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
PPT
preKnowledge-InternetNetworking Android's mobile operating system is based on...
PPT
preKnowledge-InternetNetworking.ppt
lesson 7- Network analysis Using Wireshark - advanced statistics tools
Network analysis Using Wireshark 4: Capture Filters
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Network Analysis Using Wireshark -Chapter 6- basic statistics tools
Network Analysis Using Wireshark Chapter 09 ethernet and lan switching
Network analysis Using Wireshark Lesson 12 - bandwidth and delay issues
Network analysis Using Wireshark Lesson 3: locating wireshark
Network Analysis using Wireshark 5: display filters
lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017
Wireshark Basics
Traffic Data Analysis using Wireshark.pptx
Chapter 11Networks of NetworksChapter 11 OutlineNetwor.docx
Unit 4 - Network Layer
Running head network design 1 netwo
Network Analysis Using Wireshark Chapter 08 the expert system
Network analysis Using Wireshark Lesson 1- introduction to network troublesho...
3.7.10 Lab Use Wireshark to View Network Traffic
Www ccnav5 net_ccna_1_chapter_3_v5_0_exam_answers_2014
preKnowledge-InternetNetworking Android's mobile operating system is based on...
preKnowledge-InternetNetworking.ppt
Ad

More from Yoram Orzach (17)

PDF
Network Analysis Using Wireshark Jan 18- seminar
PDF
Network Analysis Using Wireshark 1
PDF
Ch 05 --- nfv basics
PDF
Ch 04 --- sdn deployment models
PDF
Ch 03 --- the OpenFlow protocols
PDF
Ch 02 --- sdn and openflow architecture
PDF
Ch 01 --- introduction to sdn-nfv
PDF
Wireshark - Basics
PDF
Ch 09 -- ARP & IP Analysis
PDF
Ch 08 -- Ethernet & LAN Switching Troubleshooting
PDF
Ch 07 -- The Expert System
PDF
Ch 06 -- Bandwidth Delay and Jitter Issues
PDF
Wireshark course, Ch 05: Advanced statistics tools
PDF
Wireshark course, Ch 03: Capture and display filters
PDF
Wireshark course, Ch 02: Introduction to wireshark
PDF
Introduction To Cellular Networks
PPTX
Introduction To Cellular And Wireless Networks
Network Analysis Using Wireshark Jan 18- seminar
Network Analysis Using Wireshark 1
Ch 05 --- nfv basics
Ch 04 --- sdn deployment models
Ch 03 --- the OpenFlow protocols
Ch 02 --- sdn and openflow architecture
Ch 01 --- introduction to sdn-nfv
Wireshark - Basics
Ch 09 -- ARP & IP Analysis
Ch 08 -- Ethernet & LAN Switching Troubleshooting
Ch 07 -- The Expert System
Ch 06 -- Bandwidth Delay and Jitter Issues
Wireshark course, Ch 05: Advanced statistics tools
Wireshark course, Ch 03: Capture and display filters
Wireshark course, Ch 02: Introduction to wireshark
Introduction To Cellular Networks
Introduction To Cellular And Wireless Networks

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Machine learning based COVID-19 study performance prediction
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
Big Data Technologies - Introduction.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
Electronic commerce courselecture one. Pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Programs and apps: productivity, graphics, security and other tools
Per capita expenditure prediction using model stacking based on satellite ima...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Understanding_Digital_Forensics_Presentation.pptx
Spectroscopy.pptx food analysis technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Building Integrated photovoltaic BIPV_UPV.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Machine learning based COVID-19 study performance prediction
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
sap open course for s4hana steps from ECC to s4
Diabetes mellitus diagnosis method based random forest with bat algorithm
Unlocking AI with Model Context Protocol (MCP)
Digital-Transformation-Roadmap-for-Companies.pptx
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Big Data Technologies - Introduction.pptx
Empathic Computing: Creating Shared Understanding
Electronic commerce courselecture one. Pdf

Network Analysis Using Wireshark -10- arp and ip analysis

  • 1. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 1 Network analysis Using Wireshark Lesson 10: ARP and IP Analysis
  • 2. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 2 • By the end of this lesson, the participant will be able to: ▫ Understand ARP and IP ▫ Isolate and fix basic IP/ARP networking problems Lesson Objectives
  • 3. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 3 yoram@ndi-com.com For More lectures, Courses & Keynote Speaking Contact Me to:
  • 4. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 4 Analysing connectivity problems with ARP Using IP traffic analysis tools Finding fragmentation problems Finding duplicate IPs Analysing DHCP problems Chapter Content
  • 5. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 5 What is ARP MAC AddressesIP Addresses
  • 6. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 6 How it Works? 192.168.1.1 AA-C1-23-DC-B8-C9 192.168.1.2 BB-C1-23-A1-B8-C9 192.168.1.3 CC-C1-23-F5-B8-C9 192.168.1.4 DD-C1-23-65-B8-C9 ARP Request Ping (ICMP): 192.168.1.1  192.168.1.3 ARP Reply ICMP Request/Reply
  • 7. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 7 Resolving a Remote IP Address 192.168.1.1/24 AA-C1-23-DC-B8-C9 DG: 192.168.1.254/24 192.168.1.2/24 BB-C1-23-A1-B8-C9 DG: 192.168.1.254/24 192.168.1.3/24 CC-C1-23-F5-B8-C9 DG: 192.168.1.254/24 ARP Request (1) Ping: 192.168.1.1  192.168.2.3 ARP Reply (2) 192.168.2.3 CC-C1-23-F5-B8-C9 DG: 192.168.2.254/24 192.168.2.4 DD-C1-23-65-B8-C9 DG: 192.168.2.254/24 ARP Request (4) ARP Reply (5) R LAN1 LAN2 ICMP Request (3) ICMP Request (6) 192.168.1.254/24 192.168.2.254/24
  • 8. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 8 ARP Example 192.168.43.1 is at: ac:f1:df:9f:0a:d8 10.0.0.5 is looking for 10.0.0.138 Ping your neighbor and check with Wireshark and the ARP cache Example 10-1
  • 9. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 9 ARP Example - Request In the Ethernet header: Destination - All 1’s (Broadcast) In the ARP header: Destination - All 0’s (Unknown) Example 10-1
  • 10. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 10 ARP Example - Reply In the ARP header: Requested MAC of the destination Ping your neighbor and check with Wireshark and the ARP cache Example 10-1
  • 11. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 11 Gratuitous ARP Standard ARP Request Gratuitous ARP Request: Target MAC: All “F”s Sender and Target IP are the same Example 10-2
  • 12. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 12 Scanning (Security issue) Scanning (Network discovery tool) ARP Sweep Can be due to: Example 10-3
  • 13. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 13 ARP Poisoning / ARP Spoofing IP: 192.168.1.103IP: 192.168.1.1 Alice Bob Trudy ARP Request (Packets 5) : Who has 192.168.1.103? Tell 192.168.1.1MAC: 00:20:78:d9:0d:db ARP Replies (Packets 6,7): I am 192.168.1.103 My MAC address is 00:d0:59:12:9b:01 (Packet 6) My MAC address is 00:d0:59:aa:af:80 (Packet 7) MAC: 00:d0:59:aa:af:80 MAC: 00:d0:59:12:9b:01 Example 10-4
  • 14. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 14 Analysing connectivity problems with ARP Using IP traffic analysis tools Finding fragmentation problems Finding duplicate IPs Analysing DHCP problems Chapter Content
  • 15. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 15 IP Datagram Format Bit stream H Data E Ethernet (L2) H Data IP (L3) H Data TCP (L4) H Data HTTP (L-5/6/7) This is the IP header
  • 16. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 16 IP Datagram Format Ver Length 32 bits Data (variable length, typically a TCP or UDP segment) 16-bit identifier Internet checksum Time to live 32 bit source IP address Head. len Type of service flgs Fragment offset Upper layer 32 bit destination IP address Options (if any) IP protocol version number Header Length (in bytes “Type” of data Total datagram length (in bytes) For fragmentation and reassembly Max. no. remaining hops (decremented at each router) Upper layer protocol to which payload is delivered E.g. timestamp, record route taken, specify list of routers to visit Packet Checksum
  • 17. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 17 IP Datagram
  • 18. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 18 IPv4 Preferences Checksum validation Checksum validation
  • 19. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 19 IPv4 - Filters Look for a pattern in filter expression
  • 20. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 20 IP Name Resolution Source name and/or address Destination name and/or address Reload Source and destination presented in their names
  • 21. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 21 Analysing connectivity problems with ARP Using IP traffic analysis tools Finding fragmentation problems Finding duplicate IPs Analysing DHCP problems Chapter Content
  • 22. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 22 What is Fragmentation ID =x offset =0 fragflag =0 length =4000 ID =x offset =0 MF =1 length =1500 ID =x offset =1480 MF =1 length =1500 ID =x offset =2960 MF =0 length =1040 One large datagram fragmented to several smaller ones ID=X is equal to the Whole frame Fragment 1 Fragment 2 Fragment 3 DataDataData Data Original packet 0 0 0 DF =0 DF =0 DF =0
  • 23. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 23 When can Problems Accrue (Example) PC2 S2S1 SP Network Remote office with DB clients Data Center with DB servers IPSec & GRE Tunnel PC1
  • 24. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 24 Captured File Fragmented packets Example 10-5
  • 25. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 25 Analysing connectivity problems with ARP Using IP traffic analysis tools Finding fragmentation problems Finding duplicate IPs Analysing DHCP problems Chapter Content
  • 26. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 26 Duplicate IP - Example Duplicate IP discovered Example 10-6
  • 27. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 27 Analysing connectivity problems with ARP Using IP traffic analysis tools Finding fragmentation problems Finding duplicate IPs Analysing DHCP problems Chapter Content
  • 28. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 28 DHCP Principles of Operation The same transaction ID for the DHCP process The DHCP process: Discover – Offer – Request - Ack
  • 29. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 29 DHCP Issues Example 10-7 Example 10-8
  • 30. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 30 Summary • In this lesson we learned about ▫ Isolate and fix basic IP/ARP networking problems ▫ Understand IP fragmentation and the cases it can cause network delays ▫ Discover duplicate addresses
  • 31. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 31 yoram@ndi-com.com For More lectures, Courses & Keynote Speaking Contact Me to: