WIRESHARK
Download and Install?:-
Search for specific packets?:-
i.?frame contains "mozilla"?– search for the string “mozilla” anywhere in the packet
ii.?tcp.port == 443?– tcp port is 443
iii.?dns.resp.len > 0?– all DNS responses
iv.?cip.addr == 52.7.23.87?– source or dest IP address is 52.7.23.87
Collection of Network Packets Methods
Network Taps?:-
MAC Floods?:-
Note:?This technique should be used with extreme caution and with explicit prior consent.
ARP?Poisoning?:-
Packet Dissection?:-
1.?Frame (Layer 1) :-?This will show you what frame or packet you are looking at as well as details specific to the Physical layer of the OSI model.
2.?Source [MAC] (Layer 2) :- This will show you the source and destination MAC Addresses; from the Data Link layer of the OSI model.
3.?Source [IP] (Layer 3) :-?This will show you the source and destination IPv4 Addresses; from the Network layer of the OSI model.
4.?Protocol (Layer 4) :- This will show you details of the protocol used (UDP/TCP) along with source and destination ports; from the Transport layer of the OSI model.
5.?Application Protocol (Layer 5) :-?This will show details specific to the protocol being used such?HTTP, FTP, SMB, etc. From the Application layer of the OSI model.
6.?Application Data :-?This is an extension of layer 5 that can show the application-specific data.
Different Types of Traffic Capture using Wireshark?:-
领英推荐
1.?ICMP Traffic :
??ICMP or Internet Control Message Protocol is used to analyze various nodes on a network. This is most commonly used with utilities like ping and traceroute.
??There are a few important things within the packet details that we can take note of first being the type and code of the packet. A type that equals 8 means that it is a request packet, if it is equal to 0 it is a reply packet.
2.?TCP?Traffic?:
??A common thing that you will see when analyzing?TCP?packets is known as the TCP handshake It includes a?series of packets:?syn, synack, ack; That allows devices to establish a connection.
??The main thing that we want to look for when looking at a?TCP?packet is the sequence number and acknowledgment number.
3.?DNS?Traffic :
??There are a couple of things outlined below that you should keep in the back of your mind when analyzing?DNS?packets.
??If anyone of these is out of place then the packets should be looked at further and should be considered suspicious.
4.?HTTP Traffic :
??HTTP?or Hypertext Transfer Protocol is a commonly used port for the world wide web and used by some websites.
??HTTP is used to send GET and POST requests to a web server in order to receive things like webpages. Knowing how to analyze HTTP can be helpful to quickly spot things like SQLi, Web Shells, and other web-related attack vectors.
??HTTP?is one of the most straight forward protocols for packet analysis, the protocol is straight to the point and does not include any handshakes or prerequisites before communication.
5.?HTTPS Traffic :
??HTTPS or Hypertext Transfer Protocol Secure can be one of the most annoying protocols to understand from a packet analysis perspective and can be confusing to understand the steps needed to take in order to analyze HTTPS packet.
??Before sending encrypted information the client and server need to agree upon various steps in order to make a secure tunnel.
Here are some things Wireshark does not provide:
?
?
?
?
?