Home
Wireshark Quick Start Guide
Contents
1. n some circumstances for example using a wireless network connection students may have difficulty capturing packets In these cases Wireshark will still be able to analyze packets from saved files created on another platform or with other tools These students can capture a set of packets on any accessible machine save the captured packets and transfer the saved file to their personal machine for analysis 15 Wireshark Quickstart Guide Appendix 1 Packets Captured Explanation and Troubleshooting Wireshark is designed to show you all packets that come into and out of your computer You are probably using Ethernet for your LAN and Ethernet is a shared access protocol As a result Wireshark would theoretically allow you to see the following types of traffic e Packets sent to from your computer e Broadcast packets sent to all computers on your local network e Packets sent to from any other computers on your local network However several factors may keep you from seeing some of the packets on your network I Switches or Routers versus Hubs Ethernet assumes that your local network looks like some variation of a bus and that traffic to any computer on the local network will be seen by any other computer on that network In practice Ethernet networks often use a star topology wherein all of the computers are linked to a central unit In the early days of Ethernet this central unit was called a hub A
2. RTP Player Hide capture info dialog V 2 Protocols ue zee ne Figure 3 Preferences Dialog Note The apply button may be hidden On many displays the dialog box runs off the bottom of the screen If you can not see the apply button click on the blue bar at the top of the window and drag the box upward Many other settings may be configured within the preferences dialog box If you find that you are regularly changing settings before starting a capture then you may benefit from setting your preferred settings as defaults For now this guide will leave all defaults in their initial state Wireshark Quickstart Guide Chapter 2 Using Wireshark I Two ways to capture some packets i A Simple capture You are now ready to capture packets coming to and from your machine Begin the capture process by selecting the Capture menu and then clicking Start Wireshark will immediately begin capturing data from the network adapter you selected earlier or give an error message that no adapter is selected if you didn t perform the pre configuration You can stop the capture by selecting stop from the capture menu ii Selecting Capture Options before Capturing Many people prefer to take an extra step before beginning the capture which lets a number of features be configured Click the Capture menu then select Options You should see a dialog as in Figure 4 A number of option
3. capture but disappears when the capture is stopped This dialog is shown in Figure 5 You may find this useful in deciding whether you have captured enough of the packets of interest to you default is on i e hide Wireshark Quickstart Guide Wireshark Capture from VMware SEE Captured Packets Total of total SCTP TCP UDP ICMP ARP OSPF GRE NetBIOS IPX VINES Other Running 00 01 26 Figure 5 Capture Info Dialog 4 Enable MAC name resolution This tells Wireshark to display the name of the manufacturer of the network card when it lists the MAC address Figure 6 shows an example of MAC name resolution with a MAC address generated from an Asiarock network card default is on 3 Ethernet II Src Asiarock_Of 33 6b 00 0b 6a 0f 33 6b amp Destination Broadcast ff ff ff ff ff fF Source Asiarock_Of 33 6b 00 0b 6a 0f 33 6b Type ARP 0x0806 2 Figure 6 MAC name resolution 5 Enable network name resolution Network Name Resolution NNR tells Wireshark to use names such as cnn com in the summaries If NNR is turned off you will only see IP addresses in the summary This setting only affects the summary Even with names turned on you can easily see the IP address by clicking on the packet and examining the packet details However it is easier to select packets if the names are available to identify network servers However this requires Wireshark to perform a D
4. client and a web browser at the same time all of that traffic will be consolidated through your computer s MAC address However if at the TCP layer an endpoint definition includes the port number of the application Therefore at the TCP layer the traffic for the email client and the web browser will be separated Wireshark s endpoint report lets you select the network layer of interest and then to see the summarized endpoint traffic for that layer 14 Wireshark Quickstart Guide A conversation report is similar to an endpoint report A conversation is defined as all of the traffic between two specific endpoints As an example consider packets at the TCP level Let s say that you started capturing packets and then went to two web sites www cnn com and www usatoday com The endpoint report on your web browser will combine all traffic from your browser and both of these web sites A conversation report between your browser and the www cnn com site would exclude the data from www usatoday com VI Saving Captures Wireshark also allows you to capture a set of packets and save it to a file that can be opened later In addition to the obvious uses this allows two unique capabilities e Instructors may wish to save one capture file and distribute it to all students This allows instructors to pose a set of questions on a consistent data set and to know that each student has appropriate data to answer the questions
5. 0 9E h 0010 01 c9 Ob cf HM 00 80 06 da 52 cO a8 01 45 40 ec eseese oR EO 0020 10 34 04 4e 00 50 cc 4a 42 da 6e f8 49 c0 50 18 4 N P 3 B n I P 0030 ff 3c bc e7 00 00 47 45 54 20 2f 20 48 54 54 50 lt GE T HTTP 0040 2f 31 2e 31 Od Oa 41 63 63 65 70 74 3a 20 69 6d 1 1 Ac cept im 060 61 67 65 2f 67 69 66 2c 20 69 6d 61 67 65 2f 78 age gif image x 0060 2d 78 62 69 74 6d 61 70 2c 20 69 6d 61 67 65 2f xbitmap image 0070 6a 70 65 67 2c 20 69 6d 61 67 65 2f 70 6a 70 65 jpeg im age pjpe 0080 67 2c 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 g appli cation x 0090 2d 73 68 6f 63 6b 77 61 76 65 2d 66 6c 61 73 68 shockwa ve flash NAAN A 3A 35 BF 95 Aa Aa Ad G2 6 GC FN 7A d AK 61 uiu a ronnt I gt Flags ip flags 1 byte Packets 880 Displayed 880 Marked 0 Dropped 0 Figure 9 Hexadecimal View V Some Options to Analyze Captured Packets Wireshark has several options to explore and analyze captured data Feel free to explore the full set of options however this section will discuss a few key capabilities 13 Following a TCP stream also hides some of the data by setting a display filter Clear the display filter Appendix 2 to reveal the entire data set Wireshark Quickstart Guide i Filters Filters can be used to narrow in the focus on only important packets See Appendix 2 for a discussion of filters ii Follow TCP Stream Choose a TCP packet from the packet li
6. 000 00 18 39 45 3b Sd 00 Oc 29 b1 09 68 08 0045 00 98 h 0010 01 c9 Ob cf 40 00 80 06 da cO a8 01 45 40 ec Jo020 10 3 e f8 49 c 0 18 3 2f HE O Os image pae aioe oe 4 2 65 jpeg im age pjpe 2 Fle C DOCUME I Ake OCALS t Tempheth Packets 880 Displayed 880 Marked 0 Dropped 0 Profle Def aut Figure 7 Packet Listing Window 6d 69 6 67 2c 20 69 6d 61 67 65 2f 7 This window is divided into three areas i Window Area 1 Summary At the top is a colorful listing of all of the packets captured Each line is a summary of a single frame or packet that was captured The colors represent a coding scheme that can be used to quickly detect the type of packet For example the predominant color in the graphic above is light green Light green is the color for HTTP packets ii Window Area 2 Detail When you click on a packet in area 1 the packet structure is shown in area 2 In the screenshot above the packet shown in dark blue has been selected therefore area 2 shows more details on that packet In order to see more details refer to Figure 8 below This figure shows an enlarged version of area 2 from the previous figure 12 Wireshark Quickstart Guide Frame 8 471 bytes on wire 471 bytes captured Ethernet II Src Vmware_b1 09 68 00 0 29 b1 09 68 Ost Cisco Li_45 3b 5d 00 1 Internet Protocol Src 192 168 1 69 192 168 1 69 Dst 64 236 16 52 64 236 16 version
7. 4 Header length 20 bytes differentiated Services Field 0x00 DSCP 0x00 Default ECN 0x00 Total Length 457 Identification OxObcf 3023 mF ags 0x04 Don t Fragment Figure 8 Areas 2 Details Extract from previous figure The first line of area two is created by Wireshark and contains statistical and informational data about the frame It shows that this is the eighth frame packet that Wireshark captured The next line in area 2 reveals that it was an Ethernet packet Since the payload of this Ethernet packet was an Internet Protocol IP packet the third line indicates that You will also notice that there is a plus next to the first two lines and a minus next to the IP line You can click on a plus to get more details on the packet contents This has been done for the IP line so that the user can see the header information for the packet iii Window Area 3 RAW Data Clicking on a portion of the packet in area two changes the display in area 3 This was done in Figure 8 to select the IP flags field in Figure 9 the hex of the flags field is selected Area 3 has two parts On the left are sixteen columns of two characters each This is the raw hexadecimal code that makes up the packet On the right is the Unicode version of this hexadecimal code If you click on an http line in window 2 you might notice English looking get commands or html commands in this right area 0000 00 18 39 45 3b 5d 00 Oc 29 b1 09 68 08 00 45 0
8. Clear Apply Even if you have never e Time Source Destination Protocol I entered a filter some commands 72 585566 192 168 1 69 64 236 16 52 TCP 4 automatically enter filters for you for example the Follow TCP Stream command If you find data is missing make sure that there is not a display filter entered at the top of the screen You can click on the word Clear to the right of the filter text box Figure 11 Using Display Filters The display filter shown in the image above will only display packets if they are from to IP address 64 236 16 52 This specific filter limited packets to those involved with CNN com If you also captured traffic to USAToday com you would not be able to see it until you clicked on Clear to the right of the filter area A more specific filter to restrict the display of packets within a single session would be ip addr eq 64 236 16 52 and ip addr eq 192 168 1 69 and tcp port eq 80 and tcp port eq 1102 In this case both endpoints are explicitly selected both IP and ports used in the session 20 Wireshark Quickstart Guide Some commands such as Follow TCP Stream automatically enter values in the filter field After you use a command like this you may need to Clear the filter to see the complete set of packets 21 This topic is appropriate for this guide because it helps explains the plethora of packets that add together to display a sin
9. NS lookup for every IP address If you are connected to the internet this may be trivial But if you are working offline then you will need to wait for very DNS lookup to be attempted and Wireshark Quickstart Guide time out and fail This may take an exceptionally long time and make Wireshark appear to freeze Also the DNS lookup will add extra packets into the capture This adds an artificial component to the capture This feature is turned off by default you may prefer to turn it on if you are working on a computer with access to a DNS server 6 Enable transport name resolution This option tells Wireshark to display the typical name of a protocol rather than the port value For example a datagram with port 80 will be displayed as HTTP However you should remember that this is a simple lookup of a table It is possible that some other non http traffic may actually be using this port default is on 7 Stop Capture The items in this section allow you to pre select a stop condition for the capture You may select to stop after a number of packets an amount of data or period of time It is often interesting to close all applications and then capture all traffic over a minute or two while your computer is idle This will show you the normal background traffic existing on your network default is on When you have selected the items which you prefer click the start button Il Examining the Capture Star
10. Wireshark Quick Start Guide Instructions on Using the Wireshark Packet Analyzer July 2 2008 Table of Contents Chapter t Getting Started innisis iia sutoacecusienaneta peas a a ea 3 D Current Version arns renais A Ea E EET E O ulead A AAR 4 MY SCAN a Otis es et cen a E E A E EE AR A S 4 II Specifying the Default Network Adapter yess siancesccaiecarpascvestansadsGncsttgaicsntad olusbaine caieeneivtednlun 5 Chapter 2 Usine Wireshark moienn a i a a a aww E EER 7 I Two ways to capture some packets s seeseseseessesseesressessresressessresrtsseesetssresresressresressessees 7 ED Examining the CaptUre ascgers ices Seca actos h sess Uy Meee Pack As aa ese E E E RES 10 HID What 11 can t find any packets x caicseutsescssced sanandzedtenvensancesahsaedisusd leaders seavensaat ah naaonins 11 IV Looking at Packets Captured by Wireshark 0 ccccccccecescceseeeseeeeeeeeseeeeseceeeeeeeenteeenaeens 12 V Some Options to Analyze Captured Packets cccccccccceesseessceseeeeneeeeeeeeseeeeeeneeenseeenaeens 13 VI SAVANE Captures o 2ceatatnaalte tela in a vite tos A cies gi E E E E bas a a 15 Appendix 1 Packets Captured Explanation and Troubleshooting sssesessesseseeseesessrsresesseseese 16 I Switches or Routers versus Hubs c2sanesa haw dese sees Ps anes 16 ID Your Network Adapter ernro tee e a ecee cdots E pinnae etwas 17 IHI Comment on Cable Modems fcc csccs sats coctalesvecd dias Pacinos sins tpocduetiacdaan
11. after you end the capture 1 When you were setting up Wireshark did you select the network adapter that is being used to interface with the network Refer to section Error Reference source not found Figure 2 and Figure 3 in Chapter 1 Getting Started You can also change the interface in a drop down box the Capture Options dialog 2 Are you using a wireless connection on a Windows machine Wireshark is not able to capture packets on some wireless connections within Windows Refer to section IV in Appendix 1 for a possible workaround and more information 3 Are you using filters Wireshark can filter results so that only certain types of packets are captured If the capture filter is set and no packets matched the filter then you will have captured no packets There is nothing you can do except repeat the capture either without the capture filter or ensure that the specified packets are created There is also a display filter that will hide any packet not meeting a specified condition An example of a filter condition would be to only display packets sent to from a specific IP address If you set a filter and then have no traffic that matches the filter then you will not see any packets Click the clear button next to the display filter to view all packets see Figure 11 For more information on filters refer to Appendix 2 4 Did you create any traffic for Wireshark to filter After you go to the Capture menu a
12. d take a special magnifying glass and look into the network cable coming out of the back of your personal computer You would see the bits of information encoded as electrical pulses AL flowing into and out of your computer If Wireshark stopped there it would only be of limited use it is difficult to make sense out of a raw stream of data However Wireshark also contains a protocol analyzer that understands a massive number of protocols containing over 78 000 filters It converts the data stream to a listing of packets flowing in and out of the computer It allows you to examine an individual packet and drill down through the layers of encapsulation until the application level payload is revealed Figure 1 Wireshark lets you see the network traffic entering and leaving your computer Wireshark is developed as open source software This means that the software is developed as a community effort and the source code is freely available Furthermore it is licensed under the GNU General Public License http www gnu org licenses gpl html This license gives you the right to use the software for free However you may not sell the software or a derivative of it Also if you modify the program code you must be willing to submit the changes back to the open source community The Wireshark web site is a rich source of help for both beginners and experts Although this QuickStart guide recommends specific it
13. ems on the web site the reader is asked to use the Wireshark menu system to locate the referenced items The Wireshark menu system will remain current as changes are made to the web site The Wireshark installation package will also install WinPcap unless you override the settings Wireshark will not work unless WinPcap is also installed Wireshark Quickstart Guide Refer to Appendix 1 for a discussion of the type of packets that Wireshark captures This discussion also explains how your particular network configuration may affect the type of packets you see I Current Version This documentation is based on Wireshark version 1 0 1 released 30 June 2008 running on Windows Vista and XP Although you may find a newer release available when you download the software the concepts in this manual should still be relevant Wireshark was in a beta mode for a very long time The maturity of the software might surprise many who may expect software with such a low version number to be less than complete Far from being a recent development Wireshark under the earlier name of Ethereal was first released in 1998 and has been in continuous development since that time Wireshark is supported in Unix including Mac OSX Linux and Windows from Win9x and NT4 through to Vista and Server 2008 The installation process will of course be different for each operating system But once installed the operation should be very si
14. ferent sources that have to be considered as part of the same web page Increasingly developers are making dynamic web pages This means that some portion of the web page may be continuously updated through interaction between the user and the server This dynamic process requires ongoing hits on the server even after the web page is initially complete Since each of these hits results in a new request from the server the number of packets required to assemble a web page is larger than many people realize 23
15. gle web page However it is also interesting to consider the implications for the number of hits a web site gets Let s analyze what it takes to get a million hits on a web page First assume an average page has 150 images In comparison this would be 10 smaller than CNN s front page Now assume each visitor sees three pages on the web site It will take less than 2 300 visitors to get one million hits on this hypothetical web site 150 Hits Page X 3 Pages Visitor X 2 300 Visitors 1 035 000 hits Wireshark Quickstart Guide Appendix 3 Hits Versus Page Views It may take more effort than you realize to deliver a web page to your computer The first step is to get the raw HTML code for the page Getting this code takes several sets of packets the details will be left to an exercise to be completed later but suffice it to say that retrieval includes setup and control packets as well as query and response packets Furthermore in most cases the response will be a multi packet data burst that must be reassembled into a complete http response However once the page is delivered to the application the system has only completed the first step required to display the web page Let s consider a simplified web page in HTML as shown in the box below lt HTML gt lt Body gt Look at this pretty Christmas tree lt br gt lt img src tree jpg gt lt Body gt lt HTML gt Figure 12 Simpl
16. http wiki Wireshark com 19 Wireshark Quickstart Guide Appendix 2 Filters in Wireshark Wireshark can filter results so that you only see certain packets An example of a filter condition would be to only remember packets sent to from a specific IP address Wireshark uses two types of filters capture filters and display filters Capture filters are used to decide which packets should be kept Only packets that meet filter criteria will be kept Display filters work after the capture is completed They restrict which packets are shown but they don t actually discard any information Capture filters would be more useful on very busy networks when you need to limit the amount of data your machine needs to process On the other hand display filters don t actually save any memory display filters let you temporarily focus an analysis without losing any underlying information Capture filters can be set in two different places Go to the Capture menu and select Options and you will find a selection for capture filters Alternatively Go to the Capture menu and select Capture Filters From the Capture Filters dialog box you will see a help menu that will explain how the function works Display filters can be entered at the top of the display screen Figure 11 below shows a display filter entered into the display filter dialog box at the top of the screen ip addr 64 236 16 52 v f Expression
17. hub listens to each incoming port and repeats everything that it hears out to every port Although a hub s physical network topology is a star logically it acts like a bus topology every station on the network sees all of the traffic on the network Therefore if your network uses a hub your machine should be able to report both the traffic to your machine and also the traffic to all other machines on your network The problem with hubs is that they reduce capacity since each station must pick their packets out of a lot of irrelevant traffic for other stations Today it is more normal to build networks switches and routers You can refer to your textbook for a description of the differences in these devices However the simple explanation is that they work to insure that each station only sees the traffic that it needs to see It is likely that your network s central unit is a switch or a router If this is the case your computer and Wireshark will be able to see traffic that is addressed to from your computer and broadcast traffic for all computers on the network but you will not be able to see 16 Wireshark Quickstart Guide packets sent to from other computers that are not addressed to your computer Some higher end switches have the capability to duplicate all traffic passing through the switch and to send the copied traffic to a single port This may be done by an administrator during a troubleshooting exercise and
18. ified Web Page This web page will display a short sentence Look at this pretty Christmas tree followed by a line break and then a picture of a tree Notice that the picture of the tree is not part of the HTML page that is delivered All that gets delivered with the page is a placeholder that tells the browser to get the picture called tree jpg and to put it into a specific spot on the page So once the browser deciphers the web page it knows it must make another request of the web server Now the browser asks for the picture tree jpg As a result displaying this page takes two hits on the browser One hit or request was for the original web page and the second hit was for the picture to be embedded into the web page Each additional picture or external page element is another hit on the web page How many pictures are on a single page 10 20 A recent analysis of the CNN front page indicated over one hundred and fifty separate files were required to display the page A lot of these files are graphic files This includes tiny graphic arrows almost invisible lines menu choices and advertisements In addition javascript files stylesheets and iFrames can all be external links and thus can be additional sources of hits 22 Wireshark Quickstart Guide Especially in the case of advertisements these hits may not come from the original web site Therefore at the packet level there may be many packets from many dif
19. is normally disabled This feature is known variously as port mirroring or port spanning lI Your Network Adapter Many computers today have more than one network adapter For example many laptops have both wireless network adapters 802 11 a b g and wired adapters You must make sure that Wireshark is listening to the correct adapter or it will not see any traffic You can check which adapters are receiving data by clicking on the Capture menu then selecting Interface In Figure 10 you can see that Wireshark believes that there are six interfaces but that only the first one is receiving packets From this dialog you can select to e start a capture on a specific interface e configure options before starting a capture on a specific interface e view details of a particular interface w Wireshark Capture Interfaces ole Description IP Packets Packets s Intel R 82566MM Gigabit Network Connection 10 100 100 217 892 23 Start Options Detaits wi Microsoft 192168165 0 0 Start Options Detaits Microsoft 0 0 0 0 0 0 Start Options Detaits MS Tunnel Interface Driver inkno 0 0 Start Options Details i VMware Virtual Ethernet Adapter 1921681111 Start Options Details VMware Virtual Ethernet Adapter 192 168 37 1 Start Options Details n Figure 10 Captures Interface dialog The default adapter is se
20. milar if not identical More detailed documentation can be found on the Wireshark web site at www wireshark com l installation Wireshark can be downloaded directly from the Wireshark web site at www wireshark com The download is an exe file of approximately 20MB Save the file to an appropriate location such as your desktop When the file is downloaded double click on it to start the installation process The default installation settings should work fine WinPcap may need to run as administrator especially on Vista There is a setting called NPF which by default is turned on during the installation on Vista but not on XP It would be unwise to change this setting keep the default installation settings unless you fully understand the implications of changing something One option that is pre selected is WinPcap This is a required component of Wireshark and it must be installed for Wireshark to work properly WinPcap is essentially a driver which allows the network packets to be intercepted and copied before the Wireshark Quickstart Guide windows network stack processes the data Without WinPcap you may still use Wireshark to analyze previously captured data but you will not be able to perform the actual data capture While WinPcap allows the capture of raw data there will be some slight differences between the data that is provided to Wireshark and the data which actually exists on the
21. modems that eliminate packets that are not destined for the local system IV Problem with Wireless LANs and Windows Wireshark may not be able to report packets on a Windows computer using a wireless 802 11 a b g adapter One suggested workaround is to try turning off promiscuous mode You can find this setting in the Edit menu under the Preferences menu choice Once the resulting dialogue box appears click on the Capture menu choice on the left side Clear the check box so that Capture packets in promiscuous mode is not checked Click on the Save button at the bottom of the screen and finally click on the OK button at the bottom of the screen On some monitors the OK button may be off of the bottom of the screen your settings will not be saved if you click another button Furthermore your changes will be lost if you close the window by clicking on the x in the top right corner of the window As an alternative Microsoft has a similar free product called Network Monitor which can analyze 802 11 packets free but not open source For more information see http blogs technet com netmon V Other Problems and Issues Other problems and issues may be addressed on the Wireshark web site Some interesting references include 18 Wireshark Quickstart Guide e http wiki Wireshark com CaptureSetup e http www wireshark com docs e http www wireshark com faq html e
22. nd choose Start you must leave Wireshark running If the Capture Info dialog is 11 Wireshark Quickstart Guide displayed do not click the Stop button Then go to your web browser and enter a web address such as www cnn com Finally return to Wireshark and click on the stop button 5 Ifnone of these options worked go to the Wireshark web site and check the FAQs the documentation and the wiki at www wireshark com IV Looking at Packets Captured by Wireshark Once you have captured a set of packets Wireshark should present you with a colorful window as shown in Figure 7 below Untitled Wireshark pe Edt Yew Go Capture fnalyze Raitis pep LAIAS SAXSS 6 99F2 FE A29RA0 BASBK B Eer 7 Bepresson Gear epei No Time Source Destination 1 0 000000 Intelcor_ 4 a1 0b Cisco t1_45 3b 5d 2 2 306675 Veware_b1 09 68 Broadcast Protocol Info ARP who has 192 168 1 111 Tell 192 168 1 65 ARP who has 192 168 1 111 Tell 192 168 1 69 3 2 317060 i 5 3b vmware_b1 09 68 ARP 192 168 1 111 4s at 00 18 39 45 3b 5d Frame 8 471 bytes on wire 471 bytes captured Ethernet II Src vmware_b1 09 68 00 0c 29 b1 09 68 Ost Cisco L1_45 3b 5d 00 18 39 45 3b 5d 2 Internet Protocol Src 192 168 1 69 192 168 1 69 Ost 64 236 16 52 64 236 16 52 Transmission Control Protocol Src Port adobeserver 1 1102 Dst Port http 80 Seq 1 Ack 1 Len 417 Hypertext Transfer Protocol 0
23. s B eclieierauds acianauaes 18 IV Problem with Wireless LANs and Windows cccccssccssseceseceseeeeseceseeeeseceeeseaeeeseeenaeees 18 V Other Problems and TSSues x s ce c 2ssscsiseceses sada heptaceseandaaeceadeae ses sadaaviaa deaistaaetaaveobdees teaeasabeee 18 Appendix 2 Filters in Wireshark scsi ceaessccsncasts oxaavasvecvaxcen cdeassbvgeiacata vdeeesivesta tina s ak a seat nE Tiaia 20 Appendix 3 Hits Versus Pate V1 Wis 25 a siesocs cecsicetata cy vaven vans seve cy auncossiraaeuhay aera a ammremess 22 You can find more information on the Wireshark web site at www wireshark com Wireshark may not work on Windows computers using wireless network adapters Try switching off Promiscuous mode Edit Preferences Capture For more discussion of what Wireshark can or can not capture refer to Appendix I Wireshark Quickstart Guide Chapter 1 Getting Started Wireshark is a network packet analyzer known previously as Ethereal It lets you examine the network traffic flowing into and out of your Windows or Unix machine Network professionals use Wireshark to troubleshoot networking problems but it is also an excellent way to learn exactly how the network protocols work For example it allows us to see the data that your system sends and receives when you type a web address into a web browser e g Internet Explorer or Mozilla s Firefox As a metaphor for Wireshark s operation pretend that you coul
24. s are available in this dialog Some such as capture filter are for more advanced use However a number of options are available which are very useful even during basic captures A number of these items are highlighted in Figure 4 including 1 Update list of packets in real time This tells Wireshark to displays packets as they captured rather than waiting until the capture is stopped default is on 2 Automatic scrolling in live capture If the previous item is selected this tells Wireshark to scroll the packets so that you are viewing the most recent default is on Wireshark Quickstart Guide Wireshark Capture Options Capture Interface VMware Accelerated AMD PCNet Adapter Microsoft s Packet Scheduler Devicenp IP address 192 168 1 69 Buffer size 1 megabyte s Capture packets in promiscuous mode C Limit each packet to bytes Capture Filter Capture File s Display Options Fie Update list of packets in real time C Use multiple files C gt am Automatic scrolling in live capture Ga Hide capture info dialog Name Resolution Oma Enable MAC name resolution 60 Enable network name resolution 6a Enable transport name resolution Figure 4 Capture Options 3 Hide Capture Info dialog The Capture Info dialog was always displayed in earlier versions of Wireshark and Ethereal but is now disabled by default This dialog displays a bar graph summary of the protocols during the
25. sting window Area 1 in Figure 7 Right click on the chosen packet and select Follow TCP Stream Wireshark will open a new window and display the set of data as it is seen by the application layer For example in the case of a HTTP response this would be the HTTP data and the web page to be delivered to the browser However the Follow TCP Stream command also does something that may confuse you it automatically filters the packet display so that only packets relating to this stream are displayed As a result you may need to Clear Appendix 2 the display filter after using Follow TCP Stream if you want to look at other packet data iii Conversations and Endpoints Under the statistics menu at the top of the main screen you can explore Conversations and Endpoints First remember that the network traffic you capture may have traffic to from more than one computer There is a good chance that your LAN protocol is Ethernet and Ethernet is designed to share a single network among many users As a result you may see packets for other users in your packet data Even if your network is connected through a switch you may see broadcast packets to other users Using endpoints lets you isolate traffic so that you are only looking at traffic to from a specific machine An endpoint can be defined by network layer For example a single MAC address on your machine is one endpoint If you are running an email
26. t a capture using either of the above methods You may immediately see packets being saved to your machine This traffic is most likely normal background activity Let s create some packets for Wireshark to capture With Wireshark running and capturing packets go to a web browser e g Internet Explorer Mozilla s Firefox Opera or Safari and type in a web address such as www cnn com When the web page finished loading go back to Wireshark and through the menu click Capture then Stop or use the short cut CTRL E for End If you have changed the setting to display the Capture Info dialog box Figure 5 you just need to click the stop button Don t be surprised if Wireshark captures quite a few packets of information As Appendix 3 explains displaying a web page requires more separate server requests than most people realize 10 Filters can hide your traffic Even if you didn t set a filter some commands automatically set filters Refer to Appendix 2 to find out how to clear filters Wireshark Quickstart Guide I What if can t find any packets If you don t see any packets while Wireshark is performing the capture you may have de selected the option to Update packets in real time item 1 in Figure 4 When the capture stops you should see Wireshark process and load each packet which was captured There are several things to check out if you don t see packets
27. tup in the menu Edit Preferences Capture make sure you choose to save any changes using the dialog button at the bottom of the window You can alter the selected interface for a single capture by going through the Capture Options dialog see Figure 4 One of the options in the capture settings is to set promiscuous mode Typically network adapters will screen out all traffic that is not destined for the computer With this setting Wireshark will send a message to your network card telling it to 17 When editing preferences save using the save button On some monitors the button may be off the bottom of the screen and you must move the window up to find it If you don t save you will lose your changes Wireshark Quickstart Guide pass through all traffic it sees Even if you are on a broadcast or hub type network Wireshark may not report traffic from to other computers if promiscuous mode is not turned on ll Comment on Cable Modems Typically high speed cable internet connections are shared connections Theoretically this means that you should be able to see the network traffic of your neighbors who have cable modems when you use Wireshark The data entering your premises may include traffic from your neighbors However in many most cases this neighbor traffic is not visible inside your local network Cable companies typically implement filtering and even authentication services inside their
28. wire This is because the network card may process the datagram within its firmware and not pass all of the data to the operating system One example is that most network cards do not deliver 802 3 preamble or CRC fields to the operating system ll Specifying the Default Network Adapter When you first start Wireshark you must tell it which network adapter to use You can make this selection before beginning a capture but doing so every time is tedious If you want to pre configure the default network adapter then go to the Edit menu and choose Preferences l The Wireshark Network Analyzer File Mahia View Go Capture Analyze Statistics Filter Configuration Profiles Shift Cctrl 4 J6 Preferences Shift Ctrl P Figure 2 Choose Preferences from the Edit Menu When the preferences screen appears you must 1 Click on the Capture menu 2 Click on the down arrow and select the correct network card you may see several alternatives including generic devices which will not work and 3 Click on the OK button Wireshark Quickstart Guide W Wireshark Preferences of amp User Interface Capture Layout Default interface Intel R 82566MM Gigabit Network Connection Device an Interfaces Edit Font Colors Capture packets in promiscuous mode V Capture 1 Update list of packets in realtime 7 Printing Automatic scrolling in live capture V Name Resolution
Download Pdf Manuals
Related Search
Related Contents
Digital Output Module 2208L MP3-DJ Sport Benutzerhandbuch Schede Tecniche - 8969_90R_S_ist_2014 User Manual - EPOS 4 Excel Linux: commandes et paramètres IWTS-4 LCR - Atlantic Technology Manual de usuario CONTROLADOR CLIMATIC™ 50 ESD 220 - Jungheinrich Y - B-Bridge International, Inc. Copyright © All rights reserved.
Failed to retrieve file