/\ MakersHut

Wireshark Analysis.

Wireshark Filters & PCAP File Analysis.


Wireshark is a free and open-source network protocol analyzer. It is used for network troubleshooting, analysis, software and communications protocol development, and education. Wireshark provides a graphical user interface (GUI) that allows users to interactively browse and analyze captured network traffic. It is available for various platforms, including Windows, macOS, and Linux.

Wireshark is pre-installed in KaliLinux and Parrot OS. You can however install it in *your OS. Checkout the download page here

Wireshark Filters.

Wireshark provides a large number of capture and display filters that can be used to analyze and filter network traffic. These filters allow users to focus on specific types of traffic or isolate packets of interest.

The two types are: Capture & Display filters.

Capture filters:

Deviates from the standard Wireshark filter syntax(display filters), as there are no dots in between terms and no comparison operators, e.g. tcp port 80 instead of tcp.port == 80.

Here are some examples of common capture filters in Wireshark:

Display filters:

After capturing packets, display filters are used to separate the traffic from the general noise. Display filters follow a different syntax from the capture filters. The display filters allow use of dots in it’s syntax. Expressions in display filters specify the protocol or header to use for filtering. Comparison, equal and logic operators are also used together with this filters.

i.e: http - displays http packets only, tcp.port == 80 - displays packets that have destination/source of port 80 tcp.window_sixe_value >= 8000 - displays packets with a window size value of atleast 8000 bytes.

Wireshark PCAP File Analysis.

Wireshark is really powerful and provides a summary of the PCAP immediately when it’s loaded. The statistics come in handy when you start the mannual search to get specific details.

Viewing Capture Statistics:

Different statistics about the traffic in the capture file – such as the percentage proportions of protocols, the amount of bytes transmitted to different hosts, the IP addresses of all the hosts that has appeared in the capture. They are helpful in certain scenarios, such as finding potential exfiltration vectors and identifying the exfiltrating host based on network usage.

This section will discuss three of the statistics windows:

Protocol Hierarchy,

Conversations,

Endpoints.

Thanks for reading that. Part II

<< Previous Post

|

Next Post >>

#Wireshark