USING WIRESHARK TO CAPTURE AND ANALYZE NETWORK DATA



Similar documents
Wireshark Deep packet inspection with Wireshark

COMP416 Lab (1) Wireshark I. 23 September 2013

Wireshark. Fakrul (Pappu) Alam

Network Traffic Analysis

Introduction to Wireshark Network Analysis

Ethereal: Getting Started

Network Security: Workshop

New York University Computer Science Department Courant Institute of Mathematical Sciences

How To Analyze Bacnet (Bacnet) On A Microsoft Computer (Barcnet) (Bcfnet) And Get A Better Understanding Of The Protocol (Bafnet) From A Microsatellite) (Malware)

Computer Networks/DV2 Lab

Introduction to Analyzer and the ARP protocol

Network Packet Analysis and Scapy Introduction

Networks & Security Course. Web of Trust and Network Forensics

Wireshark Lab: Assignment 1w (Optional)

Network Forensics Network Traffic Analysis

Wireshark Tutorial. Figure 1: Packet sniffer structure

Hands-on Network Traffic Analysis Cyber Defense Boot Camp

Wireshark Tutorial INTRODUCTION

Packet Sniffing with Wireshark and Tcpdump

Lab Conducting a Network Capture with Wireshark

Packet Sniffing and Spoofing Lab

TCP Packet Tracing Part 1

EKT 332/4 COMPUTER NETWORK

Extracting a Print Capture From a Network Packet Capture Using Wireshark White Paper

Capture and analysis of the network traffic with Wireshark

Safe network analysis

Wireshark Hands-On Exercises

ITTC Communication Networks Laboratory The University of Kansas EECS 780 Introduction to Protocol Analysis with Wireshark

Lab 1: Packet Sniffing and Wireshark

Kepware Technologies Using Wireshark for Ethernet Diagnostics

Solution of Exercise Sheet 5

IP Filter/Firewall Setup

6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS

Network forensics 101 Network monitoring with Netflow, nfsen + nfdump

Computer Networking LAB 2 HTTP

Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso

EE984 Laboratory Experiment 2: Protocol Analysis

Network sniffing packet capture and analysis

Introduction to Passive Network Traffic Monitoring

Overview. Protocol Analysis. Network Protocol Examples. Tools overview. Analysis Methods

Laboratory work 4. Application of Windows OS Built-in Networks Diagnostic Tools

VisuSniff: A Tool For The Visualization Of Network Traffic

espace UC V100R002C01SPC100 Troubleshooting Guide HUAWEI TECHNOLOGIES CO., LTD. Issue 02 Date

Internetworking. Problem: There is more than one network (heterogeneity & scale)

Berkley Packet Filters and Open Source Tools. a tranched approach to packet capture analysis at today s network speeds

EINTE LAB EXERCISES LAB EXERCISE #5 - SIP PROTOCOL

Websense Web Security Gateway: What to do when a Web site does not load as expected

Customer Tips. Network Packet Analyzer Tips. for the user. Purpose. Introduction to Packet Capture. Xerox Multifunction Devices.

7. Exercise: Network Forensic

Figure 1. Wireshark Menu Bar

Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address

Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop

Administrator Guide. CA Multi-Port Monitor. Version 10.2

Network sniffing packet capture and analysis

COMP 3331/9331: Computer Networks and Applications. Lab Exercise 3: TCP and UDP (Solutions)

7. Exercise: Network Forensic

Networks and Security Lab. Network Forensics

Network Monitoring Tool with LAMP Architecture

Packet Capture. Document Scope. SonicOS Enhanced Packet Capture

Section 1 Wireless Packet Captures & Connection Analysis- A Review

Integration with CA Transaction Impact Monitor

Packet Capture, Filtering and Analysis

Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

How do I get to

Distributed Network Traffic Monitoring and Analysis using Load Balancing Technology

Wireshark in a Multi-Core Environment Using Hardware Acceleration Presenter: Pete Sanders, Napatech Inc. Sharkfest 2009 Stanford University

Troubleshooting Tips and Tricks

PktFilter A Win32 service to control the IPv4 filtering driver of Windows 2000/XP/Server

Computer Networks/DV2 Lab

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

Wireshark Lab: DNS. 1. nslookup

Firewalls. Basic Firewall Concept. Why firewalls? Firewall goals. Two Separable Topics. Firewall Design & Architecture Issues

Lab VI Capturing and monitoring the network traffic

1. LAB SNIFFING LAB ID: 10

DMZ Network Visibility with Wireshark June 15, 2010

Attack Lab: Attacks on TCP/IP Protocols

TCP/IP Attack Lab. 1 Lab Overview. 2 Lab Environment. 2.1 Environment Setup. SEED Labs TCP/IP Attack Lab 1

Exercise 7 Network Forensics

Wireshark Quick-Start Guide. Instructions on Using the Wireshark Packet Analyzer

19. Exercise: CERT participation in incident handling related to the Article 13a obligations

NTOP User s Guide Network Usage Monitor for Unix Systems

Network Trace Analysis

Module 1: Reviewing the Suite of TCP/IP Protocols

Wireshark DNS. Introduction. nslookup

NfSen Plugin Supporting The Virtual Network Monitoring

Evidence Acquisition. Network Forensics. Jae Woong Joo

Application-Centric Analysis Helps Maximize the Value of Wireshark

Lab - Using Wireshark to View Network Traffic

How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN

PIX/ASA 7.x with Syslog Configuration Example

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Configuring IP to Serial with Auto Answer and Serial to IP

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes

Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace

ntop.org nprobe and nbox User s Guide Open Source Software and Hardware NetFlow v5/v9 Probe Version February 2004

Transcription:

USING WIRESHARK TO CAPTURE AND ANALYZE NETWORK DATA CPSC 441 TUTORIAL JANUARY 30, 2012 TA: RUITING ZHOU The content of these slides are taken from CPSC 526 TUTORIAL by Nashd Safa (Extended and partially modified)

TA: Ruiting Zhou Email: rzho@ucalgary.ca CT hour: Wednesday 4:00pm-5:00pm Friday: 11:00am-12:00am Math Science Building 1 st floor, Computer science Lab 2

WIRESHARK Wireshark (Originally named Ethereal)is a free and open-source packet analyzer It is used for network troubleshooting, analysis, software and communication protocol development, and education. It has a graphical front-end, and many more information sorting and filtering options. 3

FEATURES AND FUNCTIONALITIES OF WIRESHARK Wireshark is software that "understands" the structure of different networking protocols. Thus, it is able to display the encapsulation and the fields along with their meanings of different packets specified by different networking protocols. Live data can be read from a number of types of Data display can be refined using a display filter. 4

INSTALLING WIRESHARK Download Wireshark from http://www.wireshark.org/download.html Choose appropriate version according to your operating system (For Windows), during installation agree to install winpcap as well. pcap (packet capture) consists of an application programming interface (API) for capturing network traffic. Unix-like systems implement pcap in the libpcap library. Windows uses a port of libpcap known as WinPcap. http://wiki.wireshark.org/capturesetup Provides a good tutorial on how to capture data using WireShark 5

BEFORE CAPTURING DATA Are you allowed to do this? Ensure that you have the permission to capture packets from the network you are connected with. (Corporate policies or applicable law might prohibit capturing data from the network) General Setup Operating system must support packet capturing, e.g. capture support is enabled You must have sufficient privileges to capture packets, e.g. root / Administrator privileges Your computer's time and time zone settings should be correct 6

CAPTURING DATA Check the interfaces are correctly listed 7

CAPTURING DATA Click on the specific interface you want to capture traffic from. 8

ANALYZING CAPTURED DATA 9

ANALYZING CAPTURED DATA Note: The hierarchical display here is upside down compared to the Internet protocol stack that you learn in the lecture. 10

ANALYZING CAPTURED DATA HTTP header 11

WIRESHARK FILTERS Two types of filters: Capture Filters Display Filters Wireshark contains a powerful capture filter engine that helps remove unwanted packets from a packet trace and only retrieves the packets of our interest. Display filters let you compare the fields within a protocol against a specific value, compare fields against fields, and check the existence of specified fields or protocols 12

EXAMPLE OF A CAPTURE FILTER 13

EXAMPLE OF A DISPLAY FILTER Display filter separates the packets to be displayed (In this case, only packets with source port 80 are displayed) 14

WIRESHARK FILTERS Comparison operators Fields can also be compared against values. The comparison operators can be expressed either through English-like abbreviations or through C-like symbols: eq, == Equal ne,!= Not Equal gt, > Greater Than lt, < Less Than ge, >= Greater than or Equal to le, <= Less than or Equal to 15

WIRESHARK FILTERS Logical Expressions Tests can be combined using logical expressions. These too are expressible in C-like syntax or with English-like abbreviations: and, && Logical AND or, Logical OR not,! Logical NOT Some Valid Filters tcp.port == 80 and ip.src == 192.168.2.1 http and frame[100-199] contains "wireshark" 16

WIRESHARK FILTERS The Slice Operator You can take a slice of a field if the field is a text string or a byte array. For example, you can filter the HTTP header fields REDIRECTION happens. http.location[0:4]=="http" Another example is: http.content_type[0:4] == "text" 17

CAPTURE FILTERS Syntax Protocol Direction Host(s) Logical Op. Other Express. Example tcp dst 136.159.5.20 and host 136.159.5.6 Protocol: Values: ether, fddi, ip, arp, rarp, decnet, lat, sca, moprc, mopdl, tcp and udp. If no protocol is specified, all the protocols are used. Direction: Values: src, dst, src and dst, src or dst If no source or destination is specified, the "src or dst" keywords are applied. 136.159.5.20" is equivalent to "src or dst host 136.159.5.20". 18

CAPTURE FILTERS Host(s): Values: net, port, host, portrange. If no host(s) is specified, the "host" keyword is used. For example, "src 136.159.5.20" is equivalent to "src host 136.159.5.20". Logical Operations: Values: not, and, or. Negation ("not") has highest precedence. Alternation ("or") and concatenation ("and") have equal precedence and associate left to right. For example, "not tcp port 3128 and tcp port 80" is equivalent to "(not tcp port 3128) and tcp port 80". 19

CAPTURE FILTERS(EXAMPLES) tcp port 80 Displays packets with tcp protocol on port 80. ip src host 136.159.5.20 Displays packets with source IP address equals to 136.159.5.20. host 136.159.5.1 Displays packets with source or destination IP address equals to 136.159.5.1. src portrange 2000-2500 Displays packets with source UDP or TCP ports in the 2000-2500 range. 20

CAPTURE FILTERS(EXAMPLES) src host 136.159.5.20 and not dst host 136.159.5.1 Displays packets with source IP address equals to 136.159.5.20 and in the same time not with the destination IP address 136.159.5.1. (src host 136.159.5.1 or src host 136.159.5.3) and tcp dst portrange 200-10000 and dst host 136.159.5.2 Displays packets with source IP address 136.159.5.1 or source address136.159.5.3, the result is then concatenated with packets having destination TCP portrange from 200 to 10000 and destination IP address136.159.5.2. 21

DISPLAY FILTERS Syntax Protocol. String 1. String 2 Comparison operators Value Logical Op. Other Expr. Exampl e http. request. method == get or tcp.port == 80 String1, String2 (Optional settings): Sub protocol categories inside the protocol. To find them, look for a protocol and then click on the "+" character. 22

DISPLAY FILTERS(EXAMPLES) ip.addr == 136.159.5.20 Displays the packets with source or destination IP address equals to 136.159.5.20. http.request.version Display http Version tcp.dstport == 25 tcp.flags Display packets having a TCP flags tcp.flags.syn == 0x02 Display packets with a TCP SYN flag. (Synchronize sequence numbers. Only the first packet sent from each end should have this flag set) 23