Wireshark Tutorial

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 28
At a glance
Powered by AI
The key takeaways are that Wireshark is a network packet analyzer tool that can capture and analyze packet data on a network. It allows the user to examine packets, protocol specific details and conversations.

The main components of a Wireshark interface include the main toolbar, filter toolbar, packet list pane, packet details pane, packet bytes pane and status bar.

The packet list pane displays information about captured packets such as the source, destination, protocol and packet details. It allows sorting and filtering of packets.

Ethereal/WireShark Tuto

rial

Yen-Cheng Chen
IM, NCNU
April, 2006
Introduction
 Ethereal is a network packet analyzer.
 A network packet analyzer will try to capture network
packets and tries to display that packet data as detail
ed as possible.
 Download Ethereal:
 http://www.ethereal.com/download.html
 What will be captured
 All packets that an interface can ”hear”
 At your PC connected to a switch
 Unicast (to and from the interface only)
 Multicast, RIP, IGMP,…
 Broadcast, e,g ARP,
WireShark
 The Ethereal network protocol analyzer has c
hanged its name to Wireshark.
 http://www.wireshark.org/
 Download:
 http://prdownloads.sourceforge.net/wireshark/wires
hark-setup-1.0.3.exe
 Wireshark User's Guide
 http://www.wireshark.org/docs/wsug_html/
1
List available capture
interfaces

2
Start a capture

3
Stop the capture
 menu
 main toolbar
 filter toolbar

 packet list pane

 packet details pane


ipconfig /renew

 packet bytes pane

 status bar
packet list pane
Sort by source
packet details pane
packet bytes pane
Filter
3

1
2

4
2

1
Filter Expression

ip.src == 10.10.13.137 && ip.dst == 163.22.20.16

ip.src eq 10.10.13.137 and ip.dst eq 163.22.20.16

ip.src == 10.10.13.137 || ip.src == 163.22.20.16

http && ( ip.src == 10.10.13.137 || ip.src == 163.22.20.16)

!(ip.dst == 10.10.13.137)
(ip.dst == 10.10.13.137) && (ip.src == 163.22.20.16)
Follow TCP Stream
Export
No. Time Source Destination Protocol Info
31 6.058434 10.10.13.137 163.22.20.16 HTTP GET /~ycchen/nm/ HTTP/1.1

Frame 31 (613 bytes on wire, 613 bytes captured)


Ethernet II, Src: AsustekC_6a:ea:8d (00:13:d4:6a:ea:8d), Dst: 10.10.13.254 (00:02:ba:ab:74:2b)
Internet Protocol, Src: 10.10.13.137 (10.10.13.137), Dst: 163.22.20.16 (163.22.20.16)
Transmission Control Protocol, Src Port: 1822 (1822), Dst Port: http (80), Seq: 1, Ack: 1, Len: 559
Source port: 1822 (1822)
Destination port: http (80)
Sequence number: 1 (relative sequence number)
Next sequence number: 560 (relative sequence number)
Acknowledgement number: 1 (relative ack number)
Header length: 20 bytes
Flags: 0x0018 (PSH, ACK)
Window size: 17520
Checksum: 0xf4f3 [correct]
Hypertext Transfer Protocol
Capture Options
Assignments
 5 layers
 Ethernet II frame
 802.3 frame
 Broadcast frame

 Deadline: 12/17

You might also like