Wireshark (Network traffic analysis)

| F.A.Q.

Wireshark is a free and open-source tool used for network traffic analysis. It is a popular program used by network administrators, security engineers, developers, and researchers for network monitoring and debugging.

Wireshark allows the capture and analysis of data packets transmitted over a computer network. It can be used for investigating and diagnosing network problems, monitoring network traffic, analyzing the performance of network applications, identifying security threats, and many other purposes.

The program supports multiple network protocols such as TCP/IP, HTTP, DNS, FTP, SSH, SSL, and many others. Wireshark enables detailed analysis of each packet, displaying information about the source and destination, protocol type, headers, and data transmitted over the network.

Additionally, Wireshark offers advanced filtering capabilities that allow for extracting and analyzing only the packets of interest. We can also save captured data to files or export analysis results in various formats.

It is important to note that Wireshark is a powerful tool that can be used for both diagnostic and illegal purposes. Therefore, it is essential to use it in a legal and compliant manner according to applicable regulations.

To conduct tests, we need a server with network access. We have servers available for ISPs on which such tests can be performed.

After launching the program for the first time, available network interfaces for analysis will appear.

After selecting the Ethernet interface on which the network traffic takes place, we move to the next window. The program will listen to everything that happens on the given interface.

In order to search in the above logs, for example serverparts.pl sites of interest, it is necessary to add the server dns in the wireshark settings

And then use the command in the filter ip.src == serverparts.pl and we should get the following filter result

Example commands:

tcp dst port 22 Displays packets sent to TCP port 22.


ip src host 172.16.200.185 Displays packets from source address 172.16.200.185

host 10.1.2.3 Displays packets from either the source or destination address 172.16.200.185

tcp port 23 and not src host 10.0.0.5 Displays traffic on port 23 from any address except 10.0.0.5

Operators used in filtering

Operators

Descriptions

Example

eq or ==

Equal

ip.dest == 192.168.1.1

ne or !=

is not equal to

ip.dest != 192.168.1.1

gt or >

Greater than

frame.len > 10

lt or <

Less than

frame.len <10

Logical Operators

Operators

Descriptions

What it Returns

and or &&

AND

All conditions should match

or or ||

OR

All or one of the conditions should match.

 

xor or ^^

XOR

Exclusive OR (XOR) - only one of the two conditions should be met, not both.

 

not or !

NOT(Negation)

Not equal.

 

Related pages:

  1. pktmon tool (Network traffic analysis)