Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Wireshark

Download as pdf or txt
Download as pdf or txt
You are on page 1of 30

Packet Capture &

Wireshark

Fakrul  Alam  
fakrul@bdhub.com  
Why we need to capture packet &
how it’s related to security?
tcpdump Definition

tcpdump is a utility used to capture and analyze


packets on network interfaces. Details about these
packets can either be displayed to the screen or
they can be saved to a file for later analysis.
tcpdump utilizes the libpcap library for packet
capturing.
tcpdump command example
# tcpdump –nni eth0
# tcpdump –nni eth0 host 10.10.10.10
# tcpdump –nni eth0 dst host 10.10.10.10 and proto tcp
# tcpdump –nni eth0 src net 10.10.10.0/24 and port tcp
and portrange 1-1024

-nni = don’t use DNS to resolve IPs and display port no


-i = interface to watch
dst = watch only traffic destined to a net, host or port
src = watch only traffic whose src is a net, host or port
net = specifies network
host = specifies host
port = specifies a port
proto = protocol ie tcp or udp
tcpdump command example
# tcpdump –nni eth0 –s0
# tcpdump –nni eth0 not port 22 –s0 –c 1000
# tcpdump –nni eth0 not port 22 and dst host
10.10.10.10 and not src net 10.20.30.0/24

-s0 = setting samples length to 0 means use the required length


to catch whole packet
-c = no to packets
tcpdump pcaps
# tcpdump –nni eth0 -w capture.pcap –vv –c 1000
# tcpdump –nni eth0 –r capture.pcap and port 80

-w capture.pcap = save capture packet to capture.pcap


–vv = display number of packet captured
-r caputre.pcap = read capture file
-c = no to packets
tcpdump Output
IP 199.59.148.139.443 > 192.168.1.8.54343: Flags
[P.], seq 53:106, ack 1, win 67, options [nop,nop,TS
val 854797891 ecr 376933204], length 53

IP 192.168.1.8.54343 > 199.59.148.139.443: Flags


[.], ack 106, win 4092, options [nop,nop,TS val
376934736 ecr 854797891], length 0

IP 199.59.148.139.443 > 192.168.1.8.54343: Flags


[P.], seq 106:159, ack 1, win 67, options
[nop,nop,TS val 854797891 ecr 376933204], length 53

IP 192.168.1.8.54343 > 199.59.148.139.443: Flags


[.], ack 159, win 4091, options [nop,nop,TS val
376934736 ecr 854797891], length 0
What is Wireshark?

•  Wireshark is a network packet/protocol analyzer.


–  A network packet analyzer will try to capture network
packets and tries to display that packet data as
detailed as possible.
•  Wireshark is perhaps one of the best open
source packet analyzers available today for
UNIX and Windows.
About Wireshark

•  Formerly known as “Ethereal”


–  Author, Gerald Combs quit Network Integration Services
–  Free
•  Requirement
–  Need to install winpcap
–  Latest wireshark installer contains winpcap, don’t worry
–  (On Windows Vista) Need Administrator Privilege to
capture
•  GUI
–  Dramatically improved
Why Wireshark
•  network administrators use it to troubleshoot
network problems
•  network security engineers use it to examine
security problems
•  developers use it to debug protocol
implementations
•  people use it to learn network protocol
internals
•  Wireshark isn't an intrusion detection system.
•  Wireshark will not manipulate things on the
network, it will only "measure" things from it.
How to Install

•  Very straight forward


•  Just double-click and follow the instructions.
Capture
Dashboard
Menu  
Filter  

Capture  Data  

Raw  Data  
Filters

•  Capture filter
–  Capture Traffic that match capture filter rule
–  save disk space
–  prevent packet loss
•  Display filter
•  Tweak appearance
Apply Filters
•  ip.addr == 10.0.0.1 [Sets a filter for any packet with 10.0.0.1, as
either the source or dest]
•  ip.addr==10.0.0.1 && ip.addr==10.0.0.2 [sets a conversation filter
between the two defined IP addresses]
•  http or dns [sets a filter to display all http and dns]
•  tcp.port==4000 [sets a filter for any TCP packet with 4000 as a
source or dest port]
•  tcp.flags.reset==1 [displays all TCP resets]
•  http.request [displays all HTTP GET requests]
•  tcp contains rviews [displays all TCP packets that contain the word
‘rviews’. Excellent when searching on a specific string or user ID]
•  !(arp or icmp or dns) [masks out arp, icmp, dns, or whatever other
protocols may be background noise. Allowing you to focus on the
traffic of interest]
Follow TCP Stream
Follow TCP Stream

•  Build TCP Stream


–  Select TCP Packet -> Follow TCP Stream
Use “Statistics”

•  What protocol is used in your network


–  Statistics -> Protocol Hierarchy
Use “Statistics”

•  Which host most chatty


–  Statistics -> Conversations
Use “Statistics”

•  Make graph
–  Statistics -> IO Graph
Need CLI?

•  If you stick to character based interface, try


tshark.exe
•  C:\program files\wireshark\tshark.exe
Tcpdump & Wireshark

•  tcpdump -i <interface> -s 65535 -w <some-file>


Exercise

•  Install Wireshark into your PC


•  Run wireshark and Capture inbound/outbound
traffic
•  Download capture files from
–  Follow the instructor's guide.
Exercise1: Good Old Telnet

•  File
–  telnet.pcap
•  Question
–  Reconstruct the telnet session.
•  Q1: Who logged into 192.168.0.1
–  Username __________, Password __________ .
•  Q2: After logged in what did the user do?
–  Tip
–  telnet traffic is not secure
Exercise 2: Massive TCP SYN

•  File
–  massivesyn1.pcap and massivesyn2.pcap
•  Question
–  Point the difference with them.
•  Q1: massivesyn1.pcap is a _________ attempt.
•  Q2: massivesyn2.pcap is a _________ attempt.
•  Tip
–  Pay attention to Src IP
Exercise 3: Compare the traffic
•  Scenario
•  You’re an IT admin of company X. You had a report that
Jim (a new employee) can not browse or mail with his
laptop. After researching you found that Risa, sitting next
to Jim, can brose without any problem.
•  File
–  Risa.pcap, jim.pcap
•  Question
•  Compare the capture file from both machines and find
out why Jim’s machine is not online.
–  Jim must _____________________________ .
•  Tip
–  Pay attention to the first arp packet.
Exercise 4: Chatty Employees

•  File
–  chat.dmp
•  Question
•  Q1: What kind protocol is used? _______
•  Q2: This is conversation between
_____@hotmail.com and ______@hotmail.com
•  Q3: What do they say about you(sysadmin)?
•  Tip
–  Your chat can be monitored by network admin.
Exercise 5: Suspicious FTP activity

•  File
–  ftp1.pcap
•  Question
–  Q1: 10.121.70.151 is FTP ______ .
–  Q2: 10.234.125.254 is FTP ______ .
–  Q3: FTP Err Code 530 means __________ .
–  Q4: 10.234.125.254 attempt ________.
•  Tip
–  How many login error occur within a minute?
Exercise 6: Unidentified Traffic

•  File
–  Foobar.pcap
•  Question
–  Q1: see what’s going on with wireshark gui
•  Statistics -> Conversation List -> TCP (*)
–  Q2: Which application use TCP/6346? Check the
web.
Exercise 7: Covert channel

•  File
–  covertinfo.pcap
•  Question
–  Take a closer look! This is not a typical ICMP Echo/
Reply…
–  Q1: What kind of tool do they use? Check the web.
–  Q2: Name other application which tunneling user
traffic.

You might also like