Wireshark
Wireshark
Wireshark
Wireshark
Fakrul
Alam
fakrul@bdhub.com
Why we need to capture packet &
how it’s related to security?
tcpdump Definition
Capture Data
Raw
Data
Filters
• Capture filter
– Capture Traffic that match capture filter rule
– save disk space
– prevent packet loss
• Display filter
• Tweak appearance
Apply Filters
• ip.addr == 10.0.0.1 [Sets a filter for any packet with 10.0.0.1, as
either the source or dest]
• ip.addr==10.0.0.1 && ip.addr==10.0.0.2 [sets a conversation filter
between the two defined IP addresses]
• http or dns [sets a filter to display all http and dns]
• tcp.port==4000 [sets a filter for any TCP packet with 4000 as a
source or dest port]
• tcp.flags.reset==1 [displays all TCP resets]
• http.request [displays all HTTP GET requests]
• tcp contains rviews [displays all TCP packets that contain the word
‘rviews’. Excellent when searching on a specific string or user ID]
• !(arp or icmp or dns) [masks out arp, icmp, dns, or whatever other
protocols may be background noise. Allowing you to focus on the
traffic of interest]
Follow TCP Stream
Follow TCP Stream
• Make graph
– Statistics -> IO Graph
Need CLI?
• File
– telnet.pcap
• Question
– Reconstruct the telnet session.
• Q1: Who logged into 192.168.0.1
– Username __________, Password __________ .
• Q2: After logged in what did the user do?
– Tip
– telnet traffic is not secure
Exercise 2: Massive TCP SYN
• File
– massivesyn1.pcap and massivesyn2.pcap
• Question
– Point the difference with them.
• Q1: massivesyn1.pcap is a _________ attempt.
• Q2: massivesyn2.pcap is a _________ attempt.
• Tip
– Pay attention to Src IP
Exercise 3: Compare the traffic
• Scenario
• You’re an IT admin of company X. You had a report that
Jim (a new employee) can not browse or mail with his
laptop. After researching you found that Risa, sitting next
to Jim, can brose without any problem.
• File
– Risa.pcap, jim.pcap
• Question
• Compare the capture file from both machines and find
out why Jim’s machine is not online.
– Jim must _____________________________ .
• Tip
– Pay attention to the first arp packet.
Exercise 4: Chatty Employees
• File
– chat.dmp
• Question
• Q1: What kind protocol is used? _______
• Q2: This is conversation between
_____@hotmail.com and ______@hotmail.com
• Q3: What do they say about you(sysadmin)?
• Tip
– Your chat can be monitored by network admin.
Exercise 5: Suspicious FTP activity
• File
– ftp1.pcap
• Question
– Q1: 10.121.70.151 is FTP ______ .
– Q2: 10.234.125.254 is FTP ______ .
– Q3: FTP Err Code 530 means __________ .
– Q4: 10.234.125.254 attempt ________.
• Tip
– How many login error occur within a minute?
Exercise 6: Unidentified Traffic
• File
– Foobar.pcap
• Question
– Q1: see what’s going on with wireshark gui
• Statistics -> Conversation List -> TCP (*)
– Q2: Which application use TCP/6346? Check the
web.
Exercise 7: Covert channel
• File
– covertinfo.pcap
• Question
– Take a closer look! This is not a typical ICMP Echo/
Reply…
– Q1: What kind of tool do they use? Check the web.
– Q2: Name other application which tunneling user
traffic.