Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

James Won-Ki Hong: Department of Computer Science and Engineering POSTECH, Korea

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 39

James Won-Ki Hong

Department of Computer Science and Engineering

POSTECH, Korea

jwkhong@postech.ac.kr

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 1/39


Outline
 What is Wireshark?
 Capturing Packets
 Analyzing Packets
 Filtering Packets
 Saving and Manipulating Packets
 Packet Statistics
 Colorizing Specific Packets
 References

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 2/39


What is Wireshark?
 The De-Facto Network Protocol Analyzer
 Open-Source (GNU Public License)
 Multi-platform (Windows, Linux, OS X, Solaris, FreeBSD,
NetBSD, and others)
 Easily extensible
 Large development group

 Previously Named “Ethereal”

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 3/39


What is Wireshark?
 Features
 Deep inspection of thousands of protocols
 Live capture and offline analysis
 Standard three-pane packet browser
 Captured network data can be browsed via a GUI, or via
the TTY-mode TShark utility
 The most powerful display filters in the industry
 Rich VoIP analysis
 Live data can be read from Ethernet, IEEE 802.11,
PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame
Relay, FDDI, and others
 Coloring rules can be applied to the packet list for quick,
intuitive analysis
 Output can be exported to XML, PostScript®, CSV, or
plain text

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 4/39


What is Wireshark?
 What we can:
 Capture network traffic
 Decode packet protocols using dissectors
 Define filters – capture and display
 Watch smart statistics
 Analyze problems
 Interactively browse that traffic
 Some examples people use Wireshark for:
 Network administrators: troubleshoot network problems
 Network security engineers: examine security problems
 Developers: debug protocol implementations
 People: learn network protocol internals

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 5/39


Interfaces

Packet
List

Packet
Details

Packet
Bytes

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 6/39


Capturing Packets (1/3)

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 7/39


Capturing Packets (2/3)

Capture all packets on the


network
Buffer size – in order not
to fill your laptop disk

Capture filter
Display
options

Capture in Name
multiple files resolution
options

When to
automatically
stop the
capture

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 8/39


Capturing Packets (3/3)

Example (W-LAN):
Received Signal Strength
Indication (RSSI) and Link
speed (BW)

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 9/39


Analyzing Packets (1/9)
 Ethernet Frame Example

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 10/39


Analyzing Packets (2/9)
 IP Packet Example

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 11/39


Analyzing Packets (3/9)
 TCP Packet Example

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 12/39


Analyzing Packets (4/9)
 TCP 3-way Handshake

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 13/39


Analyzing Packets (5/9)
 Flow Graph
 Giving us a graphical flow, for better understanding of
what we see

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 14/39


Analyzing Packets (6/9)
 Flow Graph

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 15/39


Analyzing Packets (7/9)
 Filtering Specific TCP Stream

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 16/39


Analyzing Packets (8/9)
 Filtering Specific TCP Stream

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 17/39


Analyzing Packets (9/9)
 RTP Stream Analysis

Stable
stream BW

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 18/39


Filtering Packets (1/4)
 Applying Filter when Capturing Packets

Capture  Interfaces  Options:

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 19/39


Filtering Packets (2/4)
 Applying Filter when Analyzing Packets

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 20/39


Filtering Packets (3/4)
 Examples:
 Capture only traffic to or from IP address 172.18.5.4
• host 172.18.5.4
 Capture traffic to or from a range of IP addresses
• net 192.168.0.0/24
• net 192.168.0.0 mask 255.255.255.0
 Capture traffic from a range of IP addresses
• src net 192.168.0.0/24
• src net 192.168.0.0 mask 255.255.255.0
 Capture traffic to a range of IP addresses
• dst net 192.168.0.0/24
• dst net 192.168.0.0 mask 255.255.255.0
 Capture only DNS (port 53) traffic
• port 53
 Capture non-HTTP and non-SMTP traffic on your server
• host www.example.com and not (port 80 or port 25)
• host www.example.com and not port 80 and not port 25

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 21/39


Filtering Packets (4/4)
 Examples:
 Capture except all ARP and DNS traffic
• port not 53 and not arp
 Capture traffic within a range of ports
• (tcp[2:2] > 1500 and tcp[2:2] < 1550) or (tcp[4:2] > 1500 and
tcp[4:2] < 1550)
• tcp portrange 1501-1549
 Capture only Ethernet type EAPOL
• ether proto 0x888e
 Capture only IP traffic
(the shortest filter, but sometimes very useful to get rid of lower layer
protocols like ARP and STP)
• ip
 Capture only unicast traffic
(useful to get rid of noise on the network if you only want to see traffic
to and from your machine, not, for example, broadcast and multicast
announcements)
• not broadcast and not multicast

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 22/39


Saving and Manipulating Packets (1/3)

 Save only displayed packets

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 23/39


Saving and Manipulating Packets (2/3)

 Export to CSV file

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 24/39


Saving and Manipulating Packets (3/3)

 Exported CSV File

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 25/39


Packet Statistics (1/8)
 Protocol Hierarchy

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 26/39


Packet Statistics (2/8)
 Conversation
 Traffic between two specific endpoints

With some manipulation

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 27/39


Packet Statistics (3/8)
 I/O Graph

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 28/39


Packet Statistics (4/8)
 Configurable Options
 I/O Graphs
• Graph 1-5: enable the specific graph 1-5 (graph 1 by default)
• Filter: a display filter for this graph (only the packets that pass
this filter will be taken into account for this graph)
• Style: the style of the graph (Line/Impulse/FBar/Dot)
 X Axis
• Tick interval: an interval in x direction lasts
(10/1 minutes or 10/1/0.1/0.01/0.001 seconds)
• Pixels per tick: use 10/5/2/1 pixels per tick interval
• View as time of day: option to view x direction labels as time of
day instead of seconds or minutes since beginning of capture
 Y Axis
• Unit: the unit for the y direction
(Packets/Tick, Bytes/Tick, Bits/Tick, Advanced...)
• Scale: the scale for the y unit
(Logarithmic,Auto,10,20,50,100,200,...)

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 29/39


Packet Statistics (5/8)
 TCP Stream Graph

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 30/39


Packet Statistics (6/8)
 Round-Trip Time Graph

RTT Vs. Sequence numbers gives us the time that take


to Ack every packet.
In case of variations, it can cause DUPACKs and even
Retransmissions
Usually will happen on communications lines:
Over the Internet
Over cellular networks

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 31/39


Packet Statistics (7/8)
 Time / Sequence Graph
Seq No [B]

Time / Sequence representes how sequence numbers


advances with time
In a good connection (like in the example), the line will
be linear
The angle of the line indicates the speed of the
connection. In this example – fast connection

Time [Sec]

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 32/39


Packet Statistics (8/8)
 Time / Sequence Graph
Seq No [B]

In this case, we see a non-


contiguous graph
Can be due to:
Severe packet loss
Server response (processing)
time

Time [Sec]

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 33/39


Colorizing Specific Packets (1/4)
 Packet Colorization
 Colorize packets according to a filter
 Allow to emphasize the packets interested in
 A lot of Coloring Rule examples at the Wireshark Wiki
Coloring Rules page at We want to watch a
http://wiki.wireshark.org/ColoringRules specific protocol through
out the capture file

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 34/39


Colorizing Specific Packets (2/4)

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 35/39


Colorizing Specific Packets (3/4)

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 36/39


Colorizing Specific Packets (4/4)
 TLS Connection Establishment

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 37/39


References
 Wireshark Website
 http://www.wireshark.org
 Wireshark Documentation
 http://www.wireshark.org/docs/
 Wireshark Wiki
 http://wiki.wireshark.org
 Network analysis Using Wireshark Cookbook
 http://www.amazon.com/Network-Analysis-Using-Wiresh
ark-Cookbook/dp/1849517649

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 38/39


Q&A

POSTECH CSED702D: Internet Traffic Monitoring and Analysis 39/39

You might also like