Drinking straight from the network hose. So What is WireShark? Packet sniffer/protocol analyzer Open Source Network Tool Latest version of the ethereal.

Slides:



Advertisements
Similar presentations
LAN Devices 5.3 IT Essentials.
Advertisements

Introduction to Network Analysis and Sniffer Pro
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
1 Version 3 Module 8 Ethernet Switching. 2 Version 3 Ethernet Switching Ethernet is a shared media –One node can transmit data at a time More nodes increases.
Nov-03 ©Cisco Systems CCNA Semester 1 Version 3 Comp11 Mod8 – St. Lawrence College – Cornwall Campus, ON, Canada – Clark slide 1 Cisco Systems CCNA Version.
Chapter 15 Chapter 15: Network Monitoring and Tuning.
Internet and Intranet Protocols and Applications Section V: Network Application Performance Lecture 11: Why the World Wide Wait? 4/11/2000 Arthur P. Goldberg.
Introduction. 2 What Is SmartFlow? SmartFlow is the first application to test QoS and analyze the performance and behavior of the new breed of policy-based.
TSS Academy Troubleshooting with.
CAP6135: Malware and Software Vulnerability Analysis Network Traffic Monitoring Using Wireshark Cliff Zou Spring 2013.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Troubleshooting methods. Module contents  Avaya Wireless tools  Avaya Wireless Client Manager  Avaya Wireless AP Manager  Hardware indicators  Non.
(part 3).  Switches, also known as switching hubs, have become an increasingly important part of our networking today, because when working with hubs,
Click to edit Master subtitle style Chapter 17: Troubleshooting Tools Instructor:
Hands-On Microsoft Windows Server 2008 Chapter 11 Server and Network Monitoring.
Windows Server 2008 Chapter 11 Last Update
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Wireshark and TCP/IP Basics ACM SIG-Security Lance Pendergrass.
Connecting LANs, Backbone Networks, and Virtual LANs
Wireshark Presented By: Hiral Chhaya, Anvita Priyam.
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
Document Number ETH West Diamond Avenue - Third Floor, Gaithersburg, MD Phone: (301) Fax: (301)
Semester 1 Module 8 Ethernet Switching Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Hands-on Networking Fundamentals
How to Use a Network Analyzer Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Brierley 1 Module 4 Module 4 Introduction to LAN Switching.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
S3C2 – LAN Switching Addressing LAN Problems. Congestion is Caused By Multitasking, Faster operating systems, More Web-based applications Client-Server.
Switches 1RD-CSY  In this lecture, we will learn about  Collision Domain and Microsegmentation  Switches – a layer two device ◦ MAC address.
Sharing the Network It slices, it dices, it sequences ….. All of this and error checking too!
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
EFFECTIVELY TEACHING WITH WIRESHARK LAURA CHAPPELL EFFECTIVELY TEACHING WITH WIRESHARK LAURA CHAPPELL CHAPPELLU.COM WIRESHARKTRAINING.COM.
11 NETWORK CONNECTION HARDWARE Chapter 3. Chapter 3: NETWORK CONNECTION HARDWARE2 NETWORK INTERFACE ADAPTER  Provides the link between a computer and.
CAP6135: Malware and Software Vulnerability Analysis Network Traffic Monitoring Using Wireshark Cliff Zou Spring 2014.
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
© 2010 Cisco Systems, Inc. All rights reserved. 1 CREATE Re-Tooling Exploring Protocols with Wireshark March 12, 2011 CREATE CATC and Ohlone College.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 4 Switching Concepts.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Version 4.0 Ethernet Network Fundamentals – Chapter 9 Sandra Coleman, CCNA, CCAI.
Cisco 3 - Switching Perrine. J Page 16/4/2016 Chapter 4 Switches The performance of shared-medium Ethernet is affected by several factors: data frame broadcast.
Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters, Logging, and Subnets: Module Objectives Create capture filters that control whether.
Switches 1RD-CSY  In this lecture, we will learn about  Collision Domain and Microsegmentation  Switches – a layer two device ◦ MAC address.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Practice 4 – traffic filtering, traffic analysis
Sniffer, tcpdump, Ethereal, ntop
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Network design Topic 2 Existing network infrastructure.
Slide #1 CIT 380: Securing Computer Systems TCP/IP.
POSTECH 1/39 CSED702D: Internet Traffic Monitoring and Analysis James Won-Ki Hong Department of Computer Science and Engineering POSTECH, Korea
COMP2322 Lab 1 Introduction to Wireshark Weichao Li Jan. 22, 2016.
Ethereal/WireShark Tutorial Yen-Cheng Chen IM, NCNU April, 2006.
+ Lecture#2: Ethernet Asma ALOsaimi. + Objectives In this chapter, you will learn to: Describe the operation of the Ethernet sublayers. Identify the major.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Interconnecting Cisco Networking Devices Part 1 Pass4sureusa Pass4sure.
Chapter 4: server services. The Complete Guide to Linux System Administration2 Objectives Configure network interfaces using command- line and graphical.
Traffic Analysis– Wireshark
Youngstown State University Cisco Regional Academy
Introduction to Networks v6.0
CAP6135: Malware and Software Vulnerability Analysis Network Traffic Monitoring Using Wireshark Cliff Zou Spring 2016.
Lab 2: Packet Capture & Traffic Analysis with Wireshark
Instructor Materials Chapter 5: Ethernet
Hands-On Microsoft Windows Server 2008
Computer Networks 9/17/2018 Computer Networks.
Module 8: Ethernet Switching
Wireshark(Ethereal).
Chapter 15: Network Monitoring and Tuning
Presentation transcript:

Drinking straight from the network hose

So What is WireShark? Packet sniffer/protocol analyzer Open Source Network Tool Latest version of the ethereal tool

What’s a network? What’s an IP address? What’s a MAC address? What’s a router? What do you mean capture? Can this make Elite run faster? What’s open source? How can one man look so bald? Stuff we won’t cover

Installation

wireshark-setup.exe /S /desktopicon=yes /quicklaunchicon=no

Installation on Linux CENTOS – yum install wireshark Ubuntu – apt-get install wireshark Red Hat – rpm –iv wireshark*rpm In most cases dependencies (like libpcap) are installed automatically …because Linux installers rock

tshark C:\Program Files\Wireshark>tshark -help TShark Dump and analyze network traffic. See for more information. Copyright Gerald Combs and contributors. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. Usage: tshark [options]... Capture interface: -i name or idx of interface (def: first non-loopback) -f packet filter in libpcap filter syntax -s packet snapshot length (def: 65535) -p don't capture in promiscuous mode -B size of kernel buffer (def: 1MB) -y link layer type (def: first appropriate) -D print list of interfaces and exit -L print list of link-layer types of iface and exit Capture stop conditions: -c stop after n packets (def: infinite) -a... duration:NUM - stop after NUM seconds filesize:NUM - stop this file after NUM KB files:NUM - stop after NUM files ………..

With traffic…

HEX Window

Menu Bar

Button Bar

Status Bar

Where do I put WireShark?

Location, Location, Location

Hub

Switches

Switch with a SPAN port

TAP

HUBS

Switch interface FastEthernet0/1 port monitor FastEthernet0/2

Switch interface FastEthernet0/1 port monitor FastEthernet0/2 rx Interface FastEthernet0/3 port monitor FastEthernet0/2 tx

VLAN Monitoring interface FastEthernet0/1 port monitor VLAN1

Types of TAPs Copper & Optical Conversion TAPs Aggregator TAPs Full-Duplex TAPs Hub – Technically…a hub is a half duplex TAP, but you may miss critical layer 1 events

Why to use a TAP Physical layer errors aren’t seen by SPAN SPAN ports increase the CPU on your switch Timestamps are more accurate when using a TAP SPAN ports hide jitter (loss of synchronicity) After 50% port utilization you begin to drop packets (if you monitor both transmit & receive) – sometimes you can fix this They are non-intrusive It makes you look really cool

ARP Cache Poisoning

Setting promiscuous mode

Simple Capture

Capture Interfaces

Capture Options

selectively ignore traffic

Capture Filter examples host host and host tcp port http ip not broadcast not multicast ether host 00:04:13:00:09:a3

Capture Filter

Capture Options

Capture Interfaces

Interface Details: Characteristics

Interface Details: Statistics

Interface Details: (Ethernet)

Interface Details: Task Offload

Checksum A checksum is a form of redundancy check, a simple way to protect the integrity of data by detecting errors in data that are sent through space or time. It works by adding up the basic components of a message, typically the assorted bits, and storing the resulting value. Anyone can later perform the same operation on the data, compare the result to the authentic checksum, and (assuming that the sums match) conclude that the message was most likely not corrupted. Source: Wikipedia.com

Checksum offload

Turning off Checksum offload On Linux (as root) ethtool -K eth0 rx off tx off (choose correct network interface if not eth0) On FreeBSD (as root): ifconfig em0 -rcxsum -tcxsum (choose correct network interface if not em0) On MacOS (as root): sysctl -w net.link.ether.inet.apple_hwcksum_tx=0 sysctl -w net.link.ether.inet.apple_hwcksum_rx=0

Turning off Checksum offload

Capture Options

Stopping the Packet Capture

Display Filters (Post-Filters) Display filters (also called post-filters) only filter the view of what you are seeing. All packets in the capture still exist in the trace Display filters use their own format and are much more powerful then capture filters

Display Filter

Display Filter Examples ip.src== ip.addr== && ip.addr== tcp.port==80 || tcp.port==3389 !(ip.addr== && ip.addr== ) (ip.addr== && ip.addr== ) && (tcp.port==445 || tcp.port==139) (ip.addr== && ip.addr== ) && (udp.port==67 || udp.port==68)

Protocol Hierarchy

Follow TCP Stream

red - stuff you sent blue - stuff you get

Expert Info

Conversations

IOGraphs

Flow Graphs

Right Click Filtering

Export HTTP

Export HTTP Objects

Service Response Time - SMB

VOIP

VOIP Calls

VOIP Call Graph

VOIP RTP Player

SIP Analysis

HTTP Analysis

HTTP Analysis – Load Distribution

HTTP Analysis – Packet Counter

HTTP Analysis – Requests

TroubleShooting TCP Latency Loss Jitter Jabber Small Packets

Latency The time it takes for a packet to travel from point a to point b Latency is often the cause of “slow” networks

Troubleshooting TCP Latency

T1 T1 is the time it took from the moment the syn was sent until the client received the syn/ack This time is due to the wire latency + processing time of the IP stack on the server

T2 T2 is the time it took from receiving the SYN/ACK until the ACK is sent. This time is the processing time of the IP stack on the client

T3 T3 is the time it took from sending the ACK until the clients sends a GET. This time is the processing time of the application on the client

T4 T4 is the time it took from sending GET until an ACK is received at the client. This time is due to wire latency.

T5 T5 is the time it took from getting the ACK until data is received at the client. This time is due the server application.

TIPS Time #1 & #4 should be small on a LAN application. If not, check your network path, nic settings and throughput. Time #2 is the client ip stack. Should be minimal. If not, check the driver. Time #3 is the client application. This time will undoubtedly vary greatly between packets. Talk to your developers if you see and issue here. Time #5 is the server application. This time will also vary greatly, but generally if #5 is huge and #4 is really, really small look at delays caused by the server application. Start troubleshooting on the server by looking at CPU, bandwidth, memory and disk IO.

Jitter Jitter is an unwanted variation of one or more characteristics of a periodic signal in electronics and telecommunications. Jitter may be seen in characteristics such as the interval between successive pulses, or the amplitude, frequency, or phase of successive cycles. Source: Wikipedia.com

Jitter

LOSS Um…lost packets Source: me

LOSS

Jabber Jabber occurs when there are excessively long packets from a network device.

Packet Length

Improving WireShark Performance Don’t use capture filters Increase your read buffer size Don’t update the screen dynamically Get a faster computer Use a TAP Don’t resolve names

Thank you