EFFECTIVELY TEACHING WITH WIRESHARK LAURA CHAPPELL EFFECTIVELY TEACHING WITH WIRESHARK LAURA CHAPPELL CHAPPELLU.COM WIRESHARKTRAINING.COM.

Slides:



Advertisements
Similar presentations
Wireshark in a nutshell What is Wireshark and how can it help me? Marco S. Zuppone & the precious review of Tim Lloyd.
Advertisements

Protocol layers and Wireshark Rahul Hiran TDTS11:Computer Networks and Internet Protocols 1 Note: T he slides are adapted and modified based on slides.
SHARKFEST '09 | Stanford University | June 15–18, 2009 The Reality of 10G Analysis Presented by: Network Critical Wednesday, June 17 th, :30 pm –
SHARKFEST '08 | Foothill College | March 31 - April 2, 2008 T1-1: I’ve downloaded Wireshark… Now what? Monday, March 31, 2008 – 10:30am – 12:00pm Betty.
1 SIP-based VoIP Lab. 2 Step 1: Connect Your PC to The Network Get your laptop connected to the campus WLAN. –Run ipconfig to show your own IP address.
SHARKFEST ‘10 | Stanford University | June 14–17, 2010 TAP’s Demystified June 16 th 2010 Samuel Battaglia Technical Manager | Network Critical SHARKFEST.
Troubleshooting.
TSS Academy Troubleshooting with.
© 2006, The Technology Firm Ethereal The Technology Firm.
MIS Week 11 Site:
Wireshark and TCP/IP Basics ACM SIG-Security Lance Pendergrass.
Drinking straight from the network hose. So What is WireShark? Packet sniffer/protocol analyzer Open Source Network Tool Latest version of the ethereal.
Wireshark Presented By: Hiral Chhaya, Anvita Priyam.
1 Lab 3 Transport Layer T.A. Youngjoo Han. 2 Transport Layer  Providing logical communication b/w application processes running on different hosts 
1 Ethereal.  Freeware sniffing tool.  Captures live network traffic.  The user interface separates it from other sniffers.
University of Calgary – CPSC 441.  Wireshark (originally named Ethereal)is a free and open-source packet analyzer.  It is used for network troubleshooting,
CPSC 441 Tutorial TA: Fang Wang The content of these slides are taken from CPSC 526 TUTORIAL by Nashd Safa (Extended and partially modified)
Adrian Crenshaw.  I run Irongeek.com  I have an interest in InfoSec education  I don’t know everything - I’m.
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
COEN 252 Computer Forensics
Network Security: Lab#4-2 Packet Sniffers J. H. Wang Dec. 2, 2013.
Packet Analysis Fluke Protocol Expert & Misc Applications Brian D. Sterck.
Packet Analysis Using Wireshark for Beginners 22AF
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
Introduction to Wireshark Making Sense of the Matrix
1 TAC2000/ LABORATORY 117 Analyzing SIP Call Flows Dr. Quincy Wu National Chiao Tung University
© 2010 Cisco Systems, Inc. All rights reserved. 1 CREATE Re-Tooling Exploring Protocols with Wireshark March 12, 2011 CREATE CATC and Ohlone College.
Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters, Logging, and Subnets: Module Objectives Create capture filters that control whether.
Packet Capture and Analysis: An Introduction to Wireshark 1.
Integrating and Troubleshooting Citrix Access Gateway.
CNIT 124: Advanced Ethical Hacking Ch 7: Capturing Traffic.
Sniffer, tcpdump, Ethereal, ntop
Network Analyzer :- Introduction to Wireshark. What is Wireshark ? Ethereal Formerly known as Ethereal GUINetwork Protocol Analyzer Wireshark is a GUI.
Networks Part 3: Packet Paths + Wireshark NYU-Poly: HSWP Instructor: Mandy Galante.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
1 Company Confidential Fluke Networks OptiView Wireless Network Analyzer Bringing the power of OptiView to Wireless LANS.
POSTECH 1/39 CSED702D: Internet Traffic Monitoring and Analysis James Won-Ki Hong Department of Computer Science and Engineering POSTECH, Korea
COMP2322 Lab 1 Introduction to Wireshark Weichao Li Jan. 22, 2016.
Dumps: Read’em and Weep Presented at Black Lodge Research
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
WIRESHARK Lab#3. Computer Network Monitoring  Port Scanning  Keystroke Monitoring  Packet sniffers  takes advantage of “friendly” nature of net. 
COMP2322 Lab 1 Introduction to Wireless LAN Weichao Li Apr. 8, 2016.
How to Use the Wireshark Protocol Analyzer Last Update Copyright Kenneth M. Chipps Ph.D. 1.
Network Analyzer :- Introduction to Ethereal Computer Networking (Graduate Class)
Packet Sniffing Hans Kokx
Troubleshooting Tools
How to Use the Wireshark Protocol Analyzer
Solving Real-World Problems with Wireshark
Determining Topology from a Capture File
CAP6135: Malware and Software Vulnerability Analysis Network Traffic Monitoring Using Wireshark Cliff Zou Spring 2016.
Lab 2: Packet Capture & Traffic Analysis with Wireshark
Intro to Ethical Hacking
TCP Tips, Tricks, and Traces
Real World Troubleshooting with Wireshark
COMP2322 Lab 1 Wireshark Steven Lee Jan. 25, 2017.
Advanced Penetration testing
Chapter 4 Data Link Layer Switching
Wireshark Lab#3.
Traffic Analysis with Ethereal
Due: a start of class Oct 26
Intro to Ethical Hacking
Intro to Ethical Hacking
Wireshark LAN Monitoring HaganFox.net/NetSec Originally presented at
Intro to Wireshark What is it? What does it do? Why do I need it?
Introduction to Packet Sniffing using Ethereal
Wireshark CSC8510 David Sivieri.
Network Analyzer :- Introduction to Wireshark
Wireshark(Ethereal).
TCP Protocol Analysis Access UMKC Home Page.
Network Analyzer :- Introduction to Wireshark
Presentation transcript:

EFFECTIVELY TEACHING WITH WIRESHARK LAURA CHAPPELL EFFECTIVELY TEACHING WITH WIRESHARK LAURA CHAPPELL CHAPPELLU.COM WIRESHARKTRAINING.COM ®

2 Wireshark Techniques Wireshark Functionality and Resources The “Golden Rules” of Wireshark Analysis Key Tasks Everyone Should Learn –Capturing Wired/Wireless Traffic –Custom Profiles –Top Capture Filters –Top Display Filters –Custom Coloring Rules –Finding Problems Using Graphs –Using the Wireshark Expert

SECTION 1: WIRESHARK FUNCTIONALITY OVERVIEW

4 Capturing Traffic Network Capture FiltersWinPcap – AirPcap - libpcap Capture Engine

5 Opening Trace Files Drive Wiretap Library

6 Processing Packets Capture Engine Wiretap Library Core Engine Dissectors – Plugins – Display FiltersGTK

7 Help? Problems? Websitewww.wireshark.org Wiki Pagewiki.wireshark.org FAQwww.wireshark.org/faq.html WinPcapwww.winpcap.org Mailing Listswww.wireshark.org/lists.html Bug Trackerbugs.wireshark.org/bugzilla Q&Aask.wireshark.org

8 General Analyst Resources - Tips – (me) – Protocol Numbers – the RFCs – videos/traces – lots of trace files ask.wireshark.org – got questions?

SECTION 2: THE “GOLDEN RULES” OF WIRESHARK ANALYSIS

10 Golden Rules The Golden Rules Capture as close to the complaining user/device as possible Know how to capture the packets before you need to (e.g., spanning vs. tapping and WLAN capture options) Use capture filters sparingly/display filters liberally Customize Wireshark (profiles, coloring rules, filters) Build a HOT trace file library The packets never lie – but they will not tell why something is happening

SECTION 3: THE KEY TASKS EVERYONE SHOULD MASTER

12 Let’s Go Live Now Capturing Wired/Wireless Traffic Using Profiles Hot Capture Filters Hot Display Filters Using Coloring Rules Finding Problems Using Graphs Using the Wireshark Expert

13 Wireless Traffic Capture You must have a promiscuous and monitor mode adapter Check out AirPcap Adapters (

14 WLAN OS/Driver Issues Display Filter Capture Filter Promiscuous Mode Monitor Mode (rfmon mode) Signal Promiscuous Mode = Monitor Mode Promiscuous Mode = Monitor Mode

Port Spanning or Mirroring Visibility Span port #3 to port #1 port #1 port #3

16 Full Duplex Links iTap GigaBit Copper Dual Port Aggregator 10/100BaseT Dual Port Aggregator Tap 10/100BaseT Port Aggregator Tap Visibility Server

17 Using Profiles Custom preferences, capture/display filters and coloring rules Sample: WLAN Profile

18 Capture Filters Network Capture Filters WinPcap – AirPcap - LibPcap Capture Engine

19 Hot Capture Filters host port 67 (TCP or UDP) tcp port 80 ether host 00:08:15:00:08:15 (my MAC) not ether host 00:08:15:00:08:15 (not me) wlan host 00:2A:4B:23:36:2A

20 Hot Display Filters ip.addr == /16 !ip.addr == /16 (don’t use !=) tcp.analysis.flags wlan.fc.type_subtype ==8 (beacons only) http.response.code > 399 (HTTP errors) tcp.options contains 01:01:01:01 (ASA issue) ftp.response.arg == "Login incorrect."

21 Using Coloring Rules Consider disabling Checksum Errors Consider disabling Checksum Errors

22 Finding Problems with Graphs IO Graph – click on dips Advanced IO Graph – count tcp.analysis.retransmissions, etc. TCP Time/Sequence Graph RTT Graph – client’s perspective Oh… and use Endpoint Statistics to determine top talkers

23 Graph Delays and Errors

24 Always Check the Expert

WRAP-UP