Download presentation
Presentation is loading. Please wait.
Published byAnastasia Flynn Modified over 8 years ago
2
COURSE OUTLINE 1 Introduction(History) Key functions Interface analysis 2 Traffic Analysis/OSI Review Protocol Filtering 3 IP and port filtering Wireshark and Linux firewall interaction Demonstration of detecting unauthorized traffic 4 Tshark command line interface overview Demonstrate how credentials can be stolen Network card Modes: Monitoring/Remote Capture
3
Why is Wireshark relevant ? Network security Prevention Performance Troubleshooting
4
Brief History(What was happening in the 80’s?) How did technicians troubleshoot networks ? ANY IDEAS ?
5
The Oscilloscope In the 1980’s to answer this question and thoroughly examine a network an oscilloscope was the main technology used.
6
What could the Oscilloscope do? An oscilloscope showed square-ish electrical pulses that bounced up and down observing the change of an electrical over time. Then the observed waveform could be analyzed. Technicians could determine the time and voltage values of a signal. Technicians could calculate the frequency of a signal. Technicians could observe the change of an electrical signal over time.
7
Packet Switched Networks
8
Packets instead of pulses With the growth of packet-switched networks. Packet analysers such as Tcp dump combined with clever low-level programming (pcap) meant you could see what was in each message going across the network.
9
Enter Gerald Combs
10
Ethereal/Wireshark In the late 1990s Gerald Combs a computer science graduate was working for a small internet service provider. He began writing Ethereal in 1998 which led to Riverbed Technology expanding the concept under Wireshark in 2010. Today Wireshark has won several industry awards and is today one of the best open source packet analyzers available today for UNIX and Windows.
11
What is Wireshark? Wireshark is a free and open source network protocol analyser(also known as a network sniffer) that enables users to interactively browse the data traffic on a computer network. 500,000 downloads a month. The IT industry has embraced Wireshark as the go-to tool for network troubleshooting, optimization and security.
12
Network Tools Ping, Tracert, Netstat, Arp They test end basic connectivity First “filling of the network behaviour ”
13
SNMP Tools Continuous monitoring and mapping Events and notifications Map systems.
14
Where is Wireshark used ? Network administrators use it to troubleshoot network problems Hunt down unauthorized Network traffic Troubleshoot slow network performance Confirm Firewall settings Determine whether a machine has malware IT Security becoming a huge asset in the workplace Knowledge of Wireshark is a huge plus in IT admin Jobs.
15
Where to Locate it? For Internet connectivity monitoring (Before or after the firewall?) For WAN monitoring (Connect laptop to the LAN switch, with port mirror to the monitored router. For server monitoring(Connect the laptop to the LAN switch, with port mirror to the monitored server.)
16
Welcome to the interface
17
WordPress wireshark01site.wordpress.com
18
During installation main sure WinPcap is installed. Remember from earlier slide. Pcap is the (API) for capturing network traffic.
20
Initial Screen
21
Organize your layout
22
OSI MODEL + Wireshark Interface
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.