welcome to this lesson, where I explain the basics of the software called: Wireshark. The Wireshark is a open-source sniffer or packet analyzer, that allows you to capture the packets pass on network but without sending any packet from the source. This method is called: promiscuous mode. In fact Wireshark is focused own on this concept that is: capture packets leaving any trace. The Wireshark can capture all things that pass on network (sometimes in fact you can probably capture packet from switch flooding, then from the vulnerability of switch). So, now that we clear this concept, launch Wireshark! The first time you run it, you find in front of this window:
This window is the main window where we can choose the interfaces to be analyzed. In figure I have nflog, nfqueue, dbus-system, enp9s0 (that is: ethernet card), any. For analyze the network packets we must click to: enp9s0 interface. Once this is done we see a window similar to this:
Welcome (tatan!) in the Wireshark capture window, are you happy? So, begin to know the windows and single functions. The Wireshark is powerful software of network analysis traffic and he looks to the bone a single network packet. But one thing at a time, start by the main toolbar, here we can find the options or choices that allows analyze the packet or save the captured packets and also other. The second toolbar, is dedicated to other function that we'll see hereafter. The filter option is enter some filters during the analysis. For example: if I want reduce the protocols and see only TCP packets on the packet list pane I enter in the text box the TCP, and as if by magic voilà the TCP packets are shown! But as mentioned earlier: one thing at a time. Now the next step is study the 'Packet List Pane' and 'Detail List Pane'.
- PACKET LIST PANE
Here this window has seven columns that each has its own specific role. Let's see better:
No. The number of the packet in the capture file. This number don't change because is a sequence of packet captured in that moment.
Time: Time is timestamp of the packet.
Source: The address where this packet is coming from.
Destination: The address where this packet is going to.
Protocol: The protocol name in a short (perhaps abbreviated) version.
Info: Additional information about the packet content.
Bye,
Tefnut.