Вы находитесь на странице: 1из 7

181081907

Pooja V. Patil
TY B. Tech IT [Batch D]

Experiment No.

Aim:​ Study of packet sniffer tools (Wireshark).

Wireshark:
● Wireshark, a network analysis tool formerly known as Ethereal, captures packets
in real time and display them in human-readable format. Wireshark includes
filters, color coding, and other features that let you dig deep into network traffic
and inspect individual packets.
● Wireshark is a free and open-source packet analyzer.
● It is used for network troubleshooting, analysis, software and communications
protocol development, and education.
● Wireshark is a data capturing program that "understands" the structure
(encapsulation) of different networking protocols.
● It can parse and display the fields, along with their meanings as specified by
different networking protocols. Wireshark uses pcap to capture packets, so it can
only capture packets on the types of networks that pcap supports.

What does Wireshark do?


● Wireshark intercepts traffic and converts that binary traffic into human-readable
format. This makes it easy to identify what traffic is crossing your network, how
much of it, how frequently, how much latency there is between certain hops, and
so forth.
● Given the large volume of traffic that crosses a typical business network,
Wireshark's tools to help you filter that traffic are what make it especially useful.
● Capture filters will collect only the types of traffic you're interested in, and display
filters will help you zoom in on the traffic you want to inspect.
● The network protocol analyzer provides search tools, including regular
expressions and colored highlighting, to make it easy to find what you're looking
for.

Capturing Packets:  
After downloading and installing Wireshark, you can launch it and double-click the name
of a network interface under Capture to start capturing packets on that interface. If you
want to capture traffic on your wireless network, click your wireless interface. You can
configure advanced features by clicking Capture > Options. 

Check the box of the interface you want to capture and press the Start button to start.
You can select multiple interfaces if you want to capture data from multiple sources
simultaneously. 

As soon as you click the interface’s name, you’ll see the packets start to appear in real
time. Wireshark captures each packet sent to or from your system. If you have
promiscuous mode enabled—it’s enabled by default—you’ll also see all the other
packets on the network instead of only packets addressed to your network adapter.  

Click the red “Stop” button near the top left corner of the window when you want to stop
capturing traffic. 
 

Inspecting Packets:

Click a packet to select it and you can dig down to view its details. 

 
The captured data interface contains three main sections:

the packet list pane, the packet details pane, and the packet bytes pane.

Packet List:

The packet list pane, located at the top of the window, shows all packets found in the
active capture file. Each packet has its own row and corresponding number assigned to
it, along with each of these data points.

● Time: The timestamp of when the packet was captured is displayed in this
column. The default format is the number of seconds or partial seconds since this
specific capture file was first created. To modify this format to something that
may be a bit more useful, such as the actual time of day, select the Time Display
Format o ​ ption from Wireshark's ​View menu located at the top of the main
interface.
● Source: This column contains the address (IP or other) where the packet
originated.
● Destination:​ This column contains the address that the packet is being sent to.
● Protocol: The packet's protocol name, such as TCP, can be found in this
column.
● Length:​ The packet length, in bytes, is displayed in this column.
● Info: Additional details about the packet are presented here. The contents of this
column can vary greatly depending on packet contents.

When a packet is selected in the top pane, you may notice one or more symbols appear
in the first column. Open or closed brackets and a straight horizontal line indicate
whether a packet or group of packets are all part of the same back-and-forth
conversation on the network. A broken horizontal line signifies that a packet is not part
of said conversation.

Packet Details

The details pane, found in the middle, presents the protocols and protocol fields of the
selected packet in a collapsible format. In addition to expanding each selection, you can
apply individual Wireshark filters based on specific details and follow streams of data
based on protocol type via the details context menu, which is accessible by
right-clicking your mouse on the desired item in this pane.

Packet Bytes

At the bottom is the packet bytes pane, which displays the raw data of the selected
packet in a hexadecimal view. This hex dump contains 16 hexadecimal bytes and 16
ASCII bytes alongside the data offset.

Selecting a specific portion of this data automatically highlights its corresponding


section in the packet details pane and vice versa. Any bytes that cannot be printed are
instead represented by a period.

You can choose to show this data in bit format as opposed to hexadecimal by
right-clicking anywhere within the pane and selecting the appropriate option from the
context menu.

Advantages of using Wireshark:

● Can see detailed information about packets within a network


● Wireshark provides an immense amount of data. If the data is being sent, you will
be able to track it.
● Will flag some notable information if you don't know what you are looking for.
● Can analyze VoIP data as well.
Disadvantages of using Wireshark:

● Notifications will not make it evident if there is an intrusion in the network


● Can only gather information from the network, cannot send.
● It can be difficult to parse and filter data without working with Wireshark for a
while. The amount of data can be overwhelming for first time users.

Conclusion: Wireshark (a packet analyzer), with its advantages and disadvantages


was fully understood while performing the experiment.

Вам также может понравиться