Forensic Lab Manual
Forensic Lab Manual
What is Wireshark?
Wireshark is an open-source packet analyzer, which is used for education, analysis,
software development, communication protocol development, and network
troubleshooting.
It is used to track the packets so that each one is filtered to meet our specific needs. It
is commonly called a sniffer, network protocol analyzer, and network analyzer. It is also
used by network security engineers to examine security problems.
○ Select the Windows installer according to your system configuration, either 32-bt
or 64-bit. Save the program and close the browser.
○ Now, open the software, and follow the install instruction by accepting the
license.
On the network and Internet settings option, we can check the interface connected to
our computer.
If you are Linux users, then you will find Wireshark in its package repositories.
By selecting the current interface, we can get the traffic traversing through that
interface. The version used here is 3.0.3. This version will open as:
The Wireshark software window is shown above, and all the processes on the network
are carried within this screen only.
The options given on the list are the Interface list options. The number of interface
options will be present. Selection of any option will determine all the traffic. For
example, from the above fig. select the Wi-Fi option. After this, a new window opens up,
which will show all the current traffic on the network. Below is the image which tells us
about the live capture of packets and our Wireshark will look like:
The above arrow shows the packet content written in hexadecimal or the ASCII format.
And the information above the packet content, are the details of the packet header.
It will continue listening to all the data packets, and you will get much data. If you want
to see a particular data, then you can click on the red button. The traffic will be
stationary, and you can note the parameters like time, source, destination, the protocol
being used, length, and the Info. To view in-depth detail, you can click on that particular
address; a lot of the information will be displayed below that.
There will be detailed information on HTTP packets, TCP packets, etc. The red button is
shown below:
○ First part contains a menu bar and the options displayed below it. This part is at
the top of the window. File and the capture menus options are commonly used in
Wireshark. The capture menu allows to start the capturing process. And the File
menu is used to open and save a capture file.
○ The second part is the packet listing window. It determines the packet flow or the
captured packets in the traffic. It includes the packet number, time, source,
destination, protocol, length, and info. We can sort the packet list by clicking on
the column name.
○ Next comes the packet header- detailed window. It contains detailed information
about the components of the packets. The protocol info can also be expanded or
minimized according to the information required.
○ The bottom window called the packet contents window, which displays the
content in ASCII and hexadecimal format.
○ At last, is the filter field which is at the top of the display. The captured packets
on the screen can be filtered based on any component according to your
requirements. For example, if we want to see only the packets with the HTTP
protocol, we can apply filters to that option. All the packets with HTTP as the
protocol will only be displayed on the screen, shown below:
You can also select the connection to which your computer is connected. For example,
in this PC, we have chosen the current network, i.e., the ETHERNET.
There is a filter block below the menu bar, from where a large amount of data can be
filtered. For example, if we apply a filter for HTTP, only the interfaces with the HTTP will
be listed.
If you want to filter according to the source, right-click on the source you want to filter
and select 'Apply as Filter' and choose '...and filter.'
Steps for the permanent colorization are: click on the 'View' option on the menu bar and
select 'Coloring Rules.' The table will appear like the image shown below:
For the network administrator job, advanced knowledge of Wireshark is considered as
the requirements. So, it is essential to understand the concepts of the software. It
contains these 20 default coloring rules which can be added or removed according to
the requirements.
Select the option 'View' and then choose 'Colorize Packet List,' which is used to toggle
the color on and off.
Apply the filter by the name 'http.' After the filter is applied, the screen will look as:
Open the browser. In this example, we have opened the 'Internet Explorer.' You can
choose any browser.
As soon as we open the browser, and type any address of the website, the traffic will
start showing, and exchange of the packets will also start. The image for this is shown
below:
The above explained process is called packet sniffing.
It is the process used to know the passwords and username for the particular website.
Let's take an example of gmail.com. Below are the steps:
○ Open the Wireshark and select the suitable interface.
○ Open the browser and enter the web address. Here, we have entered gmail.com,
which is highly secured. Enter your email address and the password. The image
is shown below:
○ Now, go to the Wireshark and on the filters block, enter 'frame contains
gmail.com.' Then you can see some traffic.
○ Right-click on the particular network and select 'Follow', and then 'TCP Stream.'
You can see that all the data is secured in the encrypted form.
Next, click on the "File" pull down menu and go to the "Capture Memory"
selection.
It will open a window like that below. You will have to select where to store
your memory dump, what to call the file, whether you want to include the
page file (virtual memory), and whether you want to create an AD1 file
(AccessData's proprietary data type).
In my case, I created a directory called "memory dumps", named the file
memdump.mem
QuickCrypto: Steganography
Digital Forensics With Autopsy
What is Autopsy?
Q16. A popular IRC (Internet Relay Chat) program called MIRC was
installed. What are the userid, username, email and nickname used
when the user was online in a chat channel?
Soln. user=Mini Me, email=none@of.ya, nick=Mr, anick=mrevilrulez
We can find that at C:\Program Files\mIRC\mirc.ini
Q17. Ethereal, a popular “sniffing” program that can be used to
intercept wired and wireless internet packets was also found to be
installed. When TCP packets are collected and re-assembled, the
default save directory is that users /My Documents directory. What is
the name of the file that contains the intercepted data?
Soln. File name is ‘Interception’
As hinted we need to go to through My Documents which in this case would be
Documents and Setting/Mr.Evil
Q18. What type of wireless computer was the victim (person who had
his internet surfing recorded) using?
Soln: Internet Explorer 4 on Windows CE
We find this in Interception file.