We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6
Wireshark Introduction
Computer Network lab
By: p. Aryan nageswararao Roll No:21CSE1024 Aim: To understand and implement the basic concepts of Wireshark software.
Theory: Wireshark is a free and open-source packet analyzer.
It is used for network troubleshooting, analysis, software and communications protocol development, and education. Originally named Ethereal, the project was renamed Wireshark in May 2006 due to trademark issues.
Wireshark is cross-platform, using the Qt widget toolkit in
current releases to implement its user interface, and using “pcap” to capture packets; it runs on Linux, macOS, BSD, Solaris, some other Unix-like operating systems, and Microsoft Windows. There is also a terminal-based (non-GUI) version called “TShark”. Wireshark, and the other programs distributed with it such as “TShark”, are free software, released under the terms of the GNU General Public License version 2 or any later version. Wireshark is very similar to tcpdump, but has a graphical front- end and integrated sorting and filtering options. Wireshark lets the user put network interface controllers into promiscuous mode (if supported by the network interface controller), so they can see all the traffic visible on that interface including unicast traffic not sent to that network interface controller's MAC address. However, when capturing with a packet analyzer in promiscuous mode on a port on a network switch, not all traffic through the switch is necessarily sent to the port where the capture is done, so capturing in promiscuous mode is not necessarily sufficient to see all network traffic. Port mirroring or various network taps extend capture to any point on the network. Simple passive taps are extremely resistant to tampering [citation needed]. On Linux, BSD, and macOS, with libpcap 1.0.0 or later, Wireshark 1.4 and later can also put wireless network interface controllers into monitor mode. If a remote machine captures packets and sends the captured packets to a machine running Wireshark using the TZSP protocol or the protocol used by OmniPeek, Wireshark dissects those packets, so it can analyze packets captured on a remote machine at the time that they are captured.
Capturing packets using wire shark:
First, we need to properly install Wireshark software then open the software and select the WIFI tab which will take us to a window that looks like the image below. Then we open a website like http://gaia.cs.umass.edu/wireshark-labs/INTRO-wireshark- file1.html on any browser while the Wireshark is running. Then we pause the Wireshark and save the file as a .pcap file and open the file. The we will see something like the image below. The at the apply a display filter search box we will search for “http” keyword in all small letters then we will see something like this.
Here need to select the “GET /wireshark-labs/…” and “OK”
file and print then using the print option in the file menu the we will get two pdfs. The info of the “GET” pdf is: The info of the ok pdf is:
Then we can click on any of the files then it will open a file like this and in this we get more info about each of the following elements by clicking down arrow:
Now we have successfully observed an packet that was sent
to our system when we visited the a link. Observation: I have observed the following different protocols while running wireshark TCP, UDP, HTTP, DNS, ARP, IMAP, TLSV1. The time difference between “get” http file and “ok” http file is “0.36 seconds” The source Ip for “GET request” is “”and the destination Ip is “128.119.245.12” but the source Ip for “OK ack” is “128.119.245.12”and the destination Ip is “192.168.219.12”. Conclusion: I have learnt and observed how the wireshark software works and how to use it for packet sniffing. I have learn and observed how an http request is sent and how and ack is sent and learnt about all the different components of the Ip header and the contents of the http packet.