Wireshark (Intro Tutorial)

What is Wireshark?

Wireshark is an open-source network protocol analysis software program started by Gerald Combs in 1998. A global organization of network specialists and software developers support Wireshark and continue to make updates for new network technologies and encryption methods.

Wireshark is absolutely safe to use. Government agencies, corporations, non-profits, and educational institutions use Wireshark for troubleshooting and teaching purposes. There isn’t a better way to learn networking than to look at the traffic under the Wireshark microscope.

There are questions about the legality of Wireshark since it is a powerful packet sniffer. The Light side of the Force says that you should only use Wireshark on networks where you have permission to inspect network packets. Using Wireshark to look at packets without permission is a path to the Dark Side.

How does Wireshark work?

Wireshark is a packet sniffer and analysis tool. It captures network traffic on the local network and stores that data for offline analysis. Wireshark captures network traffic from Ethernet, Bluetooth, Wireless (IEEE.802.11), Token Ring, Frame Relay connections, and more.

Wireshark allows you to filter the log either before the capture starts or during analysis, so you can narrow down and zero into what you are looking for in the network trace. For example, you can set a filter to see TCP traffic between two IP addresses. You can set it only to show you the packets sent from one computer. The filters in Wireshark are one of the primary reasons it became the standard tool for packet analysis.

Video Tutorials (Courtesy of Hackersploit)

The following videos from Hackersploit will give you an idea of what Wireshark is and how to use it to analyze packet data:

In the first video, Wireshark  is introduced. How it can be used by defenders and security consultants for network traffic analysis is outlined.

In this second video, the process of installing and configuring Wireshark for network traffic analysis is covered.

In this final video, the process of using display & capture filters with Wireshark in order to filter through and identify malicious network traffic is covered.

error: Content is protected !!
Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?