Chapter 1: The World of Network Analysis .................................................................. 1
Chapter 1: The World of Network Analysis .................................................................. 1
Table of Contents
Foreword by Gerald Combs, Creator of Wireshark .........................................................xxvii
Preface ......................................................................................................................... xxix
About This Book .............................................................................................................. xxxi
Who is This Book For? ................................................................................................ xxxi
How is This Book Organized? ..................................................................................... xxxi
How Can I Find Something Fast in This Book? ....................................................... xxxiii
What Do Those Icons Mean? .................................................................................... xxxiii
Trace Files Used in This Book (.pcapng Format) ..................................................... xxxiii
What’s Online at www.wiresharkbook.com? ............................................................. xxxiv
Which Version of Wireshark Did You Use to Write This Book? .............................. xxxiv
Which WCNA Exam Version Does This Book Cover? ............................................ xxxiv
How Can I Submit Comments/Change Requests for This Book?............................... xxxv
Wireshark Certified Network Analyst™ Program Overview .......................................... xxxv
Why Should I Pursue the Wireshark CNA Certification? ........................................... xxxv
How Do I Earn the Wireshark CNA Certified Status?................................................ xxxv
Wireshark CNA Exam Objectives ............................................................................. xxxvi
Wireshark University™ and Wireshark University™ Training Partners ....................... xxxvi
Schedule Customized Onsite/Web-Based Training ........................................................ xxxvi
Chapter 1: The World of Network Analysis .................................................................. 1
Define Network Analysis ...................................................................................................... 2
Follow an Analysis Example ................................................................................................. 3
Walk-Through of a Troubleshooting Session ........................................................................ 6
Walk-Through of a Typical Security Scenario (aka Network Forensics) .............................. 8
Troubleshooting Tasks for the Network Analyst .............................................................. 9
Security Tasks for the Network Analyst ......................................................................... 10
Optimization Tasks for the Network Analyst ................................................................. 10
Application Analysis Tasks for the Network Analyst ..................................................... 10
Understand Security Issues Related to Network Analysis ................................................... 11
Define Policies Regarding Network Analysis................................................................. 11
Files Containing Network Traffic Should be Secured .................................................... 11
Protect Your Network against Unwanted “Sniffers” ...................................................... 11
Be Aware of Legal Issues of Listening to Network Traffic ............................................ 12
Overcome the “Needle in the Haystack Issue” .................................................................... 13
Review a Checklist of Analysis Tasks................................................................................. 14
Understand Network Traffic Flows ..................................................................................... 15
Switching Overview........................................................................................................ 15
Routing Overview ........................................................................................................... 16
Proxy, Firewall and NAT/PAT Overview ...................................................................... 17
Other Technologies that Affect Packets.......................................................................... 18
Warnings about “Smarter” Infrastructure Devices.......................................................... 19
Launch an Analysis Session ................................................................................................ 19
Chapter 24: Analyze File Transfer Protocol (FTP) Traffic .......................................... 581
The Purpose of FTP ........................................................................................................... 582
Analyze Normal FTP Communications............................................................................. 583
Analyze Passive Mode Connections ............................................................................. 586
Analyze Active Mode Connections .............................................................................. 588
Analyze FTP Problems ...................................................................................................... 589
Dissect the FTP Packet Structure ...................................................................................... 591
Filter on FTP Traffic ......................................................................................................... 594
Reassemble FTP Traffic .................................................................................................... 595
Case Study: Secret FTP Communications ......................................................................... 596
Summary ........................................................................................................................... 598
Practice What You’ve Learned.......................................................................................... 598
Review Questions .............................................................................................................. 600
Answers to Review Questions ........................................................................................... 601
Chapter 25: Analyze Email Traffic .......................................................................... 603
The Purpose of POP .......................................................................................................... 604
Analyze Normal POP Communications ............................................................................ 605
Analyze POP Problems ..................................................................................................... 606
Dissect the POP Packet Structure ...................................................................................... 608
Filter on POP Traffic ......................................................................................................... 610
The Purpose of SMTP ....................................................................................................... 611
Analyze Normal SMTP Communications ......................................................................... 612
Analyze SMTP Problems .................................................................................................. 613
Dissect the SMTP Packet Structure ................................................................................... 614
Filter on SMTP Traffic ...................................................................................................... 616
Case Study: SMTP Problem—Scan2Email Job ................................................................ 617
Summary ........................................................................................................................... 618
Practice What You’ve Learned.......................................................................................... 618
Review Questions .............................................................................................................. 619
Answers to Review Questions ........................................................................................... 620
Chapter 26: Introduction to 802.11 (WLAN) Analysis ............................................. 621
Analyze WLAN Traffic ..................................................................................................... 622
Analyze Signal Strength and Interference ......................................................................... 623
Capture WLAN Traffic ..................................................................................................... 626
Compare Monitor Mode vs. Promiscuous Mode .......................................................... 626
Select the Wireless Interface ......................................................................................... 627
Set Up WLAN Decryption............................................................................................ 628
Select to Prepend Radiotap or PPI Headers .................................................................. 631
Compare Signal Strength and Signal-to-Noise Ratios .................................................. 635
Understand 802.11 Traffic Basics ..................................................................................... 636
Data Frames .................................................................................................................. 636
Management Frames ..................................................................................................... 636
Control Frames ............................................................................................................. 638
Analyze Normal 802.11 Communications ........................................................................ 638
Dissect the 802.11 Frame Structure ................................................................................... 640
Chapter 29: Find the Top Causes of Performance Problems ................................... 697
Troubleshoot Performance Problems ................................................................................ 698
Identify High Latency Times ............................................................................................. 699
Filter on Arrival Times ................................................................................................. 700
Filter on the Delta Times .............................................................................................. 701
Filter on the Time since Reference or First Packet ....................................................... 701
Filter on TCP Conversation Times ............................................................................... 702
Point to Slow Processing Times ........................................................................................ 702
Practice Working with Time Issues ................................................................................... 703
Find the Location of Packet Loss ...................................................................................... 706
Watch Signs of Misconfigurations .................................................................................... 708
Analyze Traffic Redirections............................................................................................. 709
Watch for Small Payload Sizes ......................................................................................... 710
Look for Congestion .......................................................................................................... 711
Identify Application Faults ................................................................................................ 711
Note Any Name Resolution Faults .................................................................................... 712
An Important Note about Analyzing Performance Problems ............................................ 713
Case Study: One-Way Problems ....................................................................................... 714
Case Study: The Perfect Storm of Network Problems ...................................................... 715
Summary ........................................................................................................................... 719
Practice What You’ve Learned.......................................................................................... 719
Review Questions .............................................................................................................. 721
Answers to Review Questions ........................................................................................... 722
Chapter 30: Network Forensics Overview ............................................................... 723
Compare Host vs. Network Forensics ............................................................................... 724
Gather Evidence ................................................................................................................ 724
Avoid Detection ................................................................................................................ 725
Handle Evidence Properly ................................................................................................. 728
Recognize Unusual Traffic Patterns .................................................................................. 729
Color Unusual Traffic Patterns .......................................................................................... 730
Check Out Complementary Forensic Tools ...................................................................... 731
Case Study: SSL/TLS Vulnerability Studied .................................................................... 732
Summary ........................................................................................................................... 734
Practice What You’ve Learned.......................................................................................... 734
Review Questions .............................................................................................................. 736
Answers to Review Questions ........................................................................................... 737
Chapter 31: Detect Scanning and Discovery Processes .......................................... 739
The Purpose of Discovery and Reconnaissance Processes ................................................ 740
Detect ARP Scans (aka ARP Sweeps)............................................................................... 740
Detect ICMP Ping Sweeps ................................................................................................ 742
Detect Various Types of TCP Port Scans .......................................................................... 743
TCP Half-Open Scan (aka “Stealth Scan”) ................................................................... 744
TCP Full Connect Scan ................................................................................................. 746
Null Scans ..................................................................................................................... 747
Xmas Scan .................................................................................................................... 748