Network Monitoring Analysis Using Wireshark Tools (Term Project)
Network Monitoring Analysis Using Wireshark Tools (Term Project)
Submitted By:
Md. Anisur Rahman
MSCSE, CSE Department
United International University.
Submitted To:
Mohammad Mamum Elahi ( MME)
Assistant Professor, CSE,
United International University.
Submission Date:
05/10/2020
This project is included in Cyber security Standard And Government and
Management.
(CSE 6195).
Abstract
Wireshark unique is also what makes it kind of problematic. Since Wireshark is
totally open source, there’s no solid support structure. This means no tech support,
no 1-800 numbers to call, no representative for you to speak with for immediate
assistance. This might not be an issue for the industrious home user who would
prefer to solve their own problems, but employees in a large IT enterprise might
not necessarily have the time to go on a fact-finding mission. There can also be
legal issues around using open-source software for many companies.
Users should be aware that with the great freedom allowed by open-source
softwares comes great responsibility. Still, it’s not a good enough reason to write
Wireshark off entirely. It’s important to consider whether this tool can offer your
network some benefits.
Network Monitoring:
In today's world, the term network monitoring is widespread throughout the IT
industry. Network monitoring is a critical IT process where all networking
components like routers, switches, firewalls, servers, and VMs are monitored for
fault and performance and evaluated continuously to maintain and optimize their
availability. One important aspect of network monitoring is that it should be
proactive. Finding performance issues and bottlenecks proactively helps in
identifying issues at the initial stage. Efficient proactive monitoring can prevent
network downtime or failures.
The OSI Model we just looked at is just a reference/logical model. It was designed
to describe the functions of the communication system by dividing the
communication procedure into smaller and simpler components. But when we talk
about the TCP/IP model, it was designed and developed by Department of Defense
(DoD) in 1960s and is based on standard protocols. It stands for Transmission
Control Protocol/Internet Protocol. The TCP/IP model is a concise version of the
OSI model. It contains four layers, unlike seven layers in the OSI model. The
layers are:
1. Process/Application Layer
2. Host-to-Host/Transport Layer
3. Internet Layer
4. Network Access/Link Layer
The diagrammatic comparison of the TCP/IP and OSI model is as follows:
IPV4 Header:
Whenever the application layer needs to circulate the flow of huge traffic or
data, it sends it to the transport layer in which the TCP performs all the end
to end communication between networks.
TCP initially set-up a three-way handshake process between the source and
destination and then it splits the data into small chunks known as segments,
and includes a header into every segment and then forwards it to Internet
layer.
Three-Way Handshake:
It is the process deployed by TCP to establish a connection between the source and
destination host in the network. It is used to perform reliable data transmission. It
deploys SYN and ACK flags of code bits of the TCP header to perform the task. It
provisions reliable communication by performing positive acknowledgment with
re-transmission and is also known as PAR. The system using PAR will re-transmit
the data segment until it receives the ACK. Whenever the receiver discards the
data, the sender has to re-transmit the data until it receives the positive ACK from
the receiver.
There are 3 steps of three-way handshaking, which are as follows:
1. Step 1: The source host A wants to establish a connection with the
destination host B, it transmits a segment with the SYN and sequence
number, which denotes that the host A wants to initiate a session of
communication with Host B and with what sequence number it is defined in
that segment.
2. Step 2: The host B responds to the request of host A with SYN and ACK set
in the signal bit. ACK denotes the response of the received segment and
SYN denotes the sequence number.
3. Step 3: The host A acknowledges the response from the Host B and both
establish a secure connection between them and then begin data transmission
over it.
As described in the below figure, in the three-way handshake process, firstly the
source host sends a TCP header to the destination host by setting the SYN flag. In
response, it gets back the SYN and acknowledgment flag set. The destination host
practices the received sequence number plus 1 as the acknowledgment number.
1. Source Port: Source Port is 2 Byte long field used to identify port number of
source.
2. Destination Port: It is 2 Byte long fields, used to identify the port of destined
packet.
3. Length: Length is the length of UDP including header and the data. It is 16-
bits field.
4. Checksum: Checksum is 2 Bytes long field. It is the 16-bit one’s complement
of the one’s complement sum of the UDP header, pseudo header of
information from the IP header and the data, padded with zero octets at the
end (if necessary) to make a multiple of two octets.
Introduction to Wireshark:
Wireshark is unique because it’s totally free and open source, making it not only
one of the best packet analyzers out there, but also one of the most accessible. The
free version you download of Wireshark is the full version—no demo versions
with reduced functionality here.
Wireshark used for it’s designed for anyone who needs to monitor their network
activity, from home users to enterprise IT teams. A lot of monitoring software falls
short when it comes to scalability, but the folks over at Wireshark have managed to
come up with a program that doesn’t need a whole bunch of extra add-ons to get
the bare minimum of functionality. In contrast, the additional tools I recommend
below make a good thing better.
Ping - 8.8.8.8 in windows command line wirh Wireshark:
On a windows system if you initiate a ping to 8.8.8.8 with a length value greater
than 68 (e.g. 69), Microsoft's ping will indicate that the ping is successful, but
Wireshark's analysis reports "no response found!".
C:\>ping -8.8.8.8
But there's a subtle addition to the Microsoft's ping Reply report. Note that it
indicates "bytes=68 (sent 69)".
Wireshark Capture Packets Analyze:
Once you’ve finished capturing packets, it’s time to look at them. Wireshark
divides the view into three panes: packet list, packet details, and packet bytes.
The packet list section, at the top of the window, lists all the packets from the
capture file. You can browse through each of the following data points:
For the visual learners out there, you can use Wireshark to view network traffic in
an IO graph. Just click on the STATISTICS menu and choose IO GRAPHS. You
can set up the graph with whatever settings you want depending on the data you
want to display. Only one graph is automatically enabled, so if you want to make
more, you have to click on them manually. To add a display filter to the graph,
click the filter icon on the graph you want to work with. Finally, use the style
column to change what kind of graph you use to display your packet data—line,
FBar, dot, or Impulse.
Real PCAP Files Packet Analysis using Wireshark:
Problems Scenario:
Problems Scenario:
Version: 4
Frame 26: 60 bytes on wire (480 bits), 60 bytes captured (480 bits) on interface
unknown, id 0.
Frame Length: 60 bytes (480 bits)
Capture Length: 60 bytes (480 bits)
Version: version number 4.
Header length: 20 bytes.
Total length: 40
Identification: 0x00000616 (1558).
Flags: 0x4000, Don't fragment.
Fragment offset: 0
Time to leave: 111
Protocol: TCP (6)
Source Port: 80
Destination Port: 2580
Header Checksum: 0x0b31 [validation disabled]
Source IP address: 216.23.168.114
Destination IP address: 24.4.97.25
Problems Scenario:
Window size value: 64166
Window size scaling factor: [2 (no window scaling used)]
Version: 4
Frame 16: 1423 bytes on wire (11384 bits), 1423 bytes captured (11384 bits) on
interface unknown, id 0
Interface name: unknown
Frame Length: 1423 bytes (11384 bits)
Capture Length: 1423 bytes (11384 bits)
Differentiated Services Field: 0x00 (DSCP: CS0, ECN: Not-ECT)
Flags: 0x4000, Don't fragment
Fragment offset: 0
Total Length: 1409
Time to live: 128
Header checksum: 0x72e2 [validation disabled]
Protocol: HTTP
Source Port: 2580
Destination Port: 80
Acknowledgment number (raw): 3045572448
Source: 24.4.97.251
Destination: 216.23.168.114
Problems Scenario:
Content-Type: application/x-www-form-urlencoded\r\n
Host: www.discoverconsoles.com\r\n
Connection: Keep-Alive\r\n
HTML Form URL Encoded: application/x-www-form-urlencoded
Form item: "validate" = "[type Function]"
Form item: "formcheck" = "[type Function]"
Form item: "mailform" = "flashmail.asp"
Form item: "confirm" = "thank you. We will get back to you soon !"
Form item: "action" = "send"
Form item: "error1" = "please enter your first name"
Form item: "error2" = "please enter your last name"
Form item: "error3" = "please enter a valid email adress"
Form item: "error4" = "please enter correct phone number"
Form item: "error5" = "please enter a subject"
Form item: "error6" = "Your comments please!"
Form item: "txtFirst_Name" = "Laura"
Form item: "txtLast_Name" = "Chappell"
Form item: "txtEmail" = [email protected]
Form item: "txtSubject" = "FTP Background Traffic?"
Form item: "txtComments" = "It appears that your software is loaded on one of
our lab Media Center Edition HP boxes. It makes an FTP connection in the
background (which cannot locate the file it is looking for). What is it trying to
update.
Form item: "txtPhone_No" = "408-378-7841"
Questions: 1
Answer RRs: 0
Authority RRs: 0
Additional RRs: 0
Queries: www.nostarch.com: type A, class IN
[Response In: 2]
Conclusion:
The purpose of this project is to demonstrate how Wireshark is applied in network
Monitoring diagnosis and can be used to discover network Traffic such as port
scanning, covert FTP and IRC channels, ICMP-based problems, the case studies in
this Project illustrate the idea of using Wireshark to identify Network Traffic
Analysis.