Practical 17
Practical 17
Aim: To study Wireshark packet sniffing tool and understand it’s features.
Packet sniffing means intercepting data packets as they pass through a network, just like looking
inside envelopes in the mail. Experts use tools like Wireshark and tcpdump to track, troubleshoot,
or secure networks. The packet analyzer Wireshark, or just Shark for short, functions as a
magnifying glass; it captures and organizes the packets so you can gyrate over them looking for
bugs in order to squash those wicked computer programs. tcpdump is even faster than sharks at
grabbing data off of lines that run into walls. It doesn't have an interface but In general, packet
sniffing tools offer close monitoring of network data flow and protect networks.
Primary Terminologies
1. Packet
A packet is like a courier carrying data in two forms actual information being sent and very
important delivery instructions. It contains the soul of its message and is something like a return
address on an envelope. Just as a postal service ensures that the content of a letter and its address
remain separate for better processing and onward routing, dividing data from instructions
guarantees efficient delivery across networks.
2. Packet sniffing
Packet sniffing is a sort of digital investigator among computer networks. It can listen in on
conversations flowing across the network like a surveillance camera. It catches and records data
packets, giving a glimpse into what they contain to network managers and security experts. This
tool makes it easier to detect anomalies, fix network problems, and configure security
vulnerabilities. But it should remain subject to legal and ethical constraints, so as not to violate
the privacy rights of individuals or take data without authority.
3. Wireshark
Wireshark becomes the wizard's crystal ball, a way to examine in depth how computer networks
actually work. It decodes network protocols, capturing live data streams and translating them into
human-readable formats for troubleshooting and analysis. It offers a closer look at network
operations, like x-ray glasses for the digital world. But it should be used in a responsible, legal
manner; otherwise, the result could be uncontrolled data interception which infringes on
individuals 'privacy rights.
4. Tcpdump
Tcpdump is a digital detective inside computer systems, capturing and presenting real-time data
traffic in text commands. It is similar to observing traffic at an intersection in the sense that it
intercepts and displays data packets which are human-readable, making network problems easy to
identify. Although it does not have a graphical interface like Wireshark, its efficiency and speed
combined with the fact that is runs on Unix-based systems has made Tcpdump popular among
seasoned network professionals at least those who already know their way around transceivers.
Step-by-Step Process
Using Wireshark:
1. Download and Install Wireshark:
∙ Go to the Wireshark website to download the version that is compatible with your operating
system.
∙ Adhere to the website's installation instructions.
2. Begin Packet Capturing:
∙ Open Wireshark and choose the network interface from which to begin collecting packets.
∙ The display filter in Wireshark. The display filter in Wireshark's default configuration is a bar
that sits right above the column display. Here is where we enter expressions to narrow down
what we can see in a pcap file, be it Ethernet frames, IP packets, or TCP segments.
∙ There are several local interfaces available; please choose one.
Wireshark is a widely-used, open-source network protocol analyzer that allows users to capture
and inspect the data packets traveling over a network in real-time. It provides detailed visibility
into the network's traffic, allowing network administrators, security professionals, and developers
to troubleshoot issues, analyze performance, and detect potential security vulnerabilities.
1. Packet Capture: Wireshark captures data packets from a network interface, providing a
detailed view of each packet's contents, including headers, protocols, and payloads.
2. Protocol Analysis: It supports a wide range of network protocols, allowing users to
analyze the behavior of protocols such as TCP, UDP, HTTP, DNS, and more, to
understand how data flows through the network.
3. Filtering and Search: Wireshark includes powerful filtering capabilities that enable users
to focus on specific types of traffic or protocol communications. Filters can be applied to
narrow down the analysis to particular IP addresses, ports, or packet types.
4. Real-Time Monitoring: Wireshark offers real-time packet analysis, enabling users to
observe live network traffic and identify issues such as bottlenecks, high latency, or
abnormal traffic patterns.
5. Exporting Data: Captured packets can be saved and exported in various formats for later
analysis, making it easy to share findings or document network behavior.
Wireshark is primarily used for network analysis and troubleshooting. It allows users to capture
and examine network traffic in detail, providing insights into various aspects of network
performance, security, and functionality. Some of the key uses of Wireshark include:
Wireshark is a robust network protocol analyzer with a variety of features designed to capture,
analyze, and troubleshoot network traffic. Its key features include:
1. Packet Capture: Wireshark can capture live data packets from a network interface,
providing a real-time view of network activity.
2. Protocol Analysis: It supports hundreds of protocols and can decode traffic for detailed
examination. This includes common protocols like TCP, UDP, HTTP, DNS, and
specialized ones.
3. Filtering and Search: Wireshark offers powerful display and capture filters, enabling
users to focus on specific traffic based on criteria such as IP addresses, protocols, or ports.
4. Packet Inspection: Each packet captured can be analyzed in detail, including its headers,
payloads, and protocol-specific details, allowing for in-depth troubleshooting.
5. Real-Time Monitoring: Users can monitor network traffic live, which helps detect
problems such as latency, packet loss, or unusual traffic patterns as they occur.
6. Graphical Visualization: Wireshark provides visual tools like flow graphs and I/O
graphs to help interpret traffic patterns, detect anomalies, and identify bottlenecks.
7. Export and Save: Captured data can be saved in various formats (e.g., .pcap) for further
analysis or reporting and can be shared with team members for collaborative
troubleshooting.
8. Cross-Platform Support: Wireshark is available on multiple platforms, including
Windows, macOS, and Linux, making it accessible for various users.
9. Extensive Customization: It allows for customization through filters, coloring rules, and
plugins to adapt to specific network analysis needs.
10. Expert Info: Wireshark provides an “Expert Info” feature that highlights potential
problems like retransmissions, protocol errors, and malformed packets, simplifying the
troubleshooting process.
11. Open-Source and Free: Being open-source, Wireshark is freely available and benefits
from continuous community-driven updates and enhancements.