Learn Wireshark: A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark Lisa Bock pdf download
Learn Wireshark: A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark Lisa Bock pdf download
https://textbookfull.com/product/learn-wireshark-a-definitive-
guide-to-expertly-analyzing-protocols-and-troubleshooting-
networks-using-wireshark-lisa-bock/
https://textbookfull.com/product/network-analysis-using-
wireshark-2-cookbook-practical-recipes-to-analyze-and-secure-
your-network-using-wireshark-2-2nd-edition-nagendra-kumar-nainar/
https://textbookfull.com/product/practical-packet-analysis-using-
wireshark-to-solve-real-world-network-proble-3rd-edition-safari/
https://textbookfull.com/product/a-guide-to-software-managing-
maintaining-and-troubleshooting-jean-andrews/
https://textbookfull.com/product/learn-data-science-using-sas-
studio-a-quick-start-guide-engy-fouda/
Troubleshooting Electronic Circuits: A Guide to
Learning Analog Electronics 1st Edition Ronald Quan
https://textbookfull.com/product/troubleshooting-electronic-
circuits-a-guide-to-learning-analog-electronics-1st-edition-
ronald-quan/
https://textbookfull.com/product/sociometrics-and-human-
relationships-analyzing-social-networks-to-manage-brands-predict-
trends-and-improve-organizational-performance-peter-a-gloor/
https://textbookfull.com/product/programming-mathematics-using-
matlab-1st-edition-lisa-a-oberbroeckling/
https://textbookfull.com/product/programming-mathematics-using-
matlab-1st-edition-oberbroeckling-lisa-a/
https://textbookfull.com/product/programming-mathematics-using-
matlab-1st-edition-oberbroeckling-lisa-a-2/
Learn Wireshark
Second Edition
Lisa Bock
BIRMINGHAM—MUMBAI
Learn Wireshark
Second Edition
Copyright © 2022 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or
transmitted in any form or by any means, without the prior written permission of the publisher,
except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the
information presented. However, the information contained in this book is sold without warranty,
either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors,
will be held liable for any damages caused or alleged to have been caused directly or indirectly by
this book.
Packt Publishing has endeavored to provide trademark information about all of the companies
and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing
cannot guarantee the accuracy of this information.
ISBN 978-1-80323-167-9
www.packt.com
To all dreamers, know that there isn't always a clear path to achieving your dream.
In addition to celebrating and rejoicing each milestone, there will be times of
great sorrow and despair along the way. Nonetheless, keep moving toward your
dream while being authentic, harmonious, and true to yourself. One day you'll
see a sign, and you'll say to yourself with a smile, "I have arrived."
Contributors
About the author
Lisa Bock is an experienced author with a demonstrated history of working in the
e-learning industry. She is a security ambassador with a broad range of IT skills and
knowledge, including Cisco security, CyberOps, Wireshark, biometrics, ethical hacking,
and the IoT. Lisa is an author for LinkedIn Learning and an award-winning speaker who
has presented at several national conferences. She holds an MS in computer information
systems/information assurance from UMGC. Lisa was an associate professor in the IT
department at Pennsylvania College of Technology (Williamsport, PA) from 2003 until
her retirement in 2020. She is involved with various volunteer activities, and she and her
husband, Mike, enjoy bike riding, watching movies, and traveling.
I'd like to thank the author, Lisa Bock, and the team at Packt for giving me
the opportunity to do something that has been wholly enjoyable – reviewing
this great book. Most thanks, however, go to my long-suffering family and
colleagues for giving me the time and support to do so. Thank you, Chris,
Bryn, Jon, Caroline, Craig, and everybody else. You're brilliant.
Table of Contents
Preface
2
Using Wireshark
Examining the Finding information 34
Wireshark interface 28
Understanding the phases of
Streamlining the interface 28
packet analysis 34
Discovering keyboard shortcuts 31
Gathering network traffic 34
Recognizing the Wireshark authors 32
Decoding the raw bits 37
viii Table of Contents
3
Installing Wireshark
Discovering support for Beginning the installation 58
different OSes 50 Choosing components 58
Using Wireshark on Windows 50 Creating shortcuts and selecting
Running Wireshark on Unix 50 an install location 62
Installing Wireshark on macOS 51 Capturing packets and completing
the installation 63
Deploying Wireshark on Linux 51
Working with Wireshark Reviewing available resources 65
on other systems 52
Viewing news and help topics 65
Comparing different Evaluating download options 67
capture engines 54
Summary69
Understanding libpcap 54
Questions69
Examining WinPcap 54
Grasping Npcap 55 Further reading 71
Performing a standard
Windows installation 58
4
Exploring the Wireshark Interface
Opening the Wireshark Printing packets and closing Wireshark 82
welcome screen 74
Discovering the Edit menu 84
Selecting a file 74
Copying items and finding packets 84
Capturing traffic 75
Marking or ignoring packets 88
Exploring the File menu 76 Setting a time reference 89
Opening a file, closing, and saving 77 Personalizing your work area 90
Exporting packets, bytes, and objects 78
Exploring the View menu 91
Table of Contents ix
6
Personalizing the Interface
Personalizing the layout 130 Adding, editing, and deleting columns 141
Altering the appearance 130 Refining the font and colors 145
Changing the layout 132
Adding comments 148
Creating a tailored Attaching comments to files 148
configuration profile 136 Entering packet comments 148
Customizing a profile 136 Viewing and saving comments 149
Crafting buttons 139
Summary 150
Adjusting columns, Questions 151
font, and colors 141
x Table of Contents
7
Using Display and Capture Filters
Filtering network traffic 154 Understanding the
Analyzing traffic 154 expression builder 168
Comparing the filters' files 156 Building an expression 170
8
Outlining the OSI Model
An overview of the OSI model 182 Traveling over the Physical layer 197
Developing the framework 182
Exploring the
Using the framework 183
encapsulation process 198
Discovering the purpose Viewing the data 199
of each layer, the protocols, Identifying the segment 199
and the PDUs 183 Characterizing the packet 200
Evaluating the Application layer 185 Forming the frame 200
Dissecting the Presentation layer 186
Demonstrating frame
Learning about the Session layer 188
formation in Wireshark 201
Appreciating the Transport layer 190
Examining the network bindings 202
Explaining the Network layer 193
Examining the Data Link layer 196 Summary203
Questions203
Table of Contents xi
10
Managing TCP Connections
Dissecting the Permitting SACK 257
three-way handshake 242 Using timestamps 259
Isolating a single stream 243
Understanding TCP
Identifying the handshake packets 248
protocol preferences 260
Learning TCP options 252 Modifying TCP preferences 262
Grasping the EOL option 254
Tearing down a connection 264
Using NOP 254
Defining the MSS 255
Summary266
Scaling the WS 256 Questions266
Further reading 268
xii Table of Contents
11
Analyzing IPv4 and IPv6
Reviewing the network layer 270 Editing protocol preferences 287
Understanding the purpose of IP 271 Reviewing IPv4 preferences 287
Adjusting preferences for IPv6 290
Outlining IPv4 272
Dissecting the IPv4 header 273 Discovering tunneling protocols291
Modifying options for IPv4 282 Summary292
Exploring IPv6 282 Questions293
Navigating the IPv6 header fields 283 Further reading 295
12
Discovering ICMP
Understanding the purpose of Providing information using ICMPv6 312
ICMP298
Evaluating type and code values315
Understanding the ICMP header 299
Reviewing ICMP type and code values 315
Investigating the data payload 302
Defining ICMPv6 type and code values 317
Dissecting ICMP and ICMPv6 305
Configuring firewall rules 318
Reviewing ICMP 305
Acting maliciously 318
Outlining ICMPv6 306
Allowing only necessary types 323
Sending ICMP messages 307
Summary324
Reporting errors on the network 308
Issuing query messages 311
Questions324
Further reading 326
14
Examining DHCP
Recognizing the purpose of Understanding DHCP messages 375
DHCP 360 Comparing DHCP options 376
Configuring the client's IP address 361
Following a DHCP example 377
Using a DHCP relay agent 361
Releasing an IP address 377
Working with IPv6 addresses 363
Broadcasting a discover packet 379
Addressing security issues 365
Delivering an offer 380
Stepping through Requesting an IP address 382
the DORA process 366 Acknowledging the offer 383
Moving through DHCP states 366
Summary384
Obtaining an IP address 367
Leasing an IP address 370 Questions 385
Further reading 387
Dissecting a DHCP header 372
Examining DHCP field values 373
15
Decoding HTTP
Describing HTTP 390 Keeping track of the connection394
Dissecting a web page 390 Evaluating connection types 395
Understanding HTTP versions 393 Maintaining state with cookies 396
Recognizing HTTP methods 394
Comparing request and
response messages 398
xiv Table of Contents
16
Understanding ARP
Understanding the role and Reversing ARP 427
purpose of ARP 418 Evaluating InARP 428
Resolving MAC addresses 419 Issuing a gratuitous ARP 430
Investigating an ARP cache 421 Working on behalf of ARP 430
Replacing ARP with NDP in IPv6 423
Comparing ARP attacks and
Exploring ARP headers defense methods 432
and fields 423 Comparing ARP attacks and tools 432
Identifying a standard ARP Defending against ARP attacks 435
request/reply 423
Summary436
Breaking down the ARP header fields 425
Questions 437
Examining different types Further reading 438
of ARP 427
18
Subsetting, Saving, and Exporting Captures
Discovering ways Recognizing ways to
to subset traffic 466 export components 477
Dissecting by an IP address 467 Selecting specified packets 478
Narrowing down by conversations 470 Exporting various objects 480
Minimizing by port number 471
Breaking down by protocol 472
Identifying why and how
to add comments 482
Subsetting by stream 473
Providing file and packet comments 482
Understanding options Saving and viewing comments 484
to save a file 474
Using Save as 476
Summary 487
Questions 487
19
Discovering I/O and Stream Graphs
Discovering the Statistics menu 492 Comparing TCP stream graphs 506
Viewing general information 493 Using time sequence graphs 506
Assessing protocol effectiveness 494 Determining throughput 512
Graphing capture issues 497 Assessing Round Trip Time 514
Evaluating window scaling 515
Creating I/O graphs 499
Examining errors 500 Summary 517
Graphing duplicate ACKs 501 Questions 517
Modifying the settings 502
Exploring other options 504
20
Using CloudShark for Packet Analysis
Discovering CloudShark 522 Outlining the various
Modifying the preferences 523 filters and graphs 532
Uploading captures 525 Displaying data using filters 533
Working with capture files 526 Viewing data using graphs 534
xvi Table of Contents
Chapter 3, Installing Wireshark, illustrates how Wireshark provides support for different
operating systems. We'll compare the different capture engines, such as WinPCap,
LibPcap, and Npcap, walk through a standard Windows installation, and then review the
resources available at https://www.wireshark.org/.
Chapter 4, Exploring the Wireshark Interface, provides a deeper dive into some of the
common elements of Wireshark to improve your workflow. We'll investigate the welcome
screen and common menu choices, such as File, Edit, and View, so that you can easily
navigate the interface during an analysis.
Chapter 5, Tapping into the Data Stream, starts with a comparison of the different network
architectures and then moves on to the various capture options. You'll discover the
conversations and endpoints you'll see when tapping into the stream, and then learn about
the importance of baselining network traffic.
Chapter 6, Personalizing the Interface, helps you to realize all the ways you can customize
the many aspects of the interface. You'll learn how to personalize the layout and general
appearance, create a tailored configuration profile, adjust the columns, font, and color, and
create buttons.
Chapter 7, Using Display and Capture Filters, helps you to make examining a packet
capture less overwhelming. We'll take a look at how to narrow your scope by filtering
network traffic. We'll compare and contrast display and capture filters, discover the
shortcuts used to build filters, and conclude with a review of the expression builder.
Chapter 8, Outlining the OSI Model, provides an overview of the Open Systems
Interconnection (OSI) model, a seven-layer framework that outlines how the OS prepares
data for transport on the network. We'll review the purpose, protocols, and Protocol Data
Units (PDUs) of each layer, explore the encapsulation process, and demonstrate the frame
formation in Wireshark.
Chapter 9, Decoding TCP and UDP, is a deep dive into two of the key protocols in the
transport layer – the Transmission Control Protocol (TCP) and the User Datagram
Protocol (UDP). We'll review the purpose of the transport layer and then evaluate the
header and field values of both the TCP and the UDP.
Chapter 10, Managing TCP Connections, begins by examining the three-way handshake.
We'll discover the TCP options, get a better understanding of the TCP protocol
preferences, and then conclude with an overview of the TCP teardown process.
Chapter 11, Analyzing IPv4 and IPv6, provides a breakdown of the purpose of the Internet
Protocol (IP). We'll outline IPv4 and the header fields and then explore the streamlined
header of IPv6. We'll summarize with a discussion of the protocol preferences and see
how IPv4 and IPv6 can coexist by using tunneling protocols.
Preface xix
Chapter 12, Discovering ICMP, details the purpose of the Internet Control Message
Protocol (ICMP). We'll dissect ICMP and ICMPv6, compare query and error messages,
and discuss the ICMP type and code values. We'll cover how ICMP can be used in
malicious ways and outline the importance of configuring firewall rules.
Chapter 13, Diving into DNS, outlines the significance of the Domain Name System
(DNS). You'll learn how DNS works when resolving a hostname to an IP address. We'll
compare the different types of records, step through a query and response, review the
DNS header, and calculate the DNS response time using Wireshark.
Chapter 14, Examining DHCP, begins by explaining the need for the Dynamic Host
Configuration Protocol (DHCP). We'll then outline the DORA process – Discover Offer
Request Acknowledge. We'll dissect a DHCP header and review all the field values, flags,
and port numbers, and then finish by stepping through a DHCP example.
Chapter 15, Decoding HTTP, highlights the Hypertext Transfer Protocol (HTTP),
an application layer protocol used when browsing the web. We'll learn the details of
HTTP, explore common methods of transport, and dissect the header and fields. We'll
then compare request and response messages, and then summarize by following an
HTTP stream.
Chapter 16, Understanding ARP, takes a closer look at the Address Resolution Protocol
(ARP), which is a significant protocol in delivering data. We'll outline the role and
purpose of ARP, explore the header and fields, describe the different types of ARP, and
take a brief look at ARP attacks.
Chapter 17, Determining Network Latency Issues, outlines how even a beginner can
diagnose network problems. We'll explore coloring rules and the Intelligent Scrollbar, and
then conclude with an overview of the expert information, which divides the alerts into
categories and guides you through a more targeted evaluation.
Chapter 18, Subsetting, Saving, and Exporting Captures, helps you to explore the many
different ways in which to break down a packet capture into smaller files for analysis. We'll
cover the different options when saving a file, discover ways to export components such as
objects, session keys, and packet bytes, and then outline why and how to add comments.
Chapter 19, Discovering I/O and Stream Graphs, begins by covering the many ways the
statistics menu can help us when analyzing a capture file. We'll create basic I/O graphs to
help visualize network issues and summarize by comparing how the different TCP stream
graphs provide a visual representation of the streams.
xx Preface
Chapter 20, Using CloudShark for Packet Analysis, covers CloudShark, an online
application that is similar to Wireshark. You'll learn how to filter traffic and generate
graphs. We'll then review how you can share captures with colleagues and outline where
you can find sample captures so that you can continue improving your skills.
Conventions used
There are a number of text conventions used throughout this book.
Code in text: Indicates code words in text, database table names, folder names,
filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles.
Here is an example: "To write to a file, use -w, then the filename and path."
Any command-line input or output is written as follows:
Bold: Indicates a new term, an important word, or words that you see onscreen. For
instance, words in menus or dialog boxes appear in bold. Here is an example: "Once
you're in CloudShark, select the Export | Download File drop-down menu."
Get in touch
Feedback from our readers is always welcome.
General feedback: If you have questions about any aspect of this book, email us
at [email protected] and mention the book title in the subject of
your message.
Errata: Although we have taken every care to ensure the accuracy of our content,
mistakes do happen. If you have found a mistake in this book, we would be grateful if
you would report this to us. Please visit www.packtpub.com/support/errata
and fill in the form.
Piracy: If you come across any illegal copies of our works in any form on the internet,
we would be grateful if you would provide us with the location address or website name.
Please contact us at [email protected] with a link to the material.
If you are interested in becoming an author: If there is a topic that you have expertise
in and you are interested in either writing or contributing to a book, please visit
authors.packtpub.com.
In this section, we’ll outline the value of traffic analysis, learn about the evolution of
Wireshark, and step through the phases of packet analysis. We’ll then discuss some of
the command-line interface tools, outline how to download and install Wireshark, and
explore the interface along with commonly accessed menu choices.
The following chapters will be covered under this section:
In this chapter, we will address all of this by covering the following topics:
We use packet analysis in many places, including on a LAN, on a host, or in the real world.
Additionally, we use packet analysis when troubleshooting latency issues, testing Internet
of Things (IoT) devices, and as a tool when baselining the network.
Today, packet analysis using Wireshark is a valuable skill. However, analyzing packets has
been around in the networking world for many years. As early as the 1990s, various tools
enabled analysts to carry out packet analysis on the network to troubleshoot errors and to
monitor server behavior. In the next section, we'll examine some of the early tools used to
monitor network activity.
Reviewing packet analysis 5
In the next section, we'll take a look at the various devices that use packet analysis today.
6 Appreciating Traffic Analysis
• A router captures the traffic and examines the IP header to determine where to
send the traffic, as part of the routing process.
• An IDS examines the traffic and alerts the network administrator if there is any
unusual or suspicious behavior.
• A firewall monitors all traffic and will drop any packets that are not in line with
the Access Control List (ACL).
For example, when data passes through a firewall, the device examines the traffic and
determines whether to allow or deny the packets according to the ACL.
Using an ACL
When using a firewall, an ACL governs the type of traffic that is allowed on the network.
For example, an ACL has the following entries:
To decide whether to allow or deny a packet, the firewall must check each header as it
passes through the device. It will determine variables such as IP addresses, Transmission
Control Protocol (TCP) flags, and port numbers that are in use. If the packet does not
meet the ACL entry, the firewall will drop the packet. As shown in the following diagram,
an inbound SYN packet with a destination port of 80 is blocked because it does not match
the rule:
Random documents with unrelated
content Scribd suggests to you:
evening prayers—that old and beautiful "Heil dir, Maria, Mutter
Gottes".... Oh, that time—that time.... [He weeps] Oh, damn it! I am
crying, I think!—Come to the Blue Dove to-night, Jacob There you'll
find Rhine wine and merry maidens! Jorghen will be there, too. He's
a man you should know.
JACOB. [Coldly and shrewdly] I—shall—come.
ERIC.Thank you, friend! [Rising] Really, the place has a look of
pawn-shop.
JACOB. [Sharply] That was just what I had in mind before.
ERIC.Well, then we agree to that extent at least. Until to-night, then!
Do you know Agda?
JACOB. [Brusquely] No!
ERIC.[Haughtily, giving him two fingers to shake, JACOB pretending
not to notice it] Farewell!—What became of those two little
pawnbrokers?
SECOND SCENE
ERIC.[Rising] There you are at last, Jacob! You have kept me waiting
a long time, and just now I was longing for you.
JACOB. Pardon me, Prince, but my thoughts were so heavy that I did
not wish to bring them into a merry gathering.
ERIC. Yes, we are devilishly merry, Jorghen and I! This is Jorghen
Persson, you see—my secretary, and a very enlightened and clever
man, but a perfect rascal otherwise, as you can judge from his
horrible looks and treacherous eyes.
JORGHEN. At your service, my dear sir!
ERIC. Sit down and philosophise with us, Jacob. Of course, I
promised you pretty maidens, but we have only one here, and she is
engaged.
JACOB. [Startled] What do you mean by—engaged?
ERIC.That she has bestowed her heart on somebody, so that you
may save yourself the trouble of searching her bosom for it.
JACOB. Are you talking of Agda?
ERIC. Do you know Agda the Chaste, who has told us that she would
sell her favours, but never give them away?
AGDA. My God, I never, never meant anything of the kind!
JACOB. No, she cannot possibly have meant it that way.
ERIC. She has said it.
JACOB. It must be a lie.
ERIC. [His hand on his sword-hilt] The devil, you say!
JORGHEN. A tavern brawl of the finest water! The words have been
given almost correctly, but they were not understood as they were
meant.
ERIC. Do you dare to takes sides against me, you rascal?
JORGHEN. Listen, friends....
ERIC. With a hussy against your master....
JACOB. She's no hussy!
AGDA. Thank you, Jacob! Please tell them everything....
ERIC.Oh, there is something to tell, then? Well, well! [To JORGHEN]
And you must needs appear as the defender of innocence!
JACOB. Once you honoured me with your friendship, Prince, for which
I could only give you pity in return. As I did not wish to be false, I
asked you to let me go....
ERIC. [Leaping to his feet] Go to the devil!
JACOB. Yes, I am going, but first you must hear what I and Agda
have in common—something you can never understand, as you
understand nothing but hatred, and for that reason never can win
love....
ERIC.Diantre! And I who can have the virgin-queen, the proud
maiden of Britannia, at my feet any time I care ha-ha, ha-ha!
JACOB. King David had five hundred proud maidens, but for
happiness he turned to his humble servant's only wife....
ERIC. Must I hear more of that sort of thing?
JACOB. A great deal more!
ERIC. [Rushing at JACOB] Die, then!
CAPTAIN. [To AGDA] And now you'll close your drink-shop. That's the
final word. And as there is no question about it, you need not make
any answer.
JACOB. Always this titanic hand that is never seen and always felt!
Now it has been thrust out of a cloud to alter our humble fates. The
liberator of the country has descended during the darkness of night
to set my little bird free.—Will you take flight with me?
AGDA. Yes, with you—and far away!
JACOB. But where?
AGDA. The world is wide!
JACOB. Come, then!
Curtain.
[1] A subterranean vault in the Royal Palace at Stockholm used by
the thrifty King Gustavus for the storing of gold and silver and
other valuables. Compare the warning of Nils Söderby to Mons
Nilsson's wife in the first act: "Look out for the silver—the King is
coming."
[2] The first wife of Gustavus was the Princess Catherine of Saxe-
Lauenburg, whom he married in 1531, and who died in 1535. She
was of a very peculiar temperament and caused much trouble
between the King and his relatives by her reckless talk. Prince Eric
was born in 1533.
[3] This is an excellent illustration of the freedom taken by
Strindberg in regard to the actual chronology of the historical
facts he is using. Eric was little more than a year old when his
mother died. Strindberg knew perfectly well what he was doing,
his reason being that the motive ascribed to Eric's hatred of his
father strengthens the dramatic quality of the play in a very high
degree.
[4] A peasant chieftain, who headed the most dangerous rebellion
Gustavus had to contend with during his entire reign. The
southern province of Småland had for years been the scene of
peasant disturbances when, in 1541, Dacke took command of the
scattered flocks and merged them into an army which defied the
King's troops for nearly two years. Dacke was as able as he was
ambitious. He was in communication with the German Emperor
and other foreign enemies of Gustavus, and on one occasion the
latter had actually to enter into negotiations with the rebel. In
accordance with his invariable custom, Gustavus did not rely on
hired soldiery, but turned to the people of the other provinces,
explaining and appealing to them with such success that a
sufficient army was raised and Dacke beaten and killed in 1543.
[5] In his effort to reorganise the country and its administration
on a businesslike basis, Gustavus turned first to Swedes like
Olavus Petri and Laurentius Andreæ, his first chancellor. But these
were as independent of mind as he was himself, and there was
not a sufficient number of them. Then Gustavus turned to
Germany, whence a host of adventurers as well as able, honest
men swarmed into the country. The two best known and most
trusted of these foreigners were Georg Norman, who rendered
valuable services in organising the civil administration, and Conrad
von Pyhy, said to be a plain charlatan named Peutinger, who was
made Chancellor of the Realm.
ACT III
The King's study. The background consists almost wholly of
large windows, some of which have panes of stained glass.
Several of the windows are open, and through these may be
seen trees in the first green of spring. Mast tops with flying
flags, and church spires are visible above the tops of the trees.
Beneath the windows are benches set in the walls. Their seats
are covered by many-coloured cushions.
At the right, a huge open fireplace, richly decorated. The
recently adopted national coat of arms appears on the
mantelpiece. A door on the same side leads to the waiting-
room.
A chair of state with canopy occupies the centre of the left wall.
In front of it stands a long oak table covered with green cloth.
On the table are a folio Bible, an inkstand, candlesticks, a war-
hammer, and a number of other things. A door on the same
side, nearer the background, leads to the royal apartments.
The floor is covered with animal skins and rugs.
The walls display paintings of Old Testament subjects. The most
conspicuous of these represents "The Lord appearing unto
Abraham in the plains of Mamre." The picture of Abraham bears
a strong resemblance to the King.
An Arabian water-bottle of clay and a silver cup stand on a small
cabinet.
Near the door at the right hang a long and wide blue cloak and
a big black felt hat. A short boar-spear is leaned against the
wall.
The KING, lost in thought, stands by one of the open windows
where the full sunlight pours over him. He has on a black dress
of Spanish cut, with yellow linings that show in the seams and
through a number of slits. Over his shoulders is thrown a short
cloak trimmed with sable. His hair is blond, and his tremendous
beard, reaching almost to his waist, is still lighter in colour.
The QUEEN enters from the left. She wears a yellow dress with
black trimmings.
KING. You are thinking of Anders Persson and Mons Nilsson, but I
won't let you talk of them.
KING. Please, get up! [As she remains on her knees] Then I must
leave you. [He goes out to the left.
PRINCE ERIC enters from the right; he is pale and unkempt, and
his face retains evidence of the night's carouse.
The QUEEN rises, frightened.
The KING enters reading a document. The QUEEN meets him with
a supplicating look.
KING. [Hotly] If you have any faith in me at all, Margaret, cease your
efforts to judge in matters of state. I have been investigating for two
years without being able to make up my mind. How can you, then,
hope to grasp this matter?—Go in to the children now. I have a word
to say to Eric!
KING. If you could see yourself as you are now, Eric, you would
despise yourself!
ERIC. So I do anyhow!
KING.Nothing but talk! If you did despise yourself, you would change
your ways.
ERIC. I cannot make myself over.
KING. Have you ever tried?
ERIC. I have.
KING. Then your bad company must counteract your good intentions.
ERIC.
Jorghen is no worse than anybody else, but he has the merit of
knowing himself no better than the rest.
KING. Do you bear in mind that you are to be king some time?
ERIC. Once I am king, the old slips will be forgotten.
KING.There you are mistaken again. I am still paying for old slips.
However, if you are not willing to obey me as a son, you must obey
me as a subordinate.
ERIC. The Heir Apparent is no subject!
KING. That's why I used the word "subordinate." And all are
subordinate to the King.
ERIC. Must I obey blindly?
KING. As long as you are blind, you must obey blindly. When you get
your sight, you will obey with open eyes. But obey you must!—Wait
only till you have begun to command, and you will soon see how
much more difficult that is, and how much more burdensome.
ERIC. [Pertly] Pooh!
KING.[Angrily] Idiot!—Go and wash the dirt off yourself, and see that
your hair is combed. And rinse that filthy mouth of yours first of all,
so that you don't stink up my rooms. Go now—or I'll give you a
week in the tower to sober up. And if that should not be enough, I'll
take off your ears, so that you can never wear a crown. Are those
words plain enough?
ERIC. The law of succession....
KING.
I make laws of that kind to suit myself! Do you understand
now?—That's all!—Away!
KING. [Meets him and shakes his hand; then he puts his arm about
his neck and leads him across the floor in that manner] Good day,
my dear old friend, and welcome! Sit down, sit down! [He seats
himself on the chair of state, and ISRAEL sits down across the table]
So you have just come from Dalecarlia?
ISRAEL. That's where I was lately.
KING. I was there, too, as you know, to straighten out the mess left
after the False Sture and the fight about the bells, but you stayed on
when I left.—Did you keep an eye on Master Olavus Petri? What sort
of a man has he turned out? Can I trust him?
ISRAEL.Absolutely! He is not only the most faithful, but the cleverest
negotiator I have seen.
KING.
Really, Herman? I am glad to hear that. Do you really think so,
Herman? Well, you know the old affair between him and me, and
how that was settled. But it was settled!—So much for that. Let us
talk of our affairs now.
ISRAEL.As you say. But let us keep our words as well as actions
under control.
KING.[Playing with the war-hammer] All right! Control yours as much
as you please.
ISRAEL.[Pointing at the hammer] For the sake of old friendship and
good faith, can't we put that away?
KING.Ha-ha! With pleasure, if you are afraid of it, Herman!—Go on
now! But cut it short!
ISRAEL.Then I'll start at the end. The country's debt to Luebeck has
been paid, and we are about to part.
KING. That sounds like writing! However, we shall part as friends.
ISRAEL. As allies rather....
KING.So that's what you are aiming at, Israel?—No, I have had
enough of dependence.
ISRAEL. Listen, your Highness, or Majesty, or whatever I am to call
you....
KING. Call me Gustav, as you used to do when I called you father.
ISRAEL.Well, my son, there are many things that drive us apart—
many, indeed—but there is one thing that keeps us together: our
common, legitimate opposition to the Emperor....
KING. Right you are! And that's the reason why we can rely on each
other without any written treaties.
ISRAEL. You forget one thing, my son: that I am a merchant....
KING. And I the customer. Have you been paid?
ISRAEL.Paid? Yes.... But there are things that cannot be paid in
money....
KING. It is for me to speak of the gratitude I owe you and the free
city of Luebeck ever since the day I first came to you—a young man
who thought himself deserted by God, and who knew himself
deserted by all humanity. Be satisfied to find my gratitude expressed
in the friendly feelings I harbour and show toward you. A debt like
that cannot be paid in money, and still less in treaties.—Why do you
want any treaties? In order to tie me and the country for a future of
uncertain duration?—Don't force me to become ungrateful, Herman!
On my soul, I have enough as it is to burden me—far too much!
ISRAEL. What is weighing on you, my son?
KING. This.... Oh, will you believe me, Herman, old friend, that
lawyer form a decision or pass a judgment without having turned to
the Eternal and Almighty Lord for advice? When, after fasting,
prayer, and meditation, I have got the answer from above that I was
asking for, then I strike gladly, even if it be my own heart-roots that
must be cut off. But you remember Master John.... John, the old
friend of my youth, who assisted me in that first bout with Christian?
He changed heart and incited the Dalecarlians to rise against me.
His head had to fall, and it did fall! [Rising] Since that day my peace
is gone. My nearest and dearest don't look at me in the same way
they used to do. My own wife, my beloved Margaret.... She turns
away from me when I want to kiss her pure brow, and can you
imagine? Yesterday, at the dinner-table, she kept looking at my hand
as if she had seen blood on it!—I don't regret what I did. I have no
right to regret it. I was right—by God, I was right! But nevertheless
—my peace is gone!
ISRAEL.[Pensively] Those feelings are an honour to your heart, my
son, and I must admit that I didn't think you quite as sensitive....
KING. Never mind! It was not meant as a boast. But now I find
myself in the same situation again. Tell me, Herman, what you think
of Anders Persson and Mons Nilsson.
ISRAEL.[Disturbed] Will my opinion have any influence on their fate,
or have you already made up your mind?
KING. I am still in doubts, as you ought to know.
ISRAEL. Then I must ask permission to remain silent.
KING. Are you my friend?
ISRAEL.Yes, up to a certain point. But you must not trust me too far,
as I am not my own master and have no right to give away what is
not mine.
KING. Fie on such astuteness!
ISRAEL. You should get some of it yourself!
KING. I'll try.—First of all you must give me a final receipt for the
country's paid-up debt.
ISRAEL.I don't carry such documents with me, and the receipt has to
be signed by the Council in regular session.
KING. [Smiting the table with the hammer] Herman!
ISRAEL. Please put that thing away!
KING. I can see that you wish to lead me where I don't want to go.
You have some purpose in mind that I can't make out. Speak out,
old man, or you'll have me in a rage! You want to coax me into
signing some kind of paper. What is it?
ISRAEL. Nothing but a treaty providing for mutual friendship and
mutual trade. That's all!
KING. And that I will never sign! I know all about Luebeck's
friendship as well as its trade. Talk of something else!
ISRAEL. I have nothing else to talk of. Why don't you believe me?
KING. Because you lie!
ISRAEL. Because you are unfortunate enough to think that I lie, you
will never know the truth.
KING. Yes, unfortunate, indeed—as unfortunate as a man can be, for
I have not a single friend.
ISRAEL. It hurts me to hear you talk like that, Gustav, and—and it
makes me sad to see that your greatness and your exalted office
have brought you so little true happiness. I shall say nothing more
about gratitude, because the idea of it is too vague in human minds,
but I have loved you like a son ever since that hour when the Lord
of Hosts put your fate in my hands. I have followed your brilliant
course as if it had been my own. I have joyed over your successes,
and I have sorrowed over your sorrows.... Frequently my duties
toward my own people have kept me from lending you a helping
hand. Frequently, too, your own hardness has stood between us. But
now, when I behold you so deeply crushed, and when you have
treated me with a confidence that I may well call filial, I shall forget
for a moment that I am your enemy—which I must be as a man of
Luebeck, while as Herman Israel I am your friend. I shall forget that
I am a merchant, and—[Pause] I hope that I may never regret it—
[Pause] and—and.... Do you know John Andersson?
KING. I don't.
ISRAEL.But I do, and I know Anders Persson and Mons Nilsson, too!
They called on me yesterday, and—to-morrow the southern
provinces will rise in rebellion!
KING. So that's what was coming? Oh! Who is John Andersson?
ISRAEL. Hard to tell. But back of his face appears another one that
looks like the devil's own. Have you heard the name of Dacke?
KING. Yes, but only in a sort of dream. Dacke?—Dacke?—It sounds
like the cawing of a jackdaw.—Who is he?
ISRAEL. Nobody knows. It is the name of one invisible, whom all
know and none have seen. But that name has been seen on a letter
signed by—the Emperor.
KING. The Emperor?
ISRAEL. The Emperor of the Holy Roman and German Empire!
KING. Fairy-tales!
ISRAEL. You won't believe me? Investigate!
KING.I believe you and I thank you!—You say that Anders Persson
and Mons Nilsson have been plotting with the rebels right here in my
own city?
ISRAEL. As surely as I have ears to hear with.
KING. My God! My God!—Then I know what to do with them! Two
years of struggle with myself and my conscience, and at last I know
what to do with them! At last!
COURTIER. [Bringing in JACOB ISRAEL] Jacob Israel of Luebeck!
KING. Who dares to disturb me?
JACOB. [Throwing himself at the KING'S feet without noticing his
father] My noble King, an humble youth has ventured to disturb you
because your life is at stake!
KING. Speak up! What more? Who are you?
JACOB. I am Jacob Israel, your Highness.
KING, [to ISRAEL] It's your Jacob, is it not?
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com