Network Forensics
Network Forensics
Forensics
Network Forensics
It is multi-platform software, i.e., it can run on Linux, Windows, OS X, FreeBSD, NetBSD, etc.
It performs deep inspection of the hundreds of protocols.
It often involves live analysis, i.e., from the different types of the network like the Ethernet,
loopback, etc., we can read live data.
It has sort and filter options which makes ease to the user to view the data.
It can also capture raw USB traffic.
Various settings, like timers and filters, can be used to filter the output.
It can only capture packet on the PCAP (an application programming interface used to capture the
network) supported networks.
Wireshark supports a variety of well-documented capture file formats such as the PcapNg and
Libpcap. These formats are used for storing the captured data.
It is the no.1 piece of software for its purpose. It has countless applications ranging from the tracing
down, unauthorized traffic, firewall settings, etc.
The screen/interface of the Wireshark is divided
into five parts:
First part contains a menu bar and the options displayed below it. This part is at the top of the
window.
The second part is the packet listing window. It includes the packet number, time, source,
destination, protocol, length, and info. We can sort the packet list by clicking on the column name.
Next comes the packet header- detailed window (Bottom Left). It contains detailed information about
the components of the packets. The protocol info can also be expanded or minimized according to the
information required.
The bottom right window called the packet contents window, which displays the content in ASCII
and hexadecimal format.
At last, is the filter field which is at the top of the display. The captured packets on the screen can be
filtered based on any component according to your requirements.
Most used Filters in Wireshark
Whenever we type any commands in the filter command box, it turns green if
your command is correct. It turns red if it is incorrect or the Wireshark does not
recognize your command.
Common Filters
Filters Description
tcp.analysis.flags Wireshark can flag TCP problems. This command will only display the issues that
Wireshark identifies.
Example, packet loss, tcp segment not captured, etc. are some of the problems.
6.!() It is used to filter the list of protocols or applications, in which we are not
For example, !(arp or dns or icmp) interested.
It will remove arp, dns, and icmp, and only the remaining will be left or it
clean the things that may not be helpful.
Common Filters
http.request It will display all the http
For the responses or the response requests in the trace file.
code, you can type You can see all the servers, the
http.response.code==200 client is involved.
Wireshark packet sniffing
Wireshark is a packet sniffing program that administrators can use to isolate and troubleshoot
problems on the network. It can also be used to capture sensitive data like usernames and
passwords. It can also be used in wrong way (hacking) to ease drop.
Packet sniffing is defined as the process to capture the packets of data flowing across a
computer network. The Packet sniffer is a device or software used for the process of sniffing.
It is the process used to know the passwords and username for the particular website. Let's take an
example of gmail.com. Below are the steps: