Assignment 3 Wireshark Assignment
Assignment 3 Wireshark Assignment
and Reporting
And because Wireshark is the predominant tool for this job, let’s go over
some application basics, such as where you can download Wireshark and
how to capture network packets.
What is Wireshark?
What is Wireshark?
Wireshark is an open-source network protocol analysis software program,
widely considered the industry standard. A global organization of network
specialists and software developers supports Wireshark and continues to
make updates for new network technologies and encryption methods.
You should only use Wireshark on networks where you have permission to
inspect network packets. Using Wireshark to look at packets without
permission is illegal.
Wireshark allows you to filter the log before the capture starts or during
analysis, so you can narrow down and zero in on what you’re looking for in
the network trace. For example, you can set a filter to see TCP traffic
between two IP addresses, or you can set it only to show you the packets
sent from one computer. The filters in Wireshark are one of the primary
reasons it has become the standard tool for packet analysis.
Wireshark helps:
Wireshark comes in two options for Windows: 32-bit and 64-bit. Pick the
correct version for your OS; the current release is 3.0.3 as of this writing.
Once you have the Homebrew system in place, you can access several
open-source projects for your Mac. To install Wireshark, run this command
from the Terminal:
Ubuntu
Those commands download and update the package, and add user
privileges to run Wireshark.
Kali Linux
Wireshark will tell you what is happening in your network traffic, but it
won't tell you why.
Varonis adds context to network events, user actions and attacks. Want to
find out more?
When you open Wireshark, you see a screen showing you a list of all the
network connections you can monitor. You also have a capture filter field
to only capture the network traffic you want to see.
You can select one or more of the network interfaces using shift+left-click.
Once select the network interface, you can start the capture, and there
are several ways to do that.
During the capture, Wireshark will show you the packets captured
in real-time.
Once you have captured all the packets needed, use the same buttons or
menu options to stop the capture as you did to begin.
Wireshark shows you three different panes for inspecting packet data. The
Packet List, the top pane, lists all the packets in the capture. When you
click on a packet, the other two panes change to show you the details
about the selected packet. You can also tell if the packet is part of a
conversation. Here are details about each column in the top pane:
No.: This is the number order of the packet captured. The bracket
indicates that this packet is part of a conversation.
Time: This column shows how long after you started the capture
this particular packet was captured. You can change this value in
the Settings menu to display a different option.
Source: This is the address of the system that sent the packet.
Info: This column shows you more information about the packet
contents, which will vary depending on the type of packet.
Packet Details, the middle pane, shows you as much readable information
about the packet as possible, depending on the packet type. You can
right-click and create filters based on the highlighted text in this field.
Frame 3:
Frame 5:
Frame 29:
Frame 46:
Frame 48:
Frame 64:
Frame 79:
Frame 126 - 130:
Submission Requirements:
Students must submit a word file based on the assignment
tasks they performed in TASK A TASK B and TASK C, which
shouldn’t be less than 1000 words.