SlideShare a Scribd company logo
1 of 24
Wireshark
Presented By: YOGEESH.B.R (1MS14IS422)
VIDYASAGAR.K.G (1MS14IS421)
SURESHA.H.N (1MS14IS419)
Network Protocol Analyzer
 Computer s/w or h/w, intercepts & logs traffic passing
over the network
 Captures packets, decodes & analyzes contents
 A network Analyzer is used for
 Troubleshooting problems on the network
 Analyzing the performance of a network to
discover bottlenecks
 Network intrusion detection
 Analyzing the operations of applications
Overview
 Introduction to Wireshark
 Features
 Uses
> detecting VOIP problems
> downloading FLV files
 What it can’t do
 Conclusion
About Wireshark
 It is a packet sniffer Computer application
 Functionality is very similar to tcpdump
 Has a GUI front-end and many more
information sorting and filtering options
 “eWeek” Labs named Wireshark one of "The
Most Important Open-Source Apps of All
Time" as of May 2, 2007
Background
 Initiated by Gerald Combs under the name
Ethereal
 First version was released in 1998
 The name Wireshark was adopted in June
2006
Features
 “Understands" the structure of different
network protocols.
 Displays encapsulation and single fields and
interprets their meaning.
 It can only capture on networks supported by
pcap.
 It is cross-platform running on various OS
(Linux, Mac OS X, Microsoft windows)
WinP Cap
 Industries –standard tool for link layer network access
in windows environment
 Allows application to capture and transmit network
packets by passing the protocol stack
 Consists of a driver-extends OS to provide low level
network access
 Consists of library for easy access to low level
network layers
 Also contains windows version of libPCap Unix API
Example
Applications of Wireshark
 Exposing VOIP problems
 Supports Malware Detection
 Helps recognize DOS attack
 Downloading FLV files
Exposing VoIP Problems Using Wireshark
 VoIP –Protocol Optimized for
transmission of voice through
Internet(IP telephoning)
 VOIP is affected by Latency,
Jitter and Packet Loss
 Troubleshooting VoIP network
with other protocol analyzer
software is costly
 VoIP involves complex setup
protocols that wireshark can
decode and relate
 It provides excellent tools to
interpret the data
Exposing VOIP problems
 VOIP suffers from three common problems
> when a number is dialed, phone idles & no
ringing is heard
> only one party hears audio
> missing conversation due to packet loss
No Ringing
 When wireshark is launched we must ensure that
correct interface is being used
 Wrong user name & password
Phone
host
PBX
host
SIP INVITE
PROXY Authentication required
ACK
Capture Options
Capture of ipphone Traffic
One sided Audio
 Uses advanced analysis tools
 When capture is loaded, select
Statistics->VOIP calls
 Click on the call and Graph button- summary
of SIP calls
 Stream is set up between two end points by
SIP using SDP
 Decodes the protocol contained within
currently selected packet
Graphical Interpretation
SIP packet Containing SDP
Session Description Protocol
Type: 3 (destination unreachable)
Code: 1 (host unreachable)
Checksum: 0x7a2
Problem
 Given IP address is private and unreachable
 So when remote host sends packets, they are
lost as no such route exists
Partially audible conversation
 Out of order packets are lost
 Wireshark uses decoded packets to provide a list of all
audio conversations
Stream Analysis
 Select Problematic stream-> Click Find Reverse button-> Click
Analyze to provided packet by packet look at the stream
 Lost packets will show up as having the wrong sequence
number
 Also Displays current bandwith,latency and jitter
Audio replay
 We can also listen to the content of the voice
call
 Select Save Payload button-> Select the .au
file format-> press the OK button
 The voice call is saved to your hard drive
 Can be played by audio program like XMMS
What it Cannot Do….
 It cannot be used to map out a network
 It does not generate network data-Passive
tool
 Only shows detail information about protocols
it understand
 It can only capture data as well as the
OSInterfaceInterface driver supports.
 An example of this is capturing data over
wireless networks.
Conclusion
 Wireshark's wireless analysis features have grown to
be a very powerful tool for troubleshooting and
analyzing wireless networks.
 With  Wireshark's display filters and powerful protocol
dissector features, you can sift through large
quantities of wireless traffic
 Without a doubt, Wireshark is a powerful assessment
and analysis tool for wireless networks that should be
a part of every auditor, engineer, and consultant
toolkit.

More Related Content

What's hot (20)

Wireshark
WiresharkWireshark
Wireshark
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark network analysing software
Wireshark network analysing softwareWireshark network analysing software
Wireshark network analysing software
 
Network Traffic Analysis With Wireshark.pptx
Network Traffic Analysis With Wireshark.pptxNetwork Traffic Analysis With Wireshark.pptx
Network Traffic Analysis With Wireshark.pptx
 
wireshark
wiresharkwireshark
wireshark
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Wireshark
WiresharkWireshark
Wireshark
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark
 
Wireshark ppt
Wireshark pptWireshark ppt
Wireshark ppt
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
Wireshark.pptx
Wireshark.pptxWireshark.pptx
Wireshark.pptx
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)2019 02-20 micro-segmentation based network security strategies (yoni geva)
2019 02-20 micro-segmentation based network security strategies (yoni geva)
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Ns3
Ns3Ns3
Ns3
 
Nmap
NmapNmap
Nmap
 

Viewers also liked

Tehla Bower - Grants and Opportunities for Illawarra ICT Firms
Tehla Bower - Grants and Opportunities for Illawarra ICT FirmsTehla Bower - Grants and Opportunities for Illawarra ICT Firms
Tehla Bower - Grants and Opportunities for Illawarra ICT FirmsICT Illawarra
 
Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkYoram Orzach
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - BasicsYoram Orzach
 

Viewers also liked (9)

Tehla Bower - Grants and Opportunities for Illawarra ICT Firms
Tehla Bower - Grants and Opportunities for Illawarra ICT FirmsTehla Bower - Grants and Opportunities for Illawarra ICT Firms
Tehla Bower - Grants and Opportunities for Illawarra ICT Firms
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Wireshark
Wireshark Wireshark
Wireshark
 
Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wireshark
 
Network Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using WiresharkNetwork Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using Wireshark
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 

Similar to Wireshark

Wireshark working and basics
Wireshark working and basicsWireshark working and basics
Wireshark working and basicsM A Hafeez
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptIwan89629
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisGTKlondike
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkArunabh Mishra
 
Co se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkCo se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkSecurity Session
 
wireshark-090916114253-phpapp01 (1).pdf
wireshark-090916114253-phpapp01 (1).pdfwireshark-090916114253-phpapp01 (1).pdf
wireshark-090916114253-phpapp01 (1).pdfLuisCarlos663610
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Needamiable_indian
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol AnalyzerSourav Roy
 
Network Monitoring with Wireshark
Network Monitoring with WiresharkNetwork Monitoring with Wireshark
Network Monitoring with WiresharkSiddharth Coontoor
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfJessica Thompson
 
Voice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGVoice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGRagheb Gmira
 
Lab Exercise #4 IPv4 Dr. Anne Kohnke 1 Obj.docx
Lab Exercise #4 IPv4   Dr. Anne Kohnke  1  Obj.docxLab Exercise #4 IPv4   Dr. Anne Kohnke  1  Obj.docx
Lab Exercise #4 IPv4 Dr. Anne Kohnke 1 Obj.docxsmile790243
 
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)Denny K
 
Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems IOSR Journals
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment David Parker
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools iSyaiful Ahdan
 
Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Denny K
 

Similar to Wireshark (20)

Wireshark working and basics
Wireshark working and basicsWireshark working and basics
Wireshark working and basics
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.ppt
 
Wiresharkrep
WiresharkrepWiresharkrep
Wiresharkrep
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
 
Wireshark
WiresharkWireshark
Wireshark
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
 
Co se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkCo se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel Minařík
 
Wireshark Packet Analyzer.pptx
Wireshark Packet Analyzer.pptxWireshark Packet Analyzer.pptx
Wireshark Packet Analyzer.pptx
 
wireshark-090916114253-phpapp01 (1).pdf
wireshark-090916114253-phpapp01 (1).pdfwireshark-090916114253-phpapp01 (1).pdf
wireshark-090916114253-phpapp01 (1).pdf
 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
 
Network Protocol Analyzer
Network Protocol AnalyzerNetwork Protocol Analyzer
Network Protocol Analyzer
 
Network Monitoring with Wireshark
Network Monitoring with WiresharkNetwork Monitoring with Wireshark
Network Monitoring with Wireshark
 
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdfA Deeper Look into Network Traffic Analysis using Wireshark.pdf
A Deeper Look into Network Traffic Analysis using Wireshark.pdf
 
Voice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMINGVoice Over IP (VoIP) and STREAMING
Voice Over IP (VoIP) and STREAMING
 
Lab Exercise #4 IPv4 Dr. Anne Kohnke 1 Obj.docx
Lab Exercise #4 IPv4   Dr. Anne Kohnke  1  Obj.docxLab Exercise #4 IPv4   Dr. Anne Kohnke  1  Obj.docx
Lab Exercise #4 IPv4 Dr. Anne Kohnke 1 Obj.docx
 
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
 
Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems Performance Analysis of VoIP by Communicating Two Systems
Performance Analysis of VoIP by Communicating Two Systems
 
computer network NCC l4dc assingment
computer network NCC l4dc assingment computer network NCC l4dc assingment
computer network NCC l4dc assingment
 
Chapter 7 security tools i
Chapter 7   security tools iChapter 7   security tools i
Chapter 7 security tools i
 
Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008Network Critical @ Sharkfest 2008
Network Critical @ Sharkfest 2008
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 

Recently uploaded (20)

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 

Wireshark

  • 1. Wireshark Presented By: YOGEESH.B.R (1MS14IS422) VIDYASAGAR.K.G (1MS14IS421) SURESHA.H.N (1MS14IS419)
  • 2. Network Protocol Analyzer  Computer s/w or h/w, intercepts & logs traffic passing over the network  Captures packets, decodes & analyzes contents  A network Analyzer is used for  Troubleshooting problems on the network  Analyzing the performance of a network to discover bottlenecks  Network intrusion detection  Analyzing the operations of applications
  • 3. Overview  Introduction to Wireshark  Features  Uses > detecting VOIP problems > downloading FLV files  What it can’t do  Conclusion
  • 4. About Wireshark  It is a packet sniffer Computer application  Functionality is very similar to tcpdump  Has a GUI front-end and many more information sorting and filtering options  “eWeek” Labs named Wireshark one of "The Most Important Open-Source Apps of All Time" as of May 2, 2007
  • 5. Background  Initiated by Gerald Combs under the name Ethereal  First version was released in 1998  The name Wireshark was adopted in June 2006
  • 6. Features  “Understands" the structure of different network protocols.  Displays encapsulation and single fields and interprets their meaning.  It can only capture on networks supported by pcap.  It is cross-platform running on various OS (Linux, Mac OS X, Microsoft windows)
  • 7. WinP Cap  Industries –standard tool for link layer network access in windows environment  Allows application to capture and transmit network packets by passing the protocol stack  Consists of a driver-extends OS to provide low level network access  Consists of library for easy access to low level network layers  Also contains windows version of libPCap Unix API
  • 9. Applications of Wireshark  Exposing VOIP problems  Supports Malware Detection  Helps recognize DOS attack  Downloading FLV files
  • 10. Exposing VoIP Problems Using Wireshark  VoIP –Protocol Optimized for transmission of voice through Internet(IP telephoning)  VOIP is affected by Latency, Jitter and Packet Loss  Troubleshooting VoIP network with other protocol analyzer software is costly  VoIP involves complex setup protocols that wireshark can decode and relate  It provides excellent tools to interpret the data
  • 11. Exposing VOIP problems  VOIP suffers from three common problems > when a number is dialed, phone idles & no ringing is heard > only one party hears audio > missing conversation due to packet loss
  • 12. No Ringing  When wireshark is launched we must ensure that correct interface is being used  Wrong user name & password Phone host PBX host SIP INVITE PROXY Authentication required ACK
  • 15. One sided Audio  Uses advanced analysis tools  When capture is loaded, select Statistics->VOIP calls  Click on the call and Graph button- summary of SIP calls  Stream is set up between two end points by SIP using SDP  Decodes the protocol contained within currently selected packet
  • 18. Session Description Protocol Type: 3 (destination unreachable) Code: 1 (host unreachable) Checksum: 0x7a2
  • 19. Problem  Given IP address is private and unreachable  So when remote host sends packets, they are lost as no such route exists
  • 20. Partially audible conversation  Out of order packets are lost  Wireshark uses decoded packets to provide a list of all audio conversations
  • 21. Stream Analysis  Select Problematic stream-> Click Find Reverse button-> Click Analyze to provided packet by packet look at the stream  Lost packets will show up as having the wrong sequence number  Also Displays current bandwith,latency and jitter
  • 22. Audio replay  We can also listen to the content of the voice call  Select Save Payload button-> Select the .au file format-> press the OK button  The voice call is saved to your hard drive  Can be played by audio program like XMMS
  • 23. What it Cannot Do….  It cannot be used to map out a network  It does not generate network data-Passive tool  Only shows detail information about protocols it understand  It can only capture data as well as the OSInterfaceInterface driver supports.  An example of this is capturing data over wireless networks.
  • 24. Conclusion  Wireshark's wireless analysis features have grown to be a very powerful tool for troubleshooting and analyzing wireless networks.  With  Wireshark's display filters and powerful protocol dissector features, you can sift through large quantities of wireless traffic  Without a doubt, Wireshark is a powerful assessment and analysis tool for wireless networks that should be a part of every auditor, engineer, and consultant toolkit.