SlideShare a Scribd company logo
1 of 20
{
WIRESHARK
PRESENTED BY
ANKITA SINGH
MTECH(ISM)
00902052016
 HISTORY
 WHAT IS WIRESHARK
 STEPS TO INSTALL WIRESHARK
 HOMESCREEN
 TABS IN WIRESHARK
 HOW IT CAPTURE PACKETS
 SOME COMMANDS LINE
 PURPOSE
 FEATURES
CONTENT
 In late 1997 Gerald Combs needed a tool for tracking down network
problems called as-Ethereal
 In October, 1998 Guy Harris applied patches and contributing
dissectors to Ethereal.
 In 2006 the project moved house and re-emerged under a new
name: Wireshark.
 In 2008 Wireshark finally arrived at version 1.0.,with the minimum
features implemented. Its release coincided with the first Wireshark
Developer and User Conference, called Sharkfest.
 In 2015 Wireshark 2.0 was released, which featured a new user
interface.
HISTORY
1-Wireshark is a network packet analyzer. A network packet
analyzer will try to capture network packets and tries to
display that packet data as detailed as possible.
2-You could think of a network packet analyzer as a
measuring device used to examine what’s going on inside
a network cable.
WHAT IS WIRESHARK?
STEPS TO INSTALL WIRESHARK
1-Go to www.wireshark.org->download 64bit
package.
2-run application and click
on I agree
3-select tools and
click next
4-choose default
destination
location
5-installation start
running
6-recommendated to
install winPcap to
7-click on I agree to
install winPcap
8-this complete
installation part
and click finish
HOMESCREEN
TABS IN WIRESHARK
Conti….
Capture This menu allows you to start and
stop captures and to edit capture
filter
Analyze contains items to manipulate display
filters, enable or disable the dissection
of protocols, configure user specified
decodes and follow a TCP stream
Statistics contains items to display various
statistic windows, including a
summary of the packets that have
been captured, display protocol
hierarchy statistics and much more.
Telephony contains items to display various
telephony related statistic windows,
including a media analysis, flow
diagrams, display protocol hierarchy
statistics and much more.
Wireless The items in this menu show
Bluetooth and IEEE 802.11 wireless
statistics.
tool contains various tools available in
Wireshark, such as creating Firewall
ACL Rules
Help contains items to help the user, e.g.
access to some basic help, manual pages
of the various command line tools,
online access to some of the webpages,
and the usual about dialog.
Conti…..
 HOW IT CAPTURES PACKETS
- Wireshark captures packets and lets you examine
their contents.
- Select any interface to capture its packets
 No. shows the number of captured packet or index number.
 Time shows the time of capture
 Source shows the source ip of the packet or the packet is originally
generated from which source ip.
 Destination shows the destination ip where the packet is going.
 Protocol shows the which kind of protocol communication is held
between the source and destination.
 Info shows the data payload in the packet
Some command line use in filter
tcp.port eq 25 or icmp Show only SMTP (port 25) and ICMP
traffic:
ip.src==192.168.0.0/16 and
ip.dst==192.168.0.0/16
Show only traffic in the LAN
(192.168.x.x), between workstations and
servers -- no Internet:
tcp.window_size == 0 && tcp.flags.reset
!= 1
TCP buffer full -- Source is instructing
Destination to stop sending data
udp contains 81:60:03 Match packets that contains the 3-byte
sequence 0x81, 0x60, 0x03 anywhere in
the UDP header or payload:
! ( ip.addr == 10.43.54.65 ) This translates to "pass all traffic except
for traffic with a source IPv4 address of
10.43.54.65 and a destination IPv4
address of 10.43.54.65", which isn't what
we wanted.
Tcp or udp So all connection using tcp and udp
 Network administrators use it to troubleshoot
network problems
 Network security engineers use it to examine
security problems
 Developers use it to debug protocol
implementations
 People use it to learn network protocol
internals
PURPOSE
 Available for UNIX and Windows.
 Capture live packet data from a network interface.
 Open files containing packet data captured with
tcpdump/WinDump, Wireshark, and a number of other packet
capture programs.
 Import packets from text files containing hex dumps of packet
data.
 Display packets with very detailed protocol information.
 Save packet data captured.
 Export some or all packets in a number of capture file formats.
 Filter packets on many criteria.
 Search for packets on many criteria.
 Colorize packet display based on filters.
 Create various statistics.
FEATURES
Wireshark

More Related Content

What's hot

Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark Ashley Wheeler
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic AnalysisDavid Sweigert
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap OWASP Delhi
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li Inmhaviv
 
N map presentation
N map presentationN map presentation
N map presentationulirraptor
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniquesamiable_indian
 
Wireshark
WiresharkWireshark
Wiresharkbtohara
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsAnthony Daniel
 

What's hot (20)

Wireshark
WiresharkWireshark
Wireshark
 
Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Wireshark Traffic Analysis
Wireshark Traffic AnalysisWireshark Traffic Analysis
Wireshark Traffic Analysis
 
Recon with Nmap
Recon with Nmap Recon with Nmap
Recon with Nmap
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
 
Wireshark.pptx
Wireshark.pptxWireshark.pptx
Wireshark.pptx
 
N map presentation
N map presentationN map presentation
N map presentation
 
Wireshark ppt
Wireshark pptWireshark ppt
Wireshark ppt
 
Packet sniffing
Packet sniffingPacket sniffing
Packet sniffing
 
Wireshark
WiresharkWireshark
Wireshark
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 
wireshark
wiresharkwireshark
wireshark
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Security Onion
Security OnionSecurity Onion
Security Onion
 
Next generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefitsNext generation firewall(ngfw)feature and benefits
Next generation firewall(ngfw)feature and benefits
 
Nmap Basics
Nmap BasicsNmap Basics
Nmap Basics
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 

Similar to Wireshark

Network Monitoring with Wireshark
Network Monitoring with WiresharkNetwork Monitoring with Wireshark
Network Monitoring with WiresharkSiddharth Coontoor
 
Analysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkAnalysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkIJARIIT
 
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARKANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARKIJNSA Journal
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET Journal
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesSerious_SamSoul
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwoAKHIL969626
 
Wireshark Lab Getting Started v6.0 Supplement to Co.docx
Wireshark Lab  Getting Started v6.0  Supplement to Co.docxWireshark Lab  Getting Started v6.0  Supplement to Co.docx
Wireshark Lab Getting Started v6.0 Supplement to Co.docxambersalomon88660
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptIwan89629
 
Chapter 3. sensors in the network domain
Chapter 3. sensors in the network domainChapter 3. sensors in the network domain
Chapter 3. sensors in the network domainPhu Nguyen
 
How does internet works
How does internet worksHow does internet works
How does internet worksRamonNavarro46
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSVarinder Singh Walia
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LANRaj vardhan
 

Similar to Wireshark (20)

Network Monitoring with Wireshark
Network Monitoring with WiresharkNetwork Monitoring with Wireshark
Network Monitoring with Wireshark
 
Analysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wiresharkAnalysis of network traffic by using packet sniffing tool wireshark
Analysis of network traffic by using packet sniffing tool wireshark
 
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARKANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
 
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...
 
Module 1 slides
Module 1 slidesModule 1 slides
Module 1 slides
 
Lecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notesLecture 2 -_understanding_networks_with_presenter_notes
Lecture 2 -_understanding_networks_with_presenter_notes
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Wireshark Lab Getting Started v6.0 Supplement to Co.docx
Wireshark Lab  Getting Started v6.0  Supplement to Co.docxWireshark Lab  Getting Started v6.0  Supplement to Co.docx
Wireshark Lab Getting Started v6.0 Supplement to Co.docx
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.ppt
 
Wireshark
WiresharkWireshark
Wireshark
 
wireshark.pdf
wireshark.pdfwireshark.pdf
wireshark.pdf
 
NP-lab-manual (1).pdf
NP-lab-manual (1).pdfNP-lab-manual (1).pdf
NP-lab-manual (1).pdf
 
NP-lab-manual.pdf
NP-lab-manual.pdfNP-lab-manual.pdf
NP-lab-manual.pdf
 
Chapter 3. sensors in the network domain
Chapter 3. sensors in the network domainChapter 3. sensors in the network domain
Chapter 3. sensors in the network domain
 
How does internet works
How does internet worksHow does internet works
How does internet works
 
BASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALSBASIC TO ADVANCED NETWORKING TUTORIALS
BASIC TO ADVANCED NETWORKING TUTORIALS
 
NP-lab-manual.docx
NP-lab-manual.docxNP-lab-manual.docx
NP-lab-manual.docx
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
Cisco doc
Cisco docCisco doc
Cisco doc
 

Recently uploaded

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

Wireshark

  • 2.  HISTORY  WHAT IS WIRESHARK  STEPS TO INSTALL WIRESHARK  HOMESCREEN  TABS IN WIRESHARK  HOW IT CAPTURE PACKETS  SOME COMMANDS LINE  PURPOSE  FEATURES CONTENT
  • 3.  In late 1997 Gerald Combs needed a tool for tracking down network problems called as-Ethereal  In October, 1998 Guy Harris applied patches and contributing dissectors to Ethereal.  In 2006 the project moved house and re-emerged under a new name: Wireshark.  In 2008 Wireshark finally arrived at version 1.0.,with the minimum features implemented. Its release coincided with the first Wireshark Developer and User Conference, called Sharkfest.  In 2015 Wireshark 2.0 was released, which featured a new user interface. HISTORY
  • 4. 1-Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. 2-You could think of a network packet analyzer as a measuring device used to examine what’s going on inside a network cable. WHAT IS WIRESHARK?
  • 5. STEPS TO INSTALL WIRESHARK 1-Go to www.wireshark.org->download 64bit package.
  • 6. 2-run application and click on I agree
  • 7. 3-select tools and click next 4-choose default destination location
  • 9. 7-click on I agree to install winPcap 8-this complete installation part and click finish
  • 12. Conti…. Capture This menu allows you to start and stop captures and to edit capture filter Analyze contains items to manipulate display filters, enable or disable the dissection of protocols, configure user specified decodes and follow a TCP stream Statistics contains items to display various statistic windows, including a summary of the packets that have been captured, display protocol hierarchy statistics and much more. Telephony contains items to display various telephony related statistic windows, including a media analysis, flow diagrams, display protocol hierarchy statistics and much more.
  • 13. Wireless The items in this menu show Bluetooth and IEEE 802.11 wireless statistics. tool contains various tools available in Wireshark, such as creating Firewall ACL Rules Help contains items to help the user, e.g. access to some basic help, manual pages of the various command line tools, online access to some of the webpages, and the usual about dialog. Conti…..
  • 14.  HOW IT CAPTURES PACKETS - Wireshark captures packets and lets you examine their contents. - Select any interface to capture its packets
  • 15.
  • 16.  No. shows the number of captured packet or index number.  Time shows the time of capture  Source shows the source ip of the packet or the packet is originally generated from which source ip.  Destination shows the destination ip where the packet is going.  Protocol shows the which kind of protocol communication is held between the source and destination.  Info shows the data payload in the packet
  • 17. Some command line use in filter tcp.port eq 25 or icmp Show only SMTP (port 25) and ICMP traffic: ip.src==192.168.0.0/16 and ip.dst==192.168.0.0/16 Show only traffic in the LAN (192.168.x.x), between workstations and servers -- no Internet: tcp.window_size == 0 && tcp.flags.reset != 1 TCP buffer full -- Source is instructing Destination to stop sending data udp contains 81:60:03 Match packets that contains the 3-byte sequence 0x81, 0x60, 0x03 anywhere in the UDP header or payload: ! ( ip.addr == 10.43.54.65 ) This translates to "pass all traffic except for traffic with a source IPv4 address of 10.43.54.65 and a destination IPv4 address of 10.43.54.65", which isn't what we wanted. Tcp or udp So all connection using tcp and udp
  • 18.  Network administrators use it to troubleshoot network problems  Network security engineers use it to examine security problems  Developers use it to debug protocol implementations  People use it to learn network protocol internals PURPOSE
  • 19.  Available for UNIX and Windows.  Capture live packet data from a network interface.  Open files containing packet data captured with tcpdump/WinDump, Wireshark, and a number of other packet capture programs.  Import packets from text files containing hex dumps of packet data.  Display packets with very detailed protocol information.  Save packet data captured.  Export some or all packets in a number of capture file formats.  Filter packets on many criteria.  Search for packets on many criteria.  Colorize packet display based on filters.  Create various statistics. FEATURES