SlideShare a Scribd company logo
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 1
Lesson 3 – Locating Wireshark
Network analysis Using Wireshark
Lesson 3:
Wireshark Basics
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 2
• By the end of this lesson, the participant will be able to:
▫ Understand Port-mirror and Taps
▫ Understand how to locate Wireshark in the networks for best
monitoring
Lesson Objectives
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 3
yoram@ndi-com.com
For More lectures, Courses & Keynote Speaking
Contact Me to:
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 4
L2/L3 network operation
Where to locate Wireshark
Taps and port-mirror
Local and remote monitoring
Capture data from multiple interfaces
Capture data on virtual machines
Chapter Content
“You only live once, but if you do it
right, once is enough.”
Mae West
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 5
Reminder – How a LAN Switch Works
Sw
Segment A
Segment B
B3
A1 A2 A3
B2B1
A1
A2
A3
B1
B2
B3
C5
C6
C7
C5
C6
C7
Segment C
Decision Table
A1A3 Block
A1B1 Forward to port B
A1C7 Forward to port C
A1BC Forward to all (flood)
A1D7 Forward to all (flood)
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 6
The Big Picture
SA: M1
SA: M1
SA: M1
SA: M1
SA: M1
SA: M1
SA: M1
Frame send
To M1
DA: M1
DA: M1
DA: M1
DA: M1
DA: M1
DA: M1
M – MAC Address
SA – Source (MAC) address
DA – Destination (MAC) address
SW1
Broadcast
sent
SW4SW3SW2
SW5 SW6 SW7
1
SA: M1 SA: M1
SA: M1
SA: M1
2
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 7
The Big Picture
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8
1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8
SA: M1
SA: M1
SA: M1
SA: M1
SA: M1
SA: M1
SA: M1
Frame send
To M1
DA: M1
DA: M1
DA: M1
DA: M1
DA: M1
DA: M1
M – MAC Address
SA – Source (MAC) address
DA – Destination (MAC) address
1 2 3 4 5 6 7 8
SW1
Broadcast
sent
SW4SW3SW2
SW5 SW6 SW7
1
SA: M1 SA: M1
SA: M1
SA: M1
2
To ISP
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 8
L2/L3 network operation
Where to locate Wireshark
Taps and port-mirror
Local and remote monitoring
Capture data from multiple interfaces
Capture data on virtual machines
Chapter Content
“The real danger is not that computers will
begin to think like men, but that men will
begin to think like computers.”
Sydney Harris
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 9
Were to Locate the Wireshark?
To ISP
For server monitoring:
Connect the laptop to the LAN
switch, with port mirror to the
monitored server
For WAN monitoring:
Connect the laptop to the LAN
switch, with port mirror to the
monitored router
For Internet connectivity
monitoring:
Before or after the Firewall
Remote office monitoring:
On the WAN side
Remote office monitoring:
On the LAN side
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 10
L2/L3 network operation
Where to locate Wireshark
Taps and port-mirror
Local and remote monitoring
Capture data from multiple interfaces
Capture data on virtual machines
Chapter Content
“Live as if you were to die tomorrow. Learn as if
you were to live forever.”
Mahatma Gandhi
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 11
Port Mirror / Port Monitor
Monitoring
port
SDSD SD SD
Monitored
port
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 12
Double Vision – What Happened Here?
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 13
TAP (Test Access Point)
http://www.fullcontrolnetworks.co.uk/faq-category/popular-questions/
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 14
L2/L3 network operation
Where to locate Wireshark
Taps and port-mirror
Local and remote monitoring
Capture data from multiple interfaces
Capture data on virtual machines
Chapter Content
“To live is the rarest thing in the world. Most
people exist, that is all.”
Oscar Wilde
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 15
Local Monitoring
• Choose the interface
• Configure capture filter (optional)
• Start capture of data
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 16
• From Menu  Options:
• Choose Manage Interfaces…
Remote Monitoring (1) – On Local machine
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 17
Remote Monitoring (2) – On Local Machine
• You get the following window
• Choose Remote Interfaces…
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 18
Remote Monitoring (3) – On Local machine
• You will get the following window
• Click on the (+) icon, and the following
window opens
• Configure Host IP/Name of the remote
machine
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 19
• Install Winpcap on the
remote PCs
▫ Configure the firewall so
that TCP port 2002 will be
accessible from your
machine
• Add a user to the PC user
list, give it a password, and
administrator privileges.
Remote Monitoring (4) - On Remote machine
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 20
• Start the Remote Packet Capture Protocol service
• Write-click on the Start symbol down left the Windows
screen, choose Open Windows Explorer, right-click on
Computer and choose Manage.
Remote Monitoring (5) - On Remote machine
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 21
L2/L3 network operation
Where to locate Wireshark
Taps and port-mirror
Local and remote monitoring
Capture data from multiple interfaces
Capture data on virtual machines
Chapter Content
“A friend is someone who knows all about you
and still loves you.”
Elbert Hubbard
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 22
Capture Data from Multiple Interfaces
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 23
L2/L3 network operation
Where to locate Wireshark
Taps and port-mirror
Local and remote monitoring
Capture data from multiple interfaces
Capture data on virtual machines
Chapter Content
“Any fool can know. The point is to understand.”
Albert Einstein
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 24
HW
Virtualization
Software
Guest
OS 1
Guest
OS 2
Guest
OS 3
App
External LAN Switch
1 2 3 4
7 8 9 10
5 6
11 12
NIC1 NIC2
A
p
p
A
p
p
App
What is a Virtual Machine
And How to monitor Traffic to it
1. Port mirror from LAG (ports 1/2)
to port 7 that the laptop is
connected to
2. Two port mirrors (1 to 8, 2 to 9)
with capture from multiple
interfaces
1 2
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 25
Connecting to a Blade Center
Eth1
Eth2
Eth1
Eth2
Eth1
Eth2
Eth1
Eth2
Eth1
Eth2
Eth1
Eth2
. .
.
Internal LAN Switch
Ext 1 Ext 2 Ext 3 Ext 4
Int1 Int2 Int3 Int4 Int5 Int6 Int7 Int8
Internal LAN Switch
Ext 1 Ext 2 Ext 3 Ext 4
Int1 Int2 Int3 Int4 Int5 Int6 Int7 Int8
BLADE
Center
External LAN Switch
1 2 3 4
7 8 9 10
5 6
11 12
External LAN Switch
1 2 3 4
7 8 9 10
5 6
11 12
To organization network
S – Server
SB – Server Blade
Eth – Ethernet
Int – Internal
Ext - External
SB-1 SB-2 SB-3 SB-4 SB-5 SB-6
S
2
S
2
S5
S
3
S6
S
4
S
7
S
8
1
2
3
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 26
Monitoring a Blade Center
Eth1
Eth2
Eth1
Eth2
Eth1
Eth2
Eth1
Eth2
Eth1
Eth2
Eth1
Eth2
. .
.
Internal LAN Switch
Ext 1 Ext 2 Ext 3 Ext 4
Int1 Int2 Int3 Int4 Int5 Int6 Int7 Int8
Internal LAN Switch
Ext 1 Ext 2 Ext 3 Ext 4
Int1 Int2 Int3 Int4 Int5 Int6 Int7 Int8
BLADE
Center
External LAN Switch
1 2 3 4
7 8 9 10
5 6
11 12
External LAN Switch
1 2 3 4
7 8 9 10
5 6
11 12
To organization network
S – Server
SB – Server Blade
Eth – Ethernet
Int – Internal
Ext - External
SB-1 SB-2 SB-3 SB-4 SB-5 SB-6
S
2
S
2
S5
S
3
S6
S
4
S
7
S
8
1
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 27
Summary
• In this lesson we talked about:
▫ Where to locate Wireshark in the network
▫ How to use taps and port mirror
▫ How to use Wireshark in virtual environment
Thanks for your time
Yoram Orzach
yoram@ndi-com.com
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 28
yoram@ndi-com.com
For More lectures, Courses & Keynote Speaking
Contact Me to:

More Related Content

What's hot

Network analysis Using Wireshark Lesson 1- introduction to network troublesho...
Network analysis Using Wireshark Lesson 1- introduction to network troublesho...Network analysis Using Wireshark Lesson 1- introduction to network troublesho...
Network analysis Using Wireshark Lesson 1- introduction to network troublesho...
Yoram Orzach
 
Network Analysis using Wireshark 5: display filters
Network Analysis using Wireshark 5: display filtersNetwork Analysis using Wireshark 5: display filters
Network Analysis using Wireshark 5: display filters
Yoram Orzach
 
Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis
Yoram Orzach
 
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Network analysis Using Wireshark Lesson 11: TCP and UDP AnalysisNetwork analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Yoram Orzach
 
Network Analysis Using Wireshark Jan 18- seminar
Network Analysis Using Wireshark Jan 18- seminar Network Analysis Using Wireshark Jan 18- seminar
Network Analysis Using Wireshark Jan 18- seminar
Yoram Orzach
 
Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1
Yoram Orzach
 
Ch 01 --- introduction to sdn-nfv
Ch 01 --- introduction to sdn-nfvCh 01 --- introduction to sdn-nfv
Ch 01 --- introduction to sdn-nfv
Yoram Orzach
 
Ch 06 -- Bandwidth Delay and Jitter Issues
Ch 06 -- Bandwidth Delay and Jitter IssuesCh 06 -- Bandwidth Delay and Jitter Issues
Ch 06 -- Bandwidth Delay and Jitter Issues
Yoram Orzach
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
Yoram Orzach
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
Jim Gilsinn
 
Ch 07 -- The Expert System
Ch 07 -- The Expert SystemCh 07 -- The Expert System
Ch 07 -- The Expert System
Yoram Orzach
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
mhaviv
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_03
Packet analyzing with wireshark-basic of packet analyzing - Episode_03Packet analyzing with wireshark-basic of packet analyzing - Episode_03
Packet analyzing with wireshark-basic of packet analyzing - Episode_03
Dhananja Kariyawasam
 
Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wireshark
Yoram Orzach
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
Yoram Orzach
 
Silverlight Wireshark Analysis
Silverlight Wireshark AnalysisSilverlight Wireshark Analysis
Silverlight Wireshark Analysis
Yoss Cohen
 
SSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkSSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wireshark
Al Imran, CISA
 
Wireshark ppt
Wireshark pptWireshark ppt
Wireshark ppt
bala150985
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
Basaveswar Kureti
 

What's hot (20)

Network analysis Using Wireshark Lesson 1- introduction to network troublesho...
Network analysis Using Wireshark Lesson 1- introduction to network troublesho...Network analysis Using Wireshark Lesson 1- introduction to network troublesho...
Network analysis Using Wireshark Lesson 1- introduction to network troublesho...
 
Network Analysis using Wireshark 5: display filters
Network Analysis using Wireshark 5: display filtersNetwork Analysis using Wireshark 5: display filters
Network Analysis using Wireshark 5: display filters
 
Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis Network Analysis Using Wireshark -10- arp and ip analysis
Network Analysis Using Wireshark -10- arp and ip analysis
 
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Network analysis Using Wireshark Lesson 11: TCP and UDP AnalysisNetwork analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
 
Network Analysis Using Wireshark Jan 18- seminar
Network Analysis Using Wireshark Jan 18- seminar Network Analysis Using Wireshark Jan 18- seminar
Network Analysis Using Wireshark Jan 18- seminar
 
Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1
 
Ch 01 --- introduction to sdn-nfv
Ch 01 --- introduction to sdn-nfvCh 01 --- introduction to sdn-nfv
Ch 01 --- introduction to sdn-nfv
 
Ch 06 -- Bandwidth Delay and Jitter Issues
Ch 06 -- Bandwidth Delay and Jitter IssuesCh 06 -- Bandwidth Delay and Jitter Issues
Ch 06 -- Bandwidth Delay and Jitter Issues
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Ch 07 -- The Expert System
Ch 07 -- The Expert SystemCh 07 -- The Expert System
Ch 07 -- The Expert System
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_03
Packet analyzing with wireshark-basic of packet analyzing - Episode_03Packet analyzing with wireshark-basic of packet analyzing - Episode_03
Packet analyzing with wireshark-basic of packet analyzing - Episode_03
 
Wireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wiresharkWireshark course, Ch 02: Introduction to wireshark
Wireshark course, Ch 02: Introduction to wireshark
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Silverlight Wireshark Analysis
Silverlight Wireshark AnalysisSilverlight Wireshark Analysis
Silverlight Wireshark Analysis
 
SSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wiresharkSSL basics and SSL packet analysis using wireshark
SSL basics and SSL packet analysis using wireshark
 
Wireshark ppt
Wireshark pptWireshark ppt
Wireshark ppt
 
Wireshark
WiresharkWireshark
Wireshark
 
Packet analysis using wireshark
Packet analysis using wiresharkPacket analysis using wireshark
Packet analysis using wireshark
 

Similar to Network analysis Using Wireshark Lesson 3: locating wireshark

Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
AKHIL969626
 
W4 profinet frame analysis, peter thomas
W4 profinet frame analysis, peter thomasW4 profinet frame analysis, peter thomas
W4 profinet frame analysis, peter thomas
PROFIBUS and PROFINET InternationaI - PI UK
 
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
Santhosh Kumar
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
Freddy Buenaño
 
Exploiting WiFi Security
Exploiting WiFi Security Exploiting WiFi Security
Exploiting WiFi Security
Hariraj Rathod
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkArunabh Mishra
 
3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic
Rio Ap
 
Network Telemetry: Pushing Boundaries
Network Telemetry: Pushing BoundariesNetwork Telemetry: Pushing Boundaries
Network Telemetry: Pushing Boundaries
Ram (Ramki) Krishnan
 
PROFIBUS frame analysis - Peter Thomas of Control Specialists
PROFIBUS frame analysis - Peter Thomas of Control SpecialistsPROFIBUS frame analysis - Peter Thomas of Control Specialists
PROFIBUS frame analysis - Peter Thomas of Control Specialists
PROFIBUS and PROFINET InternationaI - PI UK
 
Wireshark Tool - Features & Benefits.pdf
Wireshark Tool - Features & Benefits.pdfWireshark Tool - Features & Benefits.pdf
Wireshark Tool - Features & Benefits.pdf
DataSpace Academy
 
PhD-Guidance-in-Computer-Networking
PhD-Guidance-in-Computer-NetworkingPhD-Guidance-in-Computer-Networking
PhD-Guidance-in-Computer-Networking
Phdtopiccom
 
5324358-WARDRIVING.ppt
5324358-WARDRIVING.ppt5324358-WARDRIVING.ppt
5324358-WARDRIVING.ppt
ysuryawanshi749
 
Virtualization & Network Connectivity
Virtualization & Network Connectivity Virtualization & Network Connectivity
Virtualization & Network Connectivity
itplant
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
EnergySec
 
How to Hack WiFi on Windows
How to Hack WiFi  on Windows How to Hack WiFi  on Windows
How to Hack WiFi on Windows
Vrushank Narola
 
Wireless Pentesting: It's more than cracking WEP
Wireless Pentesting: It's  more than cracking WEPWireless Pentesting: It's  more than cracking WEP
Wireless Pentesting: It's more than cracking WEP
Joe McCray
 
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Prince Mishra
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hackingMihir Shah
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
Nilesh Sapariya
 
Question 1 Which of the following statements is true regarding Wir.docx
Question 1 Which of the following statements is true regarding Wir.docxQuestion 1 Which of the following statements is true regarding Wir.docx
Question 1 Which of the following statements is true regarding Wir.docx
JUST36
 

Similar to Network analysis Using Wireshark Lesson 3: locating wireshark (20)

Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
W4 profinet frame analysis, peter thomas
W4 profinet frame analysis, peter thomasW4 profinet frame analysis, peter thomas
W4 profinet frame analysis, peter thomas
 
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
OWASP Appsec USA 2014 Talk "Pwning the Pawns with Wihawk" Santhosh Kumar
 
26.1.7 lab snort and firewall rules
26.1.7 lab   snort and firewall rules26.1.7 lab   snort and firewall rules
26.1.7 lab snort and firewall rules
 
Exploiting WiFi Security
Exploiting WiFi Security Exploiting WiFi Security
Exploiting WiFi Security
 
IEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh NetworkIEEE 802.11s - Wireless Mesh Network
IEEE 802.11s - Wireless Mesh Network
 
3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic
 
Network Telemetry: Pushing Boundaries
Network Telemetry: Pushing BoundariesNetwork Telemetry: Pushing Boundaries
Network Telemetry: Pushing Boundaries
 
PROFIBUS frame analysis - Peter Thomas of Control Specialists
PROFIBUS frame analysis - Peter Thomas of Control SpecialistsPROFIBUS frame analysis - Peter Thomas of Control Specialists
PROFIBUS frame analysis - Peter Thomas of Control Specialists
 
Wireshark Tool - Features & Benefits.pdf
Wireshark Tool - Features & Benefits.pdfWireshark Tool - Features & Benefits.pdf
Wireshark Tool - Features & Benefits.pdf
 
PhD-Guidance-in-Computer-Networking
PhD-Guidance-in-Computer-NetworkingPhD-Guidance-in-Computer-Networking
PhD-Guidance-in-Computer-Networking
 
5324358-WARDRIVING.ppt
5324358-WARDRIVING.ppt5324358-WARDRIVING.ppt
5324358-WARDRIVING.ppt
 
Virtualization & Network Connectivity
Virtualization & Network Connectivity Virtualization & Network Connectivity
Virtualization & Network Connectivity
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
 
How to Hack WiFi on Windows
How to Hack WiFi  on Windows How to Hack WiFi  on Windows
How to Hack WiFi on Windows
 
Wireless Pentesting: It's more than cracking WEP
Wireless Pentesting: It's  more than cracking WEPWireless Pentesting: It's  more than cracking WEP
Wireless Pentesting: It's more than cracking WEP
 
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
Imperfection_Is_Beautiful.111_2016_04_13_19_07_54_722
 
Wireless hacking
Wireless hackingWireless hacking
Wireless hacking
 
Wireless Security null seminar
Wireless Security null seminarWireless Security null seminar
Wireless Security null seminar
 
Question 1 Which of the following statements is true regarding Wir.docx
Question 1 Which of the following statements is true regarding Wir.docxQuestion 1 Which of the following statements is true regarding Wir.docx
Question 1 Which of the following statements is true regarding Wir.docx
 

More from Yoram Orzach

Ch 05 --- nfv basics
Ch 05 --- nfv basicsCh 05 --- nfv basics
Ch 05 --- nfv basics
Yoram Orzach
 
Ch 04 --- sdn deployment models
Ch 04 --- sdn deployment modelsCh 04 --- sdn deployment models
Ch 04 --- sdn deployment models
Yoram Orzach
 
Ch 03 --- the OpenFlow protocols
Ch 03 --- the OpenFlow protocolsCh 03 --- the OpenFlow protocols
Ch 03 --- the OpenFlow protocols
Yoram Orzach
 
Ch 02 --- sdn and openflow architecture
Ch 02 --- sdn and openflow architectureCh 02 --- sdn and openflow architecture
Ch 02 --- sdn and openflow architecture
Yoram Orzach
 
Ch 09 -- ARP & IP Analysis
Ch 09 -- ARP & IP AnalysisCh 09 -- ARP & IP Analysis
Ch 09 -- ARP & IP Analysis
Yoram Orzach
 
Wireshark course, Ch 05: Advanced statistics tools
Wireshark course, Ch 05: Advanced statistics toolsWireshark course, Ch 05: Advanced statistics tools
Wireshark course, Ch 05: Advanced statistics tools
Yoram Orzach
 
Wireshark course, Ch 03: Capture and display filters
Wireshark course, Ch 03: Capture and display filtersWireshark course, Ch 03: Capture and display filters
Wireshark course, Ch 03: Capture and display filters
Yoram Orzach
 
Introduction To Cellular Networks
Introduction To Cellular NetworksIntroduction To Cellular Networks
Introduction To Cellular NetworksYoram Orzach
 
Introduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless NetworksIntroduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless Networks
Yoram Orzach
 

More from Yoram Orzach (9)

Ch 05 --- nfv basics
Ch 05 --- nfv basicsCh 05 --- nfv basics
Ch 05 --- nfv basics
 
Ch 04 --- sdn deployment models
Ch 04 --- sdn deployment modelsCh 04 --- sdn deployment models
Ch 04 --- sdn deployment models
 
Ch 03 --- the OpenFlow protocols
Ch 03 --- the OpenFlow protocolsCh 03 --- the OpenFlow protocols
Ch 03 --- the OpenFlow protocols
 
Ch 02 --- sdn and openflow architecture
Ch 02 --- sdn and openflow architectureCh 02 --- sdn and openflow architecture
Ch 02 --- sdn and openflow architecture
 
Ch 09 -- ARP & IP Analysis
Ch 09 -- ARP & IP AnalysisCh 09 -- ARP & IP Analysis
Ch 09 -- ARP & IP Analysis
 
Wireshark course, Ch 05: Advanced statistics tools
Wireshark course, Ch 05: Advanced statistics toolsWireshark course, Ch 05: Advanced statistics tools
Wireshark course, Ch 05: Advanced statistics tools
 
Wireshark course, Ch 03: Capture and display filters
Wireshark course, Ch 03: Capture and display filtersWireshark course, Ch 03: Capture and display filters
Wireshark course, Ch 03: Capture and display filters
 
Introduction To Cellular Networks
Introduction To Cellular NetworksIntroduction To Cellular Networks
Introduction To Cellular Networks
 
Introduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless NetworksIntroduction To Cellular And Wireless Networks
Introduction To Cellular And Wireless Networks
 

Recently uploaded

Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...
Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...
Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...
Summerland Environmental
 
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
RNayak3
 
Emmanuel Katto Uganda - A Philanthropist
Emmanuel Katto Uganda - A PhilanthropistEmmanuel Katto Uganda - A Philanthropist
Emmanuel Katto Uganda - A Philanthropist
Marina Costa
 
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptxTop Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Merchantech - Payment Processing Services
 
Top Email Marketing Trends to Watch in 2024
Top Email Marketing Trends to Watch in 2024Top Email Marketing Trends to Watch in 2024
Top Email Marketing Trends to Watch in 2024
time4servers technologies
 
Comprehensive Water Damage Restoration Services
Comprehensive Water Damage Restoration ServicesComprehensive Water Damage Restoration Services
Comprehensive Water Damage Restoration Services
kleenupdisaster
 
Best steel industrial company LLC in UAE
Best steel industrial company LLC in UAEBest steel industrial company LLC in UAE
Best steel industrial company LLC in UAE
alafnanmetals
 
Unlocking Business Potential: Democratizing AI and Navigating Generative AI i...
Unlocking Business Potential: Democratizing AI and Navigating Generative AI i...Unlocking Business Potential: Democratizing AI and Navigating Generative AI i...
Unlocking Business Potential: Democratizing AI and Navigating Generative AI i...
RNayak3
 
Copy Trading Forex Brokers 2024 ptx
Copy Trading Forex Brokers 2024      ptxCopy Trading Forex Brokers 2024      ptx
Copy Trading Forex Brokers 2024 ptx
Brokerreviewfx
 
Keyword Density Evolution: Elevating SEO Excellence, Leading as Top SEO Agenc...
Keyword Density Evolution: Elevating SEO Excellence, Leading as Top SEO Agenc...Keyword Density Evolution: Elevating SEO Excellence, Leading as Top SEO Agenc...
Keyword Density Evolution: Elevating SEO Excellence, Leading as Top SEO Agenc...
Barrownz.in
 
Spanish Marriage Certificate Attestation in Dubai
Spanish Marriage Certificate Attestation in DubaiSpanish Marriage Certificate Attestation in Dubai
Spanish Marriage Certificate Attestation in Dubai
Attestation On Time
 
Discover How Long Do Aluminum Gutters Last?
Discover How Long Do Aluminum Gutters Last?Discover How Long Do Aluminum Gutters Last?
Discover How Long Do Aluminum Gutters Last?
SteveRiddle8
 
Satrya Jaya Mulia - Company Profile - 2024 - CS PROJECT.pptx
Satrya Jaya Mulia - Company Profile - 2024 - CS PROJECT.pptxSatrya Jaya Mulia - Company Profile - 2024 - CS PROJECT.pptx
Satrya Jaya Mulia - Company Profile - 2024 - CS PROJECT.pptx
RichoRamadhan2
 
Office Business Furnishings | Office Equipment
Office Business Furnishings |  Office EquipmentOffice Business Furnishings |  Office Equipment
Office Business Furnishings | Office Equipment
OFWD
 
Bridging the Language Gap The Power of Simultaneous Interpretation in Rwanda
Bridging the Language Gap The Power of Simultaneous Interpretation in RwandaBridging the Language Gap The Power of Simultaneous Interpretation in Rwanda
Bridging the Language Gap The Power of Simultaneous Interpretation in Rwanda
Kasuku Translation Ltd
 
The Best Premium IPTV Service Frane.docx
The Best Premium IPTV Service Frane.docxThe Best Premium IPTV Service Frane.docx
The Best Premium IPTV Service Frane.docx
Industry Foods UK
 
DOJO Training Center - Empowering Workforce Excellence
DOJO Training Center - Empowering Workforce ExcellenceDOJO Training Center - Empowering Workforce Excellence
DOJO Training Center - Empowering Workforce Excellence
Himanshu
 
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROLSECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
securexukweb
 
Solar Panel For Home Price List In india
Solar Panel For Home Price List In indiaSolar Panel For Home Price List In india
Solar Panel For Home Price List In india
janhaviconaxweb
 
eBrand Promotion Full Service Digital Agency Company Profile
eBrand Promotion Full Service Digital Agency Company ProfileeBrand Promotion Full Service Digital Agency Company Profile
eBrand Promotion Full Service Digital Agency Company Profile
ChimaOrjiOkpi
 

Recently uploaded (20)

Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...
Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...
Sustainable Solutions for Chemical Waste Disposal by Summerland Environmental...
 
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
Unlocking Insights: AI-powered Enhanced Due Diligence Strategies for Increase...
 
Emmanuel Katto Uganda - A Philanthropist
Emmanuel Katto Uganda - A PhilanthropistEmmanuel Katto Uganda - A Philanthropist
Emmanuel Katto Uganda - A Philanthropist
 
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptxTop Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
Top Challenges Faced by High-Risk Merchants and How to Overcome Them.pptx
 
Top Email Marketing Trends to Watch in 2024
Top Email Marketing Trends to Watch in 2024Top Email Marketing Trends to Watch in 2024
Top Email Marketing Trends to Watch in 2024
 
Comprehensive Water Damage Restoration Services
Comprehensive Water Damage Restoration ServicesComprehensive Water Damage Restoration Services
Comprehensive Water Damage Restoration Services
 
Best steel industrial company LLC in UAE
Best steel industrial company LLC in UAEBest steel industrial company LLC in UAE
Best steel industrial company LLC in UAE
 
Unlocking Business Potential: Democratizing AI and Navigating Generative AI i...
Unlocking Business Potential: Democratizing AI and Navigating Generative AI i...Unlocking Business Potential: Democratizing AI and Navigating Generative AI i...
Unlocking Business Potential: Democratizing AI and Navigating Generative AI i...
 
Copy Trading Forex Brokers 2024 ptx
Copy Trading Forex Brokers 2024      ptxCopy Trading Forex Brokers 2024      ptx
Copy Trading Forex Brokers 2024 ptx
 
Keyword Density Evolution: Elevating SEO Excellence, Leading as Top SEO Agenc...
Keyword Density Evolution: Elevating SEO Excellence, Leading as Top SEO Agenc...Keyword Density Evolution: Elevating SEO Excellence, Leading as Top SEO Agenc...
Keyword Density Evolution: Elevating SEO Excellence, Leading as Top SEO Agenc...
 
Spanish Marriage Certificate Attestation in Dubai
Spanish Marriage Certificate Attestation in DubaiSpanish Marriage Certificate Attestation in Dubai
Spanish Marriage Certificate Attestation in Dubai
 
Discover How Long Do Aluminum Gutters Last?
Discover How Long Do Aluminum Gutters Last?Discover How Long Do Aluminum Gutters Last?
Discover How Long Do Aluminum Gutters Last?
 
Satrya Jaya Mulia - Company Profile - 2024 - CS PROJECT.pptx
Satrya Jaya Mulia - Company Profile - 2024 - CS PROJECT.pptxSatrya Jaya Mulia - Company Profile - 2024 - CS PROJECT.pptx
Satrya Jaya Mulia - Company Profile - 2024 - CS PROJECT.pptx
 
Office Business Furnishings | Office Equipment
Office Business Furnishings |  Office EquipmentOffice Business Furnishings |  Office Equipment
Office Business Furnishings | Office Equipment
 
Bridging the Language Gap The Power of Simultaneous Interpretation in Rwanda
Bridging the Language Gap The Power of Simultaneous Interpretation in RwandaBridging the Language Gap The Power of Simultaneous Interpretation in Rwanda
Bridging the Language Gap The Power of Simultaneous Interpretation in Rwanda
 
The Best Premium IPTV Service Frane.docx
The Best Premium IPTV Service Frane.docxThe Best Premium IPTV Service Frane.docx
The Best Premium IPTV Service Frane.docx
 
DOJO Training Center - Empowering Workforce Excellence
DOJO Training Center - Empowering Workforce ExcellenceDOJO Training Center - Empowering Workforce Excellence
DOJO Training Center - Empowering Workforce Excellence
 
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROLSECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
SECUREX UK FOR SECURITY SERVICES AND MOBILE PATROL
 
Solar Panel For Home Price List In india
Solar Panel For Home Price List In indiaSolar Panel For Home Price List In india
Solar Panel For Home Price List In india
 
eBrand Promotion Full Service Digital Agency Company Profile
eBrand Promotion Full Service Digital Agency Company ProfileeBrand Promotion Full Service Digital Agency Company Profile
eBrand Promotion Full Service Digital Agency Company Profile
 

Network analysis Using Wireshark Lesson 3: locating wireshark

  • 1. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 1 Lesson 3 – Locating Wireshark Network analysis Using Wireshark Lesson 3: Wireshark Basics
  • 2. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 2 • By the end of this lesson, the participant will be able to: ▫ Understand Port-mirror and Taps ▫ Understand how to locate Wireshark in the networks for best monitoring Lesson Objectives
  • 3. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 3 yoram@ndi-com.com For More lectures, Courses & Keynote Speaking Contact Me to:
  • 4. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 4 L2/L3 network operation Where to locate Wireshark Taps and port-mirror Local and remote monitoring Capture data from multiple interfaces Capture data on virtual machines Chapter Content “You only live once, but if you do it right, once is enough.” Mae West
  • 5. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 5 Reminder – How a LAN Switch Works Sw Segment A Segment B B3 A1 A2 A3 B2B1 A1 A2 A3 B1 B2 B3 C5 C6 C7 C5 C6 C7 Segment C Decision Table A1A3 Block A1B1 Forward to port B A1C7 Forward to port C A1BC Forward to all (flood) A1D7 Forward to all (flood)
  • 6. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 6 The Big Picture SA: M1 SA: M1 SA: M1 SA: M1 SA: M1 SA: M1 SA: M1 Frame send To M1 DA: M1 DA: M1 DA: M1 DA: M1 DA: M1 DA: M1 M – MAC Address SA – Source (MAC) address DA – Destination (MAC) address SW1 Broadcast sent SW4SW3SW2 SW5 SW6 SW7 1 SA: M1 SA: M1 SA: M1 SA: M1 2
  • 7. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 7 The Big Picture 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 SA: M1 SA: M1 SA: M1 SA: M1 SA: M1 SA: M1 SA: M1 Frame send To M1 DA: M1 DA: M1 DA: M1 DA: M1 DA: M1 DA: M1 M – MAC Address SA – Source (MAC) address DA – Destination (MAC) address 1 2 3 4 5 6 7 8 SW1 Broadcast sent SW4SW3SW2 SW5 SW6 SW7 1 SA: M1 SA: M1 SA: M1 SA: M1 2 To ISP
  • 8. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 8 L2/L3 network operation Where to locate Wireshark Taps and port-mirror Local and remote monitoring Capture data from multiple interfaces Capture data on virtual machines Chapter Content “The real danger is not that computers will begin to think like men, but that men will begin to think like computers.” Sydney Harris
  • 9. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 9 Were to Locate the Wireshark? To ISP For server monitoring: Connect the laptop to the LAN switch, with port mirror to the monitored server For WAN monitoring: Connect the laptop to the LAN switch, with port mirror to the monitored router For Internet connectivity monitoring: Before or after the Firewall Remote office monitoring: On the WAN side Remote office monitoring: On the LAN side
  • 10. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 10 L2/L3 network operation Where to locate Wireshark Taps and port-mirror Local and remote monitoring Capture data from multiple interfaces Capture data on virtual machines Chapter Content “Live as if you were to die tomorrow. Learn as if you were to live forever.” Mahatma Gandhi
  • 11. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 11 Port Mirror / Port Monitor Monitoring port SDSD SD SD Monitored port
  • 12. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 12 Double Vision – What Happened Here?
  • 13. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 13 TAP (Test Access Point) http://www.fullcontrolnetworks.co.uk/faq-category/popular-questions/
  • 14. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 14 L2/L3 network operation Where to locate Wireshark Taps and port-mirror Local and remote monitoring Capture data from multiple interfaces Capture data on virtual machines Chapter Content “To live is the rarest thing in the world. Most people exist, that is all.” Oscar Wilde
  • 15. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 15 Local Monitoring • Choose the interface • Configure capture filter (optional) • Start capture of data
  • 16. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 16 • From Menu  Options: • Choose Manage Interfaces… Remote Monitoring (1) – On Local machine
  • 17. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 17 Remote Monitoring (2) – On Local Machine • You get the following window • Choose Remote Interfaces…
  • 18. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 18 Remote Monitoring (3) – On Local machine • You will get the following window • Click on the (+) icon, and the following window opens • Configure Host IP/Name of the remote machine
  • 19. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 19 • Install Winpcap on the remote PCs ▫ Configure the firewall so that TCP port 2002 will be accessible from your machine • Add a user to the PC user list, give it a password, and administrator privileges. Remote Monitoring (4) - On Remote machine
  • 20. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 20 • Start the Remote Packet Capture Protocol service • Write-click on the Start symbol down left the Windows screen, choose Open Windows Explorer, right-click on Computer and choose Manage. Remote Monitoring (5) - On Remote machine
  • 21. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 21 L2/L3 network operation Where to locate Wireshark Taps and port-mirror Local and remote monitoring Capture data from multiple interfaces Capture data on virtual machines Chapter Content “A friend is someone who knows all about you and still loves you.” Elbert Hubbard
  • 22. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 22 Capture Data from Multiple Interfaces
  • 23. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 23 L2/L3 network operation Where to locate Wireshark Taps and port-mirror Local and remote monitoring Capture data from multiple interfaces Capture data on virtual machines Chapter Content “Any fool can know. The point is to understand.” Albert Einstein
  • 24. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 24 HW Virtualization Software Guest OS 1 Guest OS 2 Guest OS 3 App External LAN Switch 1 2 3 4 7 8 9 10 5 6 11 12 NIC1 NIC2 A p p A p p App What is a Virtual Machine And How to monitor Traffic to it 1. Port mirror from LAG (ports 1/2) to port 7 that the laptop is connected to 2. Two port mirrors (1 to 8, 2 to 9) with capture from multiple interfaces 1 2
  • 25. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 25 Connecting to a Blade Center Eth1 Eth2 Eth1 Eth2 Eth1 Eth2 Eth1 Eth2 Eth1 Eth2 Eth1 Eth2 . . . Internal LAN Switch Ext 1 Ext 2 Ext 3 Ext 4 Int1 Int2 Int3 Int4 Int5 Int6 Int7 Int8 Internal LAN Switch Ext 1 Ext 2 Ext 3 Ext 4 Int1 Int2 Int3 Int4 Int5 Int6 Int7 Int8 BLADE Center External LAN Switch 1 2 3 4 7 8 9 10 5 6 11 12 External LAN Switch 1 2 3 4 7 8 9 10 5 6 11 12 To organization network S – Server SB – Server Blade Eth – Ethernet Int – Internal Ext - External SB-1 SB-2 SB-3 SB-4 SB-5 SB-6 S 2 S 2 S5 S 3 S6 S 4 S 7 S 8 1 2 3
  • 26. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 26 Monitoring a Blade Center Eth1 Eth2 Eth1 Eth2 Eth1 Eth2 Eth1 Eth2 Eth1 Eth2 Eth1 Eth2 . . . Internal LAN Switch Ext 1 Ext 2 Ext 3 Ext 4 Int1 Int2 Int3 Int4 Int5 Int6 Int7 Int8 Internal LAN Switch Ext 1 Ext 2 Ext 3 Ext 4 Int1 Int2 Int3 Int4 Int5 Int6 Int7 Int8 BLADE Center External LAN Switch 1 2 3 4 7 8 9 10 5 6 11 12 External LAN Switch 1 2 3 4 7 8 9 10 5 6 11 12 To organization network S – Server SB – Server Blade Eth – Ethernet Int – Internal Ext - External SB-1 SB-2 SB-3 SB-4 SB-5 SB-6 S 2 S 2 S5 S 3 S6 S 4 S 7 S 8 1
  • 27. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 27 Summary • In this lesson we talked about: ▫ Where to locate Wireshark in the network ▫ How to use taps and port mirror ▫ How to use Wireshark in virtual environment Thanks for your time Yoram Orzach yoram@ndi-com.com
  • 28. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com Network analysis using Wireshark V2 yoram@ndi-com.comPage 28 yoram@ndi-com.com For More lectures, Courses & Keynote Speaking Contact Me to: