SlideShare a Scribd company logo
1 of 24
Traffic Data
Analysis using
Wireshark
Fundamentles
● IP Address
● URL
● Finding IP address from URL
2
• IP Address
 An IP address is a unique identifier assigned to
each device connected to a network . They are
required for your device to access internet . It
allows devices to communicate with each other
over the internet.
• Here’s an example of an IP address :
192.155.12.1
• Example: Imagine you’re sending a letter (data
packet) to a friend’s house (server). The IP
address acts like the postal code, ensuring
your letter reaches the correct destination.
cont.…
IP address
● There are mainly two types of IP addresses: IPv4 & IPv6
● 1)IPv4 :
○ Address Size: IPv4 uses a 32-bit address, expressed in decimal
notation.
○ Example: An IPv4 address like 192.0.2.126.
○ Challenges: Despite its large address space, IPv4 addresses are running
out due to the rapid increase in networked and virtual devices.
cont.…
IP address
● 2)IPv6 :
○ Address Size: IPv6 uses a 128-bit address, providing an enormous
address space.
○ Example: An IPv6 address like
2001:0db8:85a3:0000:0000:8a2e:0370:7334.
○ Purpose: IPv6 is the recent version designed to address the limitations
of IPv4.
• URL
 A URL (Uniform Resource Locator) is the address
used to find and access a specific webpage or file
on the internet
• It starts with a protocol, like "https://" or
"http://", indicating how to access the
resource.
• Then it includes the domain name, such as
"example.com", which is like the name of the
website or server.
• It may also have additional parts like a path,
indicating the specific location of a file or page,
such as "/images/picture.jpg".
• Example :
https://pixabay.com/videos/search/flowers/
• Finding IP address from URL
Command: ping -4 www.example.com
Explanation: Use this command in the command prom
or terminal to specifically
get the IPv4 address for the domain name
"www.google.com".
“
 Introduction of Wireshark
o Wireshark is a tool that helps you to see what's
happening on your network.
o Wireshark is a packet sniffing and packet
capturing
tool .
o You can not watch what is under packet but you
can trace that which packet is transferring from
which device and in which time
Installation of
Wireshark
Cont.…..
1.Visit the Official Wireshark Website: Go to the Wireshark
Downloads page using any web browser.
Cont.…..
Choose the Stable Version for Windows: On the download page,
select the stable version suitable for Windows. You’ll find options
like:
1.Windows x64 Installer
2.Windows Arm64 Installer
3.Windows x64 Portabellas®
Cont.…..
Download and Run the Installer:
Click on the appropriate installer for your system (e.g., Windows x64
Installer).
The executable file will be saved to your default downloads location.
Run the downloaded file and follow the installation wizard.
Cont.…..
Cont.…..
Installing Wireshark on Linux can be a little different depending
on the Linux distribution.
(Part-1)
Cont.…..
Installing Wireshark on Linux can be a little different depending
on the Linux distribution.
1. ip.addr==172.26.132.151
The filter ip.addr == 172.26.132.151 captures all traffic with either a source IPv4 address or a destination IPv4
address of 172.26.132.1511. This filter is useful for narrowing down network packet analysis to only those
packets involving this specific IP address.
2. ip.src==172.26.132.151
The filter ip.src == 172.26.132.151 captures all network traffic where the source IPv4 address matches
172.26.132.1511. In other words, it isolates packets originating from this specific IP address.
3. ip.dst==172.26.132.151
The filter ip.dst == 172.26.132.151 captures all network traffic where the destination IPv4 address matches
172.26.132.1511. In other words, it isolates packets destined for this specific IP address.
4. tcp, udp,http
5 . dns.qry.name==www.example.com
The filter dns.qry.name == www.example.com captures all DNS
packets where the query name matches www.example.com. In
other words, it isolates DNS queries specifically targeting the
domain “www.example.com.”
6 . http.response.code==200
The filter http.response.code == 200 captures all HTTP responses
with a status code of 200. In other words, it isolates successful
responses where the server has handled the request without any
errors.
7. Tcp.port==80
The filter Tcp.port == 80 captures all network traffic where the TCP
port number is 801. In other words, it isolates packets associated
with web traffic using the standard HTTP port.
8. tcp.analysis.flags
Thank you

More Related Content

Similar to Traffic Data Analysis using Wireshark.pptx

Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
Cengage Learning
 

Similar to Traffic Data Analysis using Wireshark.pptx (20)

IP Address
IP AddressIP Address
IP Address
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
+ Network Programming.pdf
+ Network Programming.pdf+ Network Programming.pdf
+ Network Programming.pdf
 
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptxDHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
 
Networking chapter VI
Networking chapter VINetworking chapter VI
Networking chapter VI
 
Unit-4 networking basics in java
Unit-4 networking basics in javaUnit-4 networking basics in java
Unit-4 networking basics in java
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
RHSA_1_Chapter(11)_Resume_chaptre_11.pptx
RHSA_1_Chapter(11)_Resume_chaptre_11.pptxRHSA_1_Chapter(11)_Resume_chaptre_11.pptx
RHSA_1_Chapter(11)_Resume_chaptre_11.pptx
 
Asas Pelayaran Internet
Asas Pelayaran InternetAsas Pelayaran Internet
Asas Pelayaran Internet
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptx
 
ffuyu yguyguyg.pptx
ffuyu yguyguyg.pptxffuyu yguyguyg.pptx
ffuyu yguyguyg.pptx
 
Unit05
Unit05Unit05
Unit05
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic
 
Itep
ItepItep
Itep
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
Network analysis Using Wireshark 4: Capture Filters
Network analysis Using Wireshark 4: Capture FiltersNetwork analysis Using Wireshark 4: Capture Filters
Network analysis Using Wireshark 4: Capture Filters
 
Network.pptx
Network.pptxNetwork.pptx
Network.pptx
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Recently uploaded (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 

Traffic Data Analysis using Wireshark.pptx

  • 2. Fundamentles ● IP Address ● URL ● Finding IP address from URL 2
  • 3. • IP Address  An IP address is a unique identifier assigned to each device connected to a network . They are required for your device to access internet . It allows devices to communicate with each other over the internet. • Here’s an example of an IP address : 192.155.12.1 • Example: Imagine you’re sending a letter (data packet) to a friend’s house (server). The IP address acts like the postal code, ensuring your letter reaches the correct destination.
  • 4. cont.… IP address ● There are mainly two types of IP addresses: IPv4 & IPv6 ● 1)IPv4 : ○ Address Size: IPv4 uses a 32-bit address, expressed in decimal notation. ○ Example: An IPv4 address like 192.0.2.126. ○ Challenges: Despite its large address space, IPv4 addresses are running out due to the rapid increase in networked and virtual devices.
  • 5. cont.… IP address ● 2)IPv6 : ○ Address Size: IPv6 uses a 128-bit address, providing an enormous address space. ○ Example: An IPv6 address like 2001:0db8:85a3:0000:0000:8a2e:0370:7334. ○ Purpose: IPv6 is the recent version designed to address the limitations of IPv4.
  • 6. • URL  A URL (Uniform Resource Locator) is the address used to find and access a specific webpage or file on the internet • It starts with a protocol, like "https://" or "http://", indicating how to access the resource. • Then it includes the domain name, such as "example.com", which is like the name of the website or server. • It may also have additional parts like a path, indicating the specific location of a file or page, such as "/images/picture.jpg". • Example : https://pixabay.com/videos/search/flowers/
  • 7. • Finding IP address from URL Command: ping -4 www.example.com Explanation: Use this command in the command prom or terminal to specifically get the IPv4 address for the domain name "www.google.com".
  • 8. “  Introduction of Wireshark o Wireshark is a tool that helps you to see what's happening on your network. o Wireshark is a packet sniffing and packet capturing tool . o You can not watch what is under packet but you can trace that which packet is transferring from which device and in which time
  • 10. Cont.….. 1.Visit the Official Wireshark Website: Go to the Wireshark Downloads page using any web browser.
  • 11. Cont.….. Choose the Stable Version for Windows: On the download page, select the stable version suitable for Windows. You’ll find options like: 1.Windows x64 Installer 2.Windows Arm64 Installer 3.Windows x64 Portabellas®
  • 12. Cont.….. Download and Run the Installer: Click on the appropriate installer for your system (e.g., Windows x64 Installer). The executable file will be saved to your default downloads location. Run the downloaded file and follow the installation wizard.
  • 14. Cont.….. Installing Wireshark on Linux can be a little different depending on the Linux distribution. (Part-1)
  • 15. Cont.….. Installing Wireshark on Linux can be a little different depending on the Linux distribution.
  • 16. 1. ip.addr==172.26.132.151 The filter ip.addr == 172.26.132.151 captures all traffic with either a source IPv4 address or a destination IPv4 address of 172.26.132.1511. This filter is useful for narrowing down network packet analysis to only those packets involving this specific IP address.
  • 17. 2. ip.src==172.26.132.151 The filter ip.src == 172.26.132.151 captures all network traffic where the source IPv4 address matches 172.26.132.1511. In other words, it isolates packets originating from this specific IP address.
  • 18. 3. ip.dst==172.26.132.151 The filter ip.dst == 172.26.132.151 captures all network traffic where the destination IPv4 address matches 172.26.132.1511. In other words, it isolates packets destined for this specific IP address.
  • 20. 5 . dns.qry.name==www.example.com The filter dns.qry.name == www.example.com captures all DNS packets where the query name matches www.example.com. In other words, it isolates DNS queries specifically targeting the domain “www.example.com.”
  • 21. 6 . http.response.code==200 The filter http.response.code == 200 captures all HTTP responses with a status code of 200. In other words, it isolates successful responses where the server has handled the request without any errors.
  • 22. 7. Tcp.port==80 The filter Tcp.port == 80 captures all network traffic where the TCP port number is 801. In other words, it isolates packets associated with web traffic using the standard HTTP port.