SlideShare a Scribd company logo
Lab Exercise & Hands on
Network Protocol Analyzer Toolkit :
Wireshark
Pervasive Computing Research Group
Faculty of Computer Science & Information System
Universiti Teknologi Malaysia
Getting Wireshark
• Running on Windows & Linux Platform
– Wireshark is newly version of Ethereal
– Install Wireshark in your PC / Notebook
– Running it with start a new live capture button
(1) Hands on : Generated traffic
• Check your IP Address (depend your OS: ipconfig
/ ifconfig), do dhcp setting
• Type ping www.utm.my / etc
– Added command type with ping /help
• Running and capture your Wireshark
• Press Stop Button and do Analyze it
– the “payload” features of data
– Describe it
• Save with name ping (save as type :wireshark /
tcpdump)
(2) Hands on : Generated traffic
• Browsing with your favorite web site
– Open your browser, type the URL and faced it
• Running and capture your Wireshark
• Press Stop Button and do Analyze it
– the “payload” features of data
– IP Header : IP source, destination, Flags, Header length,
TTL
– TCP / UDP Header : Port source, destination, Seq_number,
ACK_number, Win, Length, etc
– ICMP Header : Type, Checksum, etc
• Save with name browsing (save as type :wireshark /
tcpdump)
(3) Hands on : Generated traffic
• Transfer your files with other PC or upload
/download it to Internet
• Running and capture your Wireshark
• Press Stop Button and do Analyze it
– the “payload” features of data
– IP Header : IP source, destination, Flags, Header
length, TTL
– TCP / UDP Header : Port source, destination,
Seq_number, ACK_number, Win, Length, etc
– ICMP Header : Type, Checksum, etc
• Save with name transfer (save as type : wireshark
/ tcpdump)
Analyzed
• Display Filter | Analyze | Display filter : to
filtering our expression
– Go to| Analyze | Display filter, i.e : choose HTTP,
then click Apply
• Shown a detailed packet
– Choose what we want, and go to | Analyze |
follow TCP / UDP stream
– Some crucial information showed
Statistic
• Features from wireshark to shown statistic
count all activities
Tips working with Wireshark
• Cannot analyzed if pcap file exceed 300 MB
• Reliability / stability process depend
specification machines
• Used tshark command
– Windows OS : in cmd go to c:Program
Fileswireshark
– Type tshark –r nameyourfile.pcap
• More command, type tshark -h
(3) Hands on : Exercise
• Open your favorite web 2.0 Application /
streaming / IM
– Analyzed it and see what is unique in every single
packet
– Compare it with hands on (1) – (2)
(4) Hands on : Exercise
• Mapping your network
– Type ping to every computer in your broadcast
– do analyze and mapping all PC in your network
– Draw topology with IP Address, MAC Address,
named of computer for each PC.
– Summarize
• The total IP Address
• The total traffic / packet data
• The total of Protocol: TCP/ UDP/ ICMP/ others
(4) Hands on : Exercise
• Home work
– Three Way handshake process in every hand on
Lab (including IP, TCP, UDP, ICMP features header)
– Draw it with your explanation process handshake
based on IP Address, port address and sequences
/ ACK process
– Compare it with your hands on (1) – (3)
Deris Stiawan. Holds an M.Eng from University of Gadjah Mada, Indonesia,
since 2006, he is Computer Science faculty member at University of Sriwijaya,
Indonesia. He is member of IEEE and currently pursuing his Ph.D degree at
Faculty of Computer Science & Information System, Universiti Teknologi
Malaysia (UTM) working in intrusion prevention system. He joined research
group Information Assurance and Security Research Group (IASRG) in the
area of Intrusion Prevention and Detection (ITD) at UTM.
His professional profile has derived to the field of computer network and
network security, specially focused on intrusion prevention and network
infrastructure.
http://webs.fsksm.utm.my/blog/pcrg/derissetiawan/

More Related Content

What's hot

Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
vishalgohel12195
 
Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013
Islam Azeddine Mennouchi
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
GTKlondike
 
Network based file carving
Network based file carvingNetwork based file carving
Network based file carving
GTKlondike
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
Savvius, Inc
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
mhaviv
 
Ch 07 -- The Expert System
Ch 07 -- The Expert SystemCh 07 -- The Expert System
Ch 07 -- The Expert System
Yoram Orzach
 
Wireshark
WiresharkWireshark
Wireshark
lakshya dubey
 
Wireshark Basic Presentation
Wireshark Basic PresentationWireshark Basic Presentation
Wireshark Basic Presentation
MD. SHORIFUL ISLAM
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
KAMALI PRIYA P
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
Issar Kapadia
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
Santosh Khadsare
 
Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1
Yoram Orzach
 
Network Forensic Tools & Techniques Workshop
Network Forensic Tools & Techniques WorkshopNetwork Forensic Tools & Techniques Workshop
Network Forensic Tools & Techniques Workshop
Priyanka Aash
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
Yoram Orzach
 
Wireshark
Wireshark Wireshark
Wireshark
antivirusspam
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
Coursenvy.com
 
Co se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkCo se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel Minařík
Security Session
 
Network forensics
Network forensicsNetwork forensics
Network forensics
ArthyR3
 
Introduction to computer security syllabus
Introduction to computer security syllabusIntroduction to computer security syllabus
Introduction to computer security syllabus
Ayebazibwe Kenneth
 

What's hot (20)

Network sniffers & injection tools
Network sniffers  & injection toolsNetwork sniffers  & injection tools
Network sniffers & injection tools
 
Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013Forensic Analysis - Empower Tech Days 2013
Forensic Analysis - Empower Tech Days 2013
 
Open source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysisOpen source network forensics and advanced pcap analysis
Open source network forensics and advanced pcap analysis
 
Network based file carving
Network based file carvingNetwork based file carving
Network based file carving
 
Wired and Wireless Network Forensics
Wired and Wireless Network ForensicsWired and Wireless Network Forensics
Wired and Wireless Network Forensics
 
Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
 
Ch 07 -- The Expert System
Ch 07 -- The Expert SystemCh 07 -- The Expert System
Ch 07 -- The Expert System
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark Basic Presentation
Wireshark Basic PresentationWireshark Basic Presentation
Wireshark Basic Presentation
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
Prensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection toolPrensentation on packet sniffer and injection tool
Prensentation on packet sniffer and injection tool
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1
 
Network Forensic Tools & Techniques Workshop
Network Forensic Tools & Techniques WorkshopNetwork Forensic Tools & Techniques Workshop
Network Forensic Tools & Techniques Workshop
 
Wireshark - Basics
Wireshark - BasicsWireshark - Basics
Wireshark - Basics
 
Wireshark
Wireshark Wireshark
Wireshark
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
Co se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel MinaříkCo se skrývá v datovém provozu? - Pavel Minařík
Co se skrývá v datovém provozu? - Pavel Minařík
 
Network forensics
Network forensicsNetwork forensics
Network forensics
 
Introduction to computer security syllabus
Introduction to computer security syllabusIntroduction to computer security syllabus
Introduction to computer security syllabus
 

Similar to Wireshark

Wireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance toolsWireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance tools
Sachidananda Sahu
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
Taymoor Nazmy
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
Cengage Learning
 
Chapter 3 footprinting
Chapter 3 footprintingChapter 3 footprinting
Chapter 3 footprinting
Setia Juli Irzal Ismail
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
AssadLeo1
 
Basic network training2
Basic network training2Basic network training2
Basic network training2
Arunchai Seangparch
 
footscan.PPT
footscan.PPTfootscan.PPT
footscan.PPT
ssuserec53e73
 
Penetration Testing Boot CAMP
Penetration Testing Boot CAMPPenetration Testing Boot CAMP
wireshark.pdf
wireshark.pdfwireshark.pdf
wireshark.pdf
ssuserafc27c
 
Slide Deck – Session 9 – FRSecure CISSP
Slide Deck – Session 9 – FRSecure CISSP Slide Deck – Session 9 – FRSecure CISSP
Slide Deck – Session 9 – FRSecure CISSP
FRSecure
 
Traffic monitoring
Traffic monitoringTraffic monitoring
Traffic monitoring
Radu Galbenu
 
Chap 1 Network Theory & Java Overview
Chap 1   Network Theory & Java OverviewChap 1   Network Theory & Java Overview
Chap 1 Network Theory & Java Overview
Ministry of Higher Education
 
IP For Broadcast Engineers
IP For Broadcast EngineersIP For Broadcast Engineers
IP For Broadcast Engineers
Kit Peters
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
Mohammed Adam
 
What is Protocol.docx
What is Protocol.docxWhat is Protocol.docx
What is Protocol.docx
kndnewguade
 
Network Scanning Phases and Supporting Tools
Network Scanning Phases and Supporting ToolsNetwork Scanning Phases and Supporting Tools
Network Scanning Phases and Supporting Tools
Joseph Bugeja
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
AKHIL969626
 
How the internet works
How the internet worksHow the internet works
How the internet works
ftcim
 
PRADS presentation (English) @ University of Oslo by Ebf0 and kwy
PRADS presentation (English) @ University of Oslo by Ebf0 and kwyPRADS presentation (English) @ University of Oslo by Ebf0 and kwy
PRADS presentation (English) @ University of Oslo by Ebf0 and kwy
Rubén Romero
 
Introduction to ns3
Introduction to ns3Introduction to ns3
Introduction to ns3
Shahid Beheshti University
 

Similar to Wireshark (20)

Wireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance toolsWireshark, Tcpdump and Network Performance tools
Wireshark, Tcpdump and Network Performance tools
 
Computer network coe351- part2- final
Computer network coe351- part2- finalComputer network coe351- part2- final
Computer network coe351- part2- final
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 
Chapter 3 footprinting
Chapter 3 footprintingChapter 3 footprinting
Chapter 3 footprinting
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
Basic network training2
Basic network training2Basic network training2
Basic network training2
 
footscan.PPT
footscan.PPTfootscan.PPT
footscan.PPT
 
Penetration Testing Boot CAMP
Penetration Testing Boot CAMPPenetration Testing Boot CAMP
Penetration Testing Boot CAMP
 
wireshark.pdf
wireshark.pdfwireshark.pdf
wireshark.pdf
 
Slide Deck – Session 9 – FRSecure CISSP
Slide Deck – Session 9 – FRSecure CISSP Slide Deck – Session 9 – FRSecure CISSP
Slide Deck – Session 9 – FRSecure CISSP
 
Traffic monitoring
Traffic monitoringTraffic monitoring
Traffic monitoring
 
Chap 1 Network Theory & Java Overview
Chap 1   Network Theory & Java OverviewChap 1   Network Theory & Java Overview
Chap 1 Network Theory & Java Overview
 
IP For Broadcast Engineers
IP For Broadcast EngineersIP For Broadcast Engineers
IP For Broadcast Engineers
 
Basic Foundation For Cybersecurity
Basic Foundation For CybersecurityBasic Foundation For Cybersecurity
Basic Foundation For Cybersecurity
 
What is Protocol.docx
What is Protocol.docxWhat is Protocol.docx
What is Protocol.docx
 
Network Scanning Phases and Supporting Tools
Network Scanning Phases and Supporting ToolsNetwork Scanning Phases and Supporting Tools
Network Scanning Phases and Supporting Tools
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
How the internet works
How the internet worksHow the internet works
How the internet works
 
PRADS presentation (English) @ University of Oslo by Ebf0 and kwy
PRADS presentation (English) @ University of Oslo by Ebf0 and kwyPRADS presentation (English) @ University of Oslo by Ebf0 and kwy
PRADS presentation (English) @ University of Oslo by Ebf0 and kwy
 
Introduction to ns3
Introduction to ns3Introduction to ns3
Introduction to ns3
 

More from Deris Stiawan

Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
Deris Stiawan
 
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) KomputerStrategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
Deris Stiawan
 
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang Kesehatan
Deris Stiawan
 
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
Deris Stiawan
 
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc NetworkDeteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
Deris Stiawan
 
Deteksi Serangan Denial of Service Menggunakan Artificial Imune System
Deteksi Serangan Denial of Service Menggunakan Artificial Imune SystemDeteksi Serangan Denial of Service Menggunakan Artificial Imune System
Deteksi Serangan Denial of Service Menggunakan Artificial Imune System
Deris Stiawan
 
Identifikasi Trafik Terenkripsi dengan Deep Packet Inspection
Identifikasi Trafik Terenkripsi dengan Deep Packet InspectionIdentifikasi Trafik Terenkripsi dengan Deep Packet Inspection
Identifikasi Trafik Terenkripsi dengan Deep Packet Inspection
Deris Stiawan
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
Deris Stiawan
 
Network Attack and Intrusion Prevention System
Network Attack and  Intrusion Prevention System Network Attack and  Intrusion Prevention System
Network Attack and Intrusion Prevention System
Deris Stiawan
 
Konsentrasi riset jaringan komputer
Konsentrasi riset jaringan komputerKonsentrasi riset jaringan komputer
Konsentrasi riset jaringan komputer
Deris Stiawan
 
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
Deris Stiawan
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of Things
Deris Stiawan
 
IDS / IPS Survey
IDS / IPS SurveyIDS / IPS Survey
IDS / IPS Survey
Deris Stiawan
 
Intrusion Detection/ Prevention
Intrusion Detection/ PreventionIntrusion Detection/ Prevention
Intrusion Detection/ Prevention
Deris Stiawan
 
ICT for fighting Corruption
ICT for fighting CorruptionICT for fighting Corruption
ICT for fighting Corruption
Deris Stiawan
 

More from Deris Stiawan (15)

Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
Sistem Deteksi Kegagalan pada Jaringan IoT dengan Menggunakan Metode Naive Ba...
 
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) KomputerStrategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
Strategi [Memulai] Riset Tugas Akhir Bidang Ilmu (Teknik) Komputer
 
IoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang KesehatanIoT : Peluang Riset di Bidang Kesehatan
IoT : Peluang Riset di Bidang Kesehatan
 
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
Klasifikasi Malware Trojan Ransomware Dengan Algoritma Support Vector Machine...
 
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc NetworkDeteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
Deteksi Serangan Black Hole dengan Metode Bayesian pada Mobile Ad Hoc Network
 
Deteksi Serangan Denial of Service Menggunakan Artificial Imune System
Deteksi Serangan Denial of Service Menggunakan Artificial Imune SystemDeteksi Serangan Denial of Service Menggunakan Artificial Imune System
Deteksi Serangan Denial of Service Menggunakan Artificial Imune System
 
Identifikasi Trafik Terenkripsi dengan Deep Packet Inspection
Identifikasi Trafik Terenkripsi dengan Deep Packet InspectionIdentifikasi Trafik Terenkripsi dengan Deep Packet Inspection
Identifikasi Trafik Terenkripsi dengan Deep Packet Inspection
 
Trend Internet of Things
Trend Internet of ThingsTrend Internet of Things
Trend Internet of Things
 
Network Attack and Intrusion Prevention System
Network Attack and  Intrusion Prevention System Network Attack and  Intrusion Prevention System
Network Attack and Intrusion Prevention System
 
Konsentrasi riset jaringan komputer
Konsentrasi riset jaringan komputerKonsentrasi riset jaringan komputer
Konsentrasi riset jaringan komputer
 
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
Perancangan Sistem Load Balancing Pada Web Server Dengan Algoritma Central Ma...
 
Trend & challenges Internet of Things
Trend & challenges Internet of ThingsTrend & challenges Internet of Things
Trend & challenges Internet of Things
 
IDS / IPS Survey
IDS / IPS SurveyIDS / IPS Survey
IDS / IPS Survey
 
Intrusion Detection/ Prevention
Intrusion Detection/ PreventionIntrusion Detection/ Prevention
Intrusion Detection/ Prevention
 
ICT for fighting Corruption
ICT for fighting CorruptionICT for fighting Corruption
ICT for fighting Corruption
 

Recently uploaded

Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
bseovas
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
bseovas
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
Laura Szabó
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 

Recently uploaded (20)

Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
不能毕业如何获得(USYD毕业证)悉尼大学毕业证成绩单一比一原版制作
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
留学学历(UoA毕业证)奥克兰大学毕业证成绩单官方原版办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Gen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needsGen Z and the marketplaces - let's translate their needs
Gen Z and the marketplaces - let's translate their needs
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 

Wireshark

  • 1. Lab Exercise & Hands on Network Protocol Analyzer Toolkit : Wireshark Pervasive Computing Research Group Faculty of Computer Science & Information System Universiti Teknologi Malaysia
  • 2. Getting Wireshark • Running on Windows & Linux Platform – Wireshark is newly version of Ethereal – Install Wireshark in your PC / Notebook – Running it with start a new live capture button
  • 3. (1) Hands on : Generated traffic • Check your IP Address (depend your OS: ipconfig / ifconfig), do dhcp setting • Type ping www.utm.my / etc – Added command type with ping /help • Running and capture your Wireshark • Press Stop Button and do Analyze it – the “payload” features of data – Describe it • Save with name ping (save as type :wireshark / tcpdump)
  • 4. (2) Hands on : Generated traffic • Browsing with your favorite web site – Open your browser, type the URL and faced it • Running and capture your Wireshark • Press Stop Button and do Analyze it – the “payload” features of data – IP Header : IP source, destination, Flags, Header length, TTL – TCP / UDP Header : Port source, destination, Seq_number, ACK_number, Win, Length, etc – ICMP Header : Type, Checksum, etc • Save with name browsing (save as type :wireshark / tcpdump)
  • 5. (3) Hands on : Generated traffic • Transfer your files with other PC or upload /download it to Internet • Running and capture your Wireshark • Press Stop Button and do Analyze it – the “payload” features of data – IP Header : IP source, destination, Flags, Header length, TTL – TCP / UDP Header : Port source, destination, Seq_number, ACK_number, Win, Length, etc – ICMP Header : Type, Checksum, etc • Save with name transfer (save as type : wireshark / tcpdump)
  • 6. Analyzed • Display Filter | Analyze | Display filter : to filtering our expression – Go to| Analyze | Display filter, i.e : choose HTTP, then click Apply • Shown a detailed packet – Choose what we want, and go to | Analyze | follow TCP / UDP stream – Some crucial information showed
  • 7. Statistic • Features from wireshark to shown statistic count all activities
  • 8. Tips working with Wireshark • Cannot analyzed if pcap file exceed 300 MB • Reliability / stability process depend specification machines • Used tshark command – Windows OS : in cmd go to c:Program Fileswireshark – Type tshark –r nameyourfile.pcap • More command, type tshark -h
  • 9. (3) Hands on : Exercise • Open your favorite web 2.0 Application / streaming / IM – Analyzed it and see what is unique in every single packet – Compare it with hands on (1) – (2)
  • 10. (4) Hands on : Exercise • Mapping your network – Type ping to every computer in your broadcast – do analyze and mapping all PC in your network – Draw topology with IP Address, MAC Address, named of computer for each PC. – Summarize • The total IP Address • The total traffic / packet data • The total of Protocol: TCP/ UDP/ ICMP/ others
  • 11. (4) Hands on : Exercise • Home work – Three Way handshake process in every hand on Lab (including IP, TCP, UDP, ICMP features header) – Draw it with your explanation process handshake based on IP Address, port address and sequences / ACK process – Compare it with your hands on (1) – (3)
  • 12. Deris Stiawan. Holds an M.Eng from University of Gadjah Mada, Indonesia, since 2006, he is Computer Science faculty member at University of Sriwijaya, Indonesia. He is member of IEEE and currently pursuing his Ph.D degree at Faculty of Computer Science & Information System, Universiti Teknologi Malaysia (UTM) working in intrusion prevention system. He joined research group Information Assurance and Security Research Group (IASRG) in the area of Intrusion Prevention and Detection (ITD) at UTM. His professional profile has derived to the field of computer network and network security, specially focused on intrusion prevention and network infrastructure. http://webs.fsksm.utm.my/blog/pcrg/derissetiawan/