SlideShare a Scribd company logo
BASICS OF WIRESHARK
BASICS OF WIRESHARK
Wireshark is a network packet analyzer. A network packet analyzer will try to
capture network packets and tries to display that packet data as detailed as
possible.
You could think of a network packet analyzer as a measuring device used to
examine what’s going on inside a network cable.
IP ADDRESS & MAC ADDRESS
An Internet Protocol address (IP address) is a numerical label assigned to each
device (e.g., computer, printer or device) participating in a computer network that
uses the Internet Protocol for communication. An IP address serves two principal
functions: host or network interface identification and location addressing.
A media access control address (MAC address) is a unique identifier assigned to
network interfaces for communications on the physical network segment. MAC
addresses are used as a network address for most IEEE 802 network technologies,
including Ethernet and WiFi.
PORTS
In programming, a port (noun) is a "logical connection place" and specifically, using
the Internet's protocol, TCP/IP, the way a client program specifies a particular server
program on a computer in a network.
TABS IN WIRESHARK
 No. shows the number of captured packet or index number.
 Time shows the time of capture
 Source shows the source ip of the packet or the packet is originally generated from which
source ip.
 Destination shows the destination ip where the packet is going.
 Protocol shows the which kind of protocol communication is held between the source and
destination.
 Info shows the data payload in the packet.
WIRESHARK HOMESCREEN
SOME EXAMPLES ON WIRESHARK COMMAND LINE
INTERFACE (CLI)
Select the interface and start capturing the packets:
>tshark –i <enter the number of interface listed in the previous command>
>tshark –i 1
Hit enter. It will start capturing the packets from the specified interface.
SOME EXAMPLES ON WIRESHARK COMMAND LINE
INTERFACE (CLI)
Select the interface and start capturing the packets for 10sec and save the captured
packet in the 10sec.pcap file format:
>tshark –i <enter the number of interface><space> -a duration:<sec> -w
<filename>.pcap
>tshark –i 1 –a duration:10 –w 10sec.pcap
Hit enter. It will start capturing the packets from the specified interface for 10sec and
save it in a file 10sec.pcap file.
To see the captured packet enter the filename in the command prompt.
>10sec.pcap
TSHARK OUTPUT FORMATTING
For output format of Tshark, tshark uses the format of .pcap in which it saves the
captured packets.

More Related Content

What's hot

FireWall
FireWallFireWall
FireWall
rubal_9
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
asimnawaz54
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
amiable_indian
 

What's hot (20)

Wireshark Inroduction Li In
Wireshark Inroduction  Li InWireshark Inroduction  Li In
Wireshark Inroduction Li In
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark
WiresharkWireshark
Wireshark
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Wireshark network analysing software
Wireshark network analysing softwareWireshark network analysing software
Wireshark network analysing software
 
IDS and IPS
IDS and IPSIDS and IPS
IDS and IPS
 
Vlan
Vlan Vlan
Vlan
 
FireWall
FireWallFireWall
FireWall
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Understanding NMAP
Understanding NMAPUnderstanding NMAP
Understanding NMAP
 
Firewalls
FirewallsFirewalls
Firewalls
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 
Wi-FI Hacking
Wi-FI Hacking Wi-FI Hacking
Wi-FI Hacking
 
Hacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning TechniquesHacking With Nmap - Scanning Techniques
Hacking With Nmap - Scanning Techniques
 
Nmap tutorial
Nmap tutorialNmap tutorial
Nmap tutorial
 
Ipv6
Ipv6Ipv6
Ipv6
 
Firewall
FirewallFirewall
Firewall
 
Firewall in Network Security
Firewall in Network SecurityFirewall in Network Security
Firewall in Network Security
 
Packet sniffers
Packet sniffersPacket sniffers
Packet sniffers
 

Viewers also liked

Wireshark
WiresharkWireshark
Wireshark
btohara
 

Viewers also liked (9)

Wireshark tutorial
Wireshark tutorialWireshark tutorial
Wireshark tutorial
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark
WiresharkWireshark
Wireshark
 
Wireshark ppt
Wireshark pptWireshark ppt
Wireshark ppt
 
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
 
Network Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using WiresharkNetwork Forensics: Packet Analysis Using Wireshark
Network Forensics: Packet Analysis Using Wireshark
 
Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark Practical Packet Analysis: Wireshark
Practical Packet Analysis: Wireshark
 
Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1Network Analysis Using Wireshark 1
Network Analysis Using Wireshark 1
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 

Similar to Wireshark Tutorial

Internetbasics
InternetbasicsInternetbasics
Internetbasics
patinijava
 
Tshark pen testing, very good insight of the pent test
Tshark pen testing, very good insight of the pent testTshark pen testing, very good insight of the pent test
Tshark pen testing, very good insight of the pent test
claudiu59
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
masoodnt10
 
Wireshark.ethereal
Wireshark.etherealWireshark.ethereal
Wireshark.ethereal
gh02
 

Similar to Wireshark Tutorial (20)

Unit 8 Java
Unit 8 JavaUnit 8 Java
Unit 8 Java
 
Wireshark
WiresharkWireshark
Wireshark
 
Networking
NetworkingNetworking
Networking
 
CCNA Interview.pdf
CCNA Interview.pdfCCNA Interview.pdf
CCNA Interview.pdf
 
Socket Programming w/ C# - IK
Socket Programming w/ C# - IKSocket Programming w/ C# - IK
Socket Programming w/ C# - IK
 
Tcp Udp Notes
Tcp Udp NotesTcp Udp Notes
Tcp Udp Notes
 
Internetbasics
InternetbasicsInternetbasics
Internetbasics
 
Md13 networking
Md13 networkingMd13 networking
Md13 networking
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in Java
 
Network programming in Java
Network programming in JavaNetwork programming in Java
Network programming in Java
 
Lecture25
Lecture25Lecture25
Lecture25
 
Networking in Java
Networking in JavaNetworking in Java
Networking in Java
 
Ajp notes-chapter-04
Ajp notes-chapter-04Ajp notes-chapter-04
Ajp notes-chapter-04
 
Tshark pen testing, very good insight of the pent test
Tshark pen testing, very good insight of the pent testTshark pen testing, very good insight of the pent test
Tshark pen testing, very good insight of the pent test
 
Unit-4 networking basics in java
Unit-4 networking basics in javaUnit-4 networking basics in java
Unit-4 networking basics in java
 
Network Programming in Java
Network Programming in JavaNetwork Programming in Java
Network Programming in Java
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
Wireshark.ethereal
Wireshark.etherealWireshark.ethereal
Wireshark.ethereal
 
Tcp/ip server sockets
Tcp/ip server socketsTcp/ip server sockets
Tcp/ip server sockets
 
Python networking
Python networkingPython networking
Python networking
 

Recently uploaded

AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
Alluxio, Inc.
 

Recently uploaded (20)

AI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in MichelangeloAI/ML Infra Meetup | ML explainability in Michelangelo
AI/ML Infra Meetup | ML explainability in Michelangelo
 
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesGraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
 
Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024Secure Software Ecosystem Teqnation 2024
Secure Software Ecosystem Teqnation 2024
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data Migration
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
SOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar Research Team: Latest Activities of IntelBroker
SOCRadar Research Team: Latest Activities of IntelBroker
 
A Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data MigrationA Guideline to Gorgias to to Re:amaze Data Migration
A Guideline to Gorgias to to Re:amaze Data Migration
 
10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf10 Essential Software Testing Tools You Need to Know About.pdf
10 Essential Software Testing Tools You Need to Know About.pdf
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
Facemoji Keyboard released its 2023 State of Emoji report, outlining the most...
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAGAI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
AI/ML Infra Meetup | Reducing Prefill for LLM Serving in RAG
 
AI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning FrameworkAI/ML Infra Meetup | Perspective on Deep Learning Framework
AI/ML Infra Meetup | Perspective on Deep Learning Framework
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
INGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by DesignINGKA DIGITAL: Linked Metadata by Design
INGKA DIGITAL: Linked Metadata by Design
 
Benefits of Employee Monitoring Software
Benefits of  Employee Monitoring SoftwareBenefits of  Employee Monitoring Software
Benefits of Employee Monitoring Software
 
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
AI/ML Infra Meetup | Improve Speed and GPU Utilization for Model Training & S...
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 

Wireshark Tutorial

  • 2. BASICS OF WIRESHARK Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. You could think of a network packet analyzer as a measuring device used to examine what’s going on inside a network cable.
  • 3. IP ADDRESS & MAC ADDRESS An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer or device) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. A media access control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and WiFi.
  • 4. PORTS In programming, a port (noun) is a "logical connection place" and specifically, using the Internet's protocol, TCP/IP, the way a client program specifies a particular server program on a computer in a network.
  • 5. TABS IN WIRESHARK  No. shows the number of captured packet or index number.  Time shows the time of capture  Source shows the source ip of the packet or the packet is originally generated from which source ip.  Destination shows the destination ip where the packet is going.  Protocol shows the which kind of protocol communication is held between the source and destination.  Info shows the data payload in the packet.
  • 6.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. SOME EXAMPLES ON WIRESHARK COMMAND LINE INTERFACE (CLI) Select the interface and start capturing the packets: >tshark –i <enter the number of interface listed in the previous command> >tshark –i 1 Hit enter. It will start capturing the packets from the specified interface.
  • 20. SOME EXAMPLES ON WIRESHARK COMMAND LINE INTERFACE (CLI) Select the interface and start capturing the packets for 10sec and save the captured packet in the 10sec.pcap file format: >tshark –i <enter the number of interface><space> -a duration:<sec> -w <filename>.pcap >tshark –i 1 –a duration:10 –w 10sec.pcap Hit enter. It will start capturing the packets from the specified interface for 10sec and save it in a file 10sec.pcap file. To see the captured packet enter the filename in the command prompt. >10sec.pcap
  • 21. TSHARK OUTPUT FORMATTING For output format of Tshark, tshark uses the format of .pcap in which it saves the captured packets.