Network Analysis With Wireshark
Network Analysis With Wireshark
wireshark -i lo
CONVERSATIONS( forwarding devices involved)
IO GRAPH
FILTERING BASED ON THE RESPONSE CODES
HTTPSTREAM
Wireshark is a powerful packet-sniffing tool used to capture, analyze, and filter network packets. It
allows us to view details such as the protocols in use, packet contents, payloads, and even user
credentials if transmitted.
o The command wireshark -i lo was used to start Wireshark on the loopback interface.
o Nmap commands such as -sU and -sT were executed to generate UDP and TCP
packets. Additionally, ICMP traffic was created using ping commands.
o Observations:
o Observations:
This experiment provided insight into the color-coding system used by Wireshark to represent
different protocols.
Packet Filtering
Wireshark’s filtering capabilities allow us to isolate specific packets based on criteria such as IP
addresses, ports, and protocols.
1. Filters Applied:
▪ ip.addr==192.168.1.107
▪ tcp.port==80
▪ ip.dst==192.168.1.107
▪ udp.length<100
▪ udp.port==<port>
▪ tcp.flags.ack
▪ http
1. Protocol Hierarchy:
2. Conversations:
o Generated flow graphs and input/output graphs to visualize data exchanges and
traffic patterns.
1. Identified a packet containing a POST request (4th packet from the end).
2. Delved into the application layer and discovered the user was attempting to add information
to the /userinfo.php page.
▪ uname="test"
▪ pass="test"
o Follow TCP Stream and Follow HTTP Stream were used to examine the complete
transaction.
2. Analysis:
o Observations:
▪ Since FTP transmits data in plaintext, username, password, file names, and
data were visible.