Experminent 5
Experminent 5
EXPERIMENT NO. 5
AIM: Wireshark monitors and analyses network traffic, enabling the identification of
security threats like suspicious activity and unauthorized access attempts. Investigate network
performance concerns by analysing packet transmission and response times, aiding in the
resolution of performance issues. Extract valuable insights from captured packets to optimize
network configurations and enhance overall efficiency.
Objective: the objective of utilizing Wireshark as a packet tracking tool is to capture and
analyse network traffic comprehensively. This involves identifying network anomalies,
diagnosing performance issues, and detecting potential security threats. Through packet
inspection, the tool aims to provide insights into network behaviour, facilitate troubleshooting
of connectivity problems, and aid in optimizing network performance.
Theory: Wireshark, a powerful packet analysis tool, operates on the fundamental principle of
capturing, analysing, and interpreting network traffic. At its core, Wireshark employs packet
sniffing techniques, intercepting data packets as they traverse the network. Through this
process, it provides a comprehensive view of network activities, including data exchanges,
protocol usage, and potential anomalies.
The tool's practical theory revolves around the OSI model, breaking down network
communication into distinct layers. Wireshark dissects captured packets layer by layer,
enabling users to inspect header information, payload contents, and protocol behaviours. This
approach facilitates in-depth analysis, allowing for the identification of network issues,
security threats, and performance bottlenecks. Wireshark’s functionality extends beyond
passive observation; it enables active participation in network interactions. By filtering and
sorting captured packets based on various criteria, users can focus on specific traffic patterns
or target specific hosts. Moreover, Wireshark supports the decryption of encrypted traffic,
aiding in the investigation of secure communications.
The tool's versatility makes it invaluable for various use cases, including network
troubleshooting, performance optimization, and security auditing. Network administrators
leverage Wireshark to diagnose connectivity issues, identify misconfigurations, and assess
bandwidth utilization. Security professionals rely on it to detect suspicious activities, analyse
malware traffic, and investigate security breaches. Wireshark's practical theory emphasizes
the importance of context and interpretation. While it provides a wealth of raw data,
extracting meaningful insights requires a nuanced understanding of networking protocols and
behaviours.
Ultimately, Wireshark serves as a bridge between the physical infrastructure and the digital
realm, offering a window into the inner workings of interconnected systems. Its practical
theory embodies the principles of transparency, accountability, and empowerment,
empowering users to unravel the complexities of modern networks and safeguard their
integrity.
1
Advantages of Wireshark:
Wireshark boasts numerous advantages that make it a go-to tool for network analysis and
troubleshooting:
1. Comprehensive Packet Analysis: Wireshark offers deep visibility into network traffic,
allowing users to analyse packets at a granular level. It captures and displays detailed
information about protocols, packet headers, and payload contents.
3. User-Friendly Interface: Its intuitive GUI (Graphical User Interface) simplifies packet
analysis tasks, enabling both novice and experienced users to navigate through captured
data efficiently.
5. Protocol Support: Wireshark supports a vast array of network protocols, from common
ones like TCP/IP, UDP, HTTP, and DNS to more specialized protocols used in
industrial control systems, IoT devices, and VoIP communications.
6. Real-Time Analysis: Wireshark can capture and analyse network traffic in real-time,
enabling immediate detection and response to network issues, anomalies, or security
threats as they occur.
9. Community Support and Documentation: Wireshark benefits from a large and active
user community, providing ample resources such as forums, documentation, and
tutorials. Users can readily find assistance, share knowledge, and contribute to the tool's
ongoing development.
10. Open-Source and Free: Wireshark is open-source software distributed under the GNU
General Public License (GPL), making it freely available for anyone to download, use,
modify, and distribute without cost. This accessibility promotes widespread adoption
and fosters continuous improvement through community contributions.
2
Procedure:
Installing Wireshark is straightforward. You can find the download for your operating
system on the official Wireshark website https://www.wireshark.org/download.html.
Capturing network traffic, especially on a shared network, can be a privacy violation.
It's generally not recommended without explicit permission from everyone on the
network. There are also legal restrictions in some regions.
2. Weevil.info:
Visit this website https://weevil.myspecies.info/ which is a deliberately insecure
website designed for educational purposes to demonstrate vulnerabilities. Creating an
account and logging in with real credentials is highly discouraged. Hackers could
potentially capture your login information on such a site.
3
3. Filtering Logs (Educational Purposes Only):
http.request.method == "POST"
Step 1
4
Step 2
4. Capturing Cookies:
In a controlled setup, you could potentially capture cookies from HTTP traffic.
However, cookies typically don't contain usernames and passwords directly. They
might hold session identifiers that could be used in conjunction with other
captured.
5
Other Use of Wireshark:
Wireshark is a powerful tool for network analysis, but it's important to use it responsibly.
Here are some common ethical uses of Wireshark:
Network Troubleshooting:
Identifying Traffic Bottlenecks: Wireshark can help identify parts of the network
that are congested or overloaded. By analysing traffic patterns and identifying
applications or protocols consuming excessive bandwidth, network administrators can
6
optimize network performance by prioritizing traffic or implementing network
segmentation strategies.
Capacity Planning: Analysing network traffic trends with Wireshark can help
network administrators plan for future network capacity needs. By understanding how
network usage fluctuates over time, they can ensure the network has sufficient
bandwidth and resources to handle future traffic demands.
Educational Purposes:
Conclusion: