Wireshark is a very powerful and popular network analyzer for Windows, Mac, and Linux. It’s a tool that is used to inspect data passing through a network interface which could be your ethernet, LAN, and WiFi.
Check out our recommended Wireshark courses
training books and study guides. The prices vary from only $5 for the Kindle Version to full comprehensive Wireshark tutorial guides. Some of these titles are ideal for beginners that are interested to learn more about networking and being able to sniff traffic. If you’d like to see our recommended Wireshark tutorial video hit up this link. [49 mins long detailed beginners guide]
The series of data that Wireshark inspects are called ‘Frames’ which includes ‘Packets’. Wireshark has the ability to capture all of those packets that are sent and received over your network and it can decode them for analysis. When you do anything over the Internet, such as browse websites, use VoIP, IRC etc., the data is always converted into packets when it passes through your network interface or your LAN card. Wireshark will hunt for those packets in your TCP/ IP layer during the transmission and it will keep, and present this data, on its’ very own GUI.
It is important to note that whilst this is an excellent tool for a network administrator that needs to check that their customer’s sensitive data is being transmitted securely – it can also be used be used by hackers on unsecured networks – such as airport WiFi. The moral of the story at this point is to stay clear of clear text http protocols: that is the best advice we can give. To remedy this we would encourage you to use a Firefox addon called https everywhere or use an SSH or VPN tunnel.
Step 1: Start Wireshark!
To open Wireshark in Linux (after you have downloaded it) open it in a terminal with:
– this will open the wireshark GUI. Worth quickly noting that Wireshark comes pre-installed with most pentesting Linux distros like BackBox and Kali Linux. The “gksudo” command tells your Linux box to open the application, in this instance Wireshark, in its’ native GUI whilst in a super-user mode, aka. Sudo.
Step 2: Wireshark GUI
Once the Wireshark GUI has opened, you’ll see that the dashboard has a left column box called ‘Interface List’. This list lets you know which devices and capture cards you can use. At the top of the application, there is an option called ‘Capture Options’ which is exactly that, it allows you to modify and tweak how you would like to capture the packets of data that are being transmitted over your network.
Step 3. Wireshark Interface
If you have a look at your interface list (see Step 2 and the associated screenshot) you’ll see that one of your devices is actually sending and receiving packets. Options include promiscuous mode and capture mode etc. Have a play around with these and understand what each of these functions does – and you will rapidly learn how to effectively use Wireshark.
Step 4. Capture Interface Options
This screenshot shows the Wireshark capture interfaces, in other words, it shows what processes and platforms are receiving and sending data on your machine. If you have a wireless card, then it will show it, etc.
Step 5. The Main Packets Panel
Once you are happy with the interface you’d like to use, go ahead and click ‘start’ and Wireshark will show all the packets that are being transmitted over your network. If you open a web browser or for example, watch a video on YouTube, you’ll notice a sudden surge of packet data.
The whole point here is to find patterns or anything that looks suspicious. Taking the columns at the top of the Wireshark interface from left to right, the first number is the ‘packet number’. The second column shows how many seconds it has been since the start of the capture. The third column is the source IP Address and the fourth column shows the destination IP Address. The fifth column is the protocol that sent the packet, i.e. it could be DNS, TCP (Transmission Control Protocol) or even HTTP.
Filtering the packets is key when using Wireshark – done by using the search bar within the interface (top left). If you right-click on a packet of interest you can ‘follow TCP stream’ and you get a ton of raw information.
Even you are a system administrator or if you are just starting out your career as a penetration tester, you need to know what is happening on the network on which you work! Let us know your thoughts! Are you a Wireshark veteran, is there something else we should add to this simple demo?
If you are interested in seeing a demonstration of how to use Wireshark when hacking into VoIP then head on over to our excellent demo with Mile2’s Eric Deshetler where he shows How To Crack SIP Authentication & Listen To VoIP Calls!
BuiltWith, which I use via its' Chrome browser extension is a useful tool. Why? Because you can see what tech a website is using. The types of data you can find out about include: Their...
This is promoting a paid service (I'm not an affiliate for this product) but anyway - here it is! Just shy of a million individuals are available to advertise your brand for USD $75 each month if...
24 thoughts on “Wireshark”
These are not the basics, this is a super small description of its GUI, nothing else.
I tried using wire shark on windows xp…It is not displaying any information in the display! WHat gives?
Got it going….no worries!
Awesome! Glad to hear. We really want to make a more in-depth tutorial than this one, so please stay tuned!
Tutorial? Its nothing more than a cut down version of a UI guide. Nothing whatsoever to do with actually using and understanding Wireshark : not to mention the horrendous advice to run it under gksudo thus risking & compromising the Linux machine. Wireshark does not need to be ,nor should it, run as root on a Linux GUI.
Thanks for your feedback and you are right on many of the points. We are in the process of publishing a MUCH better Wireshark piece that will be written by one of our instructors.
Images are not visible, please fix!
Thanks for letting us know – all fixed.
This tutorial is really just the absolute basics. Wireshark can be used to analyze network problems, latency, DNS, DHCP, and so on. It is powerful because you can see the time and the delay and combine traffic from the same stream on two different physical locations to determine issues with transmission.
Wireshark is basically used to troubleshoot the networks. capturing and filtering of packets. is there any other use of wire shark?
Can you add a link to this new material?
Yes we will be updating this post very soon. Thanks for your comment
Excellent TUT… Thanks… please update us with the advance tut as well
i have 4 different video with different format and bitrate,it is possible for me to measure the bandwidth of video transmission using just 2 PCs to over wireless channel?kindly need ur help here.anyone.
Thanks for your comment. The answer is – not sure! Follow this link if you are interested in Wireshark Training.
Is it possible for Wireshark to miss something? When I have it and my devices are all connected to the same network, it doesn’t pick up everything, and I know there is more information then Wireshark presents. Does Wifi affect the reliability?
There might be something on our WireShark tutorial/ basics page here.
I didn’t think this is a very good tutorial. It just lists various features but doesn’t guide you through a basic, typical usage.
These Wireshark videos might help you out a ton more.
I will look for a better tutorial. I don’t like video tutorials because they are very hard to rewind then fast forward when I miss something.
I hear you. We all have different learning preferences. Let us know if you come across a good Wireshark tutorial. Thanks!
is there any way you can organize an IT Training program in person with these tools and mostly using the W3af web scanner please? i do need your assistance on this ..thanks.
Sure! We are planning a whole bunch of new courses for 2016! We have your email so we will contact you once we have launched them all.
You have to know about OSI layer and its functionality .