Wireshark Is An Amazing (and “Leading”) Networking Monitoring Tool
Posted by Henry Dalziel | December 16, 2019 | Questions / Comments 24
- C|EH, Security+, MSc Marketing Management;
- Based in Hong Kong for the last five years;
- Cybersecurity Pro & Growth Hacker
Wireshark is a very powerful and popular network analyzer for Windows, Mac and Linux. It’s a tool that is used to inspect data passing through a network interface which could be your ethernet, LAN and WiFi.
Check out our recommended Wireshark training books and study guides. The prices vary from only $5 for the Kindle Version to full comprehensive Wireshark tutorial guides. Some of these titles are ideal for beginners that are interested to learn more about networking and being able to sniff traffic.
If you’d like to see our recommended Wireshark tutorial video hit up this link. [49 mins long detailed beginners guide]
The series of data that Wireshark inspects are called ‘Frames’ which includes ‘Packets’. Wireshark has the ability to capture all of those packets that are sent and received over your network and it can decode them for analysis. When you do anything over the Internet, such as browse websites, use VoIP, IRC etc., the data is always converted into packets when it passes through your network interface or your LAN card. Wireshark will hunt for those packets in your TCP/ IP layer during the transmission and it will keep, and present this data, on its’ very own GUI.
It is important to note that whilst this is an excellent tool for a network administrator that needs to check that their customer’s sensitive data is being transmitted securely – it can also be used be used by hackers on unsecured networks – such as airport WiFi. The moral of the story at this point is to stay clear of clear text http protocols: that is the best advice we can give. To remedy this we would encourage you to use a Firefox addon called https everywhere or use an SSH or VPN tunnel.
Step 1: Start Wireshark!
To open Wireshark in Linux (after you have downloaded it) open it in a terminal with:
– this will open the wireshark GUI. Worth quickly noting that Wireshark comes pre-installed with most pentesting Linux distros like BackBox and Kali Linux. The “gksudo” command tells your Linux box to open the application, in this instance Wireshark, in its’ native GUI whilst in a super-user mode, aka. Sudo.
Step 2: Wireshark GUI
Once the Wireshark GUI has opened, you’ll see that the dashboard has a left column box called ‘Interface List’. This list lets you know which devices and capture cards you can use. At the top of the application, there is an option called ‘Capture Options’ which is exactly that, it allows you to modify and tweak how you would like to capture the packets of data that are being transmitted over your network.
Step 3. Wireshark Interface
If you have a look at your interface list (see Step 2 and the associated screenshot) you’ll see that one of your devices is actually sending and receiving packets. Options include promiscuous mode and capture mode etc. Have a play around with these and understand what each of these functions does – and you will rapidly learn how to effectively use Wireshark.
Step 4. Capture Interface Options
This screenshot shows the Wireshark capture interfaces, in other words, it shows what processes and platforms are receiving and sending data on your machine. If you have a wireless card, then it will show it, etc.
Step 5. The Main Packets Panel
Once you are happy with the interface you’d like to use, go ahead and click ‘start’ and Wireshark will show all the packets that are being transmitted over your network. If you open a web browser or for example, watch a video on YouTube, you’ll notice a sudden surge of packet data. The whole point here is to find patterns or anything that looks suspicious. Taking the columns at the top of the Wireshark interface from left to right, the first number is the ‘packet number’. The second column shows how many seconds it has been since the start of the capture. The third column is the source IP Address and the fourth column shows the destination IP Address. The fifth column is the protocol that sent the packet, i.e. it could be DNS, TCP (Transmission Control Protocol) or even HTTP.
Filtering the packets is key when using Wireshark – done by using the search bar within the interface (top left). If you right-click on a packet of interest you can ‘follow TCP stream’ and you get a ton of raw information.
Learn Wireshark! Even you are a system administrator or if you are just starting out your career as a penetration tester, you need to know what is happening on the network on which you work! Let us know your thoughts! Are you a Wireshark veteran, is there something else we should add to this simple demo?
If you are interested in seeing a demonstration of how to use Wireshark when hacking into VoIP then head on over to our excellent demo with Mile2’s Eric Deshetler where he shows How To Crack SIP Authentication & Listen To VoIP Calls!
You may also like...
We've interviewed over 25 Cybersecurity Professionals to ask them that exact question...