Changes between Version 3 and Version 4 of netsec2018wireshark


Ignore:
Timestamp:
Jun 10, 2018, 4:56:15 PM (6 years ago)
Author:
admin
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • netsec2018wireshark

    v3 v4  
    5858=== Captureing Packets from wireshark ===
    5959
    60 Once you open the wireshark you will get the following interface. you can select the interface that you want to capture packets clicking on the intarface listed there. Then you can click the '''blue shark fin button''' to capture the packets.
     60Once you open the wireshark you will get the following interface. you can select the interface that you want to capture packets clicking on the intarface listed there. Then you can click the '''Start Capture''' to capture the packets.
     61
     62You will see the packets capturing. Click the '''Stop Capture''' button when you want to stop the capturing.
     63
     64You can change the interface and add or remove filter by clicking the '''Options''' button.
     65
     66=== Filters ===
     67
     68Wireshark has lot of filters. Let's try a simple filter. Let's capture only the packets that are usinf ICMP protocol.
     69
     70You will the filter text field in the wireshark interface. Type '''icmp''' there and start capturing. You can try different filters.
     71
     72 - '''ip.addr == <Your IP address>''' [Sets a filter for any packet with 10.0.0.1, as either the source or dest]
     73 - '''ip.addr==<Your IP address> && ip.addr==<neighbors IP address>''' [sets a conversation filter between the two defined IP addresses]
     74 - '''http or dns''' [sets a filter to display all http and dns]
     75 - '''tcp.port==53''' [sets a filter for any TCP packet with 4000 as a source or dest port]
     76 - '''http.request''' [displays all HTTP GET requests]
     77 - '''!(arp or icmp or dns)''' [masks out arp, icmp, dns, or whatever other protocols may be background noise. Allowing you to focus on the traffic of interest]