Wireshark 101: How to Wireshark, Haktip 115

แชร์
ฝัง
  • เผยแพร่เมื่อ 17 ก.ย. 2014
  • Hak5 -- Cyber Security Education, Inspiration, News & Community since 2005:
    ____________________________________________
    On this HakTip, Shannon Morse breaks out Wireshark for a beginning look at the packet sniffing tool.
    Today we're starting a short series on Wireshark! Hopefully, by the end of this series, you'll understand most of the basics of Wireshark and be able to solve many problems.
    If you're thinking "Hey Hak5, you've done this already! You're right! Kind of. We have used Wireshark in the past for several segments, and I did a short intro video back on episode 64 of HakTip, but now, we'll really delve into it.
    First off, a little bit of review: Wireshark is a network analyzer for Windows, Mac Linux- a tool that is used to inspect data passing through a network interface, be it your Ethernet LAN or even Wireless radio. This can also include radios! These bits of data are considered Frames, of which include "packets". Wireshark has the ability to capture all the packets that are sent and received over your network and decode them for analysis.
    These packets are made up of all sorts of data, from browsing history to keylogs. Wireshark can find all these packets sent over TCP/IP. Wireshark is available to download for free at Wireshark.org.
    For this series, I will be using Wireshark on my Windows 8 laptop - an Acer Aspire S7. It runs pretty much the same on all other operating systems. On today's episode, we'll start looking at the graphical user interface and introduce you to what the heck a packet capture is!
    Firstly, when you open Wiresark, there's a couple of toolbars at the top, an area called Filter, and a few boxes below in the main window. Online directly links you to Wiresharks site, a super handy user guide, and information on the security of Wireshark. Under Files, you'll find Open, which lets you open previously saved captures, and Sample Captures. You can download any of the sample captures through this webpage, and study the data. This will help you understand what kind of packets Wireshark can capture.
    Lastly is the Capture section. This will let you choose your Interface. If I click on mine, you can see each of the interfaces that are available for me to sniff on. It'll also show you which ones are active - mine is on Wi-Fi, so it is most active. Clicking details will show you some pretty generic information about that interface.
    Under Start, you can choose one or more interfaces to check out. Capture Options allows you to customize what information you see during a capture. Take a look at your Capture Options - under here you can choose a filter, a capture file, and more.
    Under Capture Help, you can read up on how to capture, and you can check info on Network Media about what interfaces work on what platforms.
    Let's go ahead and run our first packet capture. I chose Wi-Fi, and click Start.
    You'll see a bunch of weird stuff flying through your Wireshark window. During my capture, I browsed the web a bit and logged on to a few sites. To stop a capture, press the red square in the top toolbar. If you want to start a new capture, hit the green triangle which looks like a shark fin next to it. Now that I've got a finished capture, I can click File, and save, open, or merge the capture. I can print it, I can quit the program, and I can export my packet capture in a variety of ways.
    Under edit, I can find a certain packet, with the search options, I can copy packets, I can mark (highlight) any specific packet, or all the packets. Another interesting thing you can do under Edit, is resetting the time value. You'll notice that the time is in seconds incrementing. You can reset it from the packet you've clicked on. I can add a comment to a packet, configure profiles and preferences.
    Now, I'm giving you homework! Install Wireshark and run your first capture. It doesn't matter what interface you use, just pick one that you're connected to. Now, look through your packet capture and see if you can distinguish between all the different types that appear.
    Let me know what you think. Send me a comment below or email us at tips@hak5.org. And be sure to check out our sister show, Hak5 for more great stuff just like this. I'll be there, reminding you to trust your technolust.
    ~-~~-~~~-~~-~
    Please watch: "Bash Bunny Primer - Hak5 2225"
    • Bash Bunny Primer - Ha...
    ~-~~-~~~-~~-~
    ____________________________________________
    Founded in 2005, Hak5's mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community - where all hackers belong.
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 74

  • @ThomasJScharmann
    @ThomasJScharmann 9 ปีที่แล้ว +7

    Thank-you for this series. Very well done. A great primer.

  • @TrolleoMcTroll
    @TrolleoMcTroll 9 ปีที่แล้ว +4

    Finally a wireshark video!! been waiting a long time for them to get on this

  • @DQFozz
    @DQFozz 9 ปีที่แล้ว +1

    I've used Wireshark for years (actually from way back when it was Ethereal) but thanks for the video. It has highlighted some newer features I was not aware of.

  • @joedarvish70
    @joedarvish70 9 ปีที่แล้ว +4

    Hi Shana, By far you are the best trainer. Great attitude and refreshing. Many thanks

  • @jokerr2230
    @jokerr2230 6 ปีที่แล้ว +2

    yeah!! great learning, thank you sis.

  • @sameerkumar2692
    @sameerkumar2692 4 ปีที่แล้ว

    Beautiful teacher ❣️

  • @bhaveekdesai
    @bhaveekdesai 9 ปีที่แล้ว +1

    Awesome stuff guys!
    Please do a series on ettercap

  • @itsallabouttech562
    @itsallabouttech562 4 ปีที่แล้ว +1

    ANother cool video. Thank you . Really enjoyed it

  • @WhitentonMike
    @WhitentonMike 9 ปีที่แล้ว +16

    I have a capture of a WAP that was being attacked. The attacker spoofed an authorized MAC and duplicated every IP on the network thus disrupting the LAN. I isolated the WAP from the LAN and connected it to a laptop running Wireshark so I could determine what was going on with the WAP. Replaced the WAP with a newer one that can detect and block such attacks. Without Wireshark I would not have known for certain if it was an attack or a malfunctioning WAP.

    • @ShannonMorse
      @ShannonMorse 9 ปีที่แล้ว +4

      Brilliant! That's a great use-case scenario.

    • @WhitentonMike
      @WhitentonMike 9 ปีที่แล้ว +3

      Shannon Morse Thanks, but it was you and Darren doing things with Wireshark that gave me the idea. A bit of Googling on how to identify threats in Wireshark and I was armed. So, truth be told, I should be thanking you. You made me look like a Genius to my customer. Thank you. Thank you. Thank you.

    • @ShannonMorse
      @ShannonMorse 9 ปีที่แล้ว +8

      Mike Whitenton awww, no thank you for supporting us by watching the show. Seriously, it keeps us in business! :)

  • @iandsonmendes5989
    @iandsonmendes5989 7 ปีที่แล้ว +3

    I like to watch your videos because I LIKE TO SEE YOU !!!

  • @RedStallion2000
    @RedStallion2000 5 ปีที่แล้ว +1

    Good video! I even learned (at 7:00 in the video) that Jared Leto allegedly has an allegedly enormous "thing" :P

  • @henkroth
    @henkroth 7 ปีที่แล้ว +2

    more like this please

  • @rgbii2
    @rgbii2 9 ปีที่แล้ว +1

    Love Wireshark, and have been using it for years. Long before it was called wireshark (I think it was ethereal or something like that).
    Good start to a nice series.

    • @ShannonMorse
      @ShannonMorse 9 ปีที่แล้ว +1

      Yup, Ethereal, before the creator when off on his own and rebranded it back in... 2006?

  • @neerpatel4647
    @neerpatel4647 8 ปีที่แล้ว

    Thank you :)

  • @goodmanEnt
    @goodmanEnt 8 ปีที่แล้ว +18

    Could you put your Wireshark videos into a TH-cam playlist, please?

    • @Humanoidable
      @Humanoidable 6 ปีที่แล้ว

      dont ask her to be organized

    • @kenjimiyazaki87
      @kenjimiyazaki87 5 ปีที่แล้ว +1

      @@Humanoidable Its a logical question he wants to watch them in order

    • @ddone1583
      @ddone1583 5 ปีที่แล้ว

      Shane Goodman was

  • @JenBrannstrom
    @JenBrannstrom 9 ปีที่แล้ว

    Great show, Shannon.
    Is it possible to see where Ads in Skype are coming from? I see http requests appearing in WS, but there are many other types of packets that appear. How do I know which ones are related to the Skype Ads, to help me determine if I have adware or if this is genuinely being served by Skype?

    • @Azsiii
      @Azsiii 7 ปีที่แล้ว

      Im curious about this as well.

  • @JGunlimited
    @JGunlimited 7 ปีที่แล้ว +3

    Can anyone on the network with Wireshark installed capture the packets of everyone on the network? That's very very unnerving if that's the case...

    • @SudoTech
      @SudoTech 7 ปีที่แล้ว +12

      Welcome to the Internet ;)

  • @greywolff9367
    @greywolff9367 9 ปีที่แล้ว

    you seem to have more options on what to capture than I do, is there a reason why?? I can capture wifi or local connections can you tell me why?? hoping for a reply..

    • @ShannonMorse
      @ShannonMorse 9 ปีที่แล้ว

      Interfaces? I just have a lot of interfaces built into my laptop to use. So you might have very different hardware.

  • @Topfightvideos
    @Topfightvideos 9 ปีที่แล้ว +1

    Good Share , I wish I knew how you were shooting the video though of your screen in the background whilst your in the forefront. Pretty cool videos keep it up.

    • @Topfightvideos
      @Topfightvideos 8 ปีที่แล้ว

      I have no idea would ha e to ask the show producer

    • @V3ryH1gh
      @V3ryH1gh 8 ปีที่แล้ว

      +Mark Robinson essentially the technique is achieved wth a green screen typically in which in post production "chroma key" is used in the editing software to isolate the green color specifically and thus replace that area with any desired effects(video,photo,etc)

  • @seebeez
    @seebeez 7 ปีที่แล้ว +1

    Sis I would like to get an intro of armitage beEF and metasploit,thanks

  • @vegansoffaith
    @vegansoffaith 9 ปีที่แล้ว

    I got it to work, but how do you tell which ones are encrypted?

    • @SudoTech
      @SudoTech 7 ปีที่แล้ว

      Well the idea behind encrypting your traffic is to prevent against this. You aren't able to read the contents of encrypted packets.

  • @SecurityTalent
    @SecurityTalent 3 ปีที่แล้ว

    thanks

  • @user-zi8xn5sj4w
    @user-zi8xn5sj4w 8 ปีที่แล้ว

    good job ..

  • @BogusBozo
    @BogusBozo 6 ปีที่แล้ว +22

    She has the same outfit as icarly lmao

    • @badboygangsta5318
      @badboygangsta5318 5 ปีที่แล้ว +2

      lol i couldent help but googled it thanks 4 the usless information

    • @ethancbaker2002
      @ethancbaker2002 7 หลายเดือนก่อน

      @@badboygangsta5318lol wtf

  • @Humanoidable
    @Humanoidable 6 ปีที่แล้ว

    Love you sis

  • @arcanelore168
    @arcanelore168 6 ปีที่แล้ว

    Is this skill useful for a software developer?

    • @anteronevarez-lira2280
      @anteronevarez-lira2280 6 ปีที่แล้ว

      Although not necessary, knowing how to maneuver your way around a network analyzer such as wireshark can prove quite useful when implementing software security

  • @wattsaving1
    @wattsaving1 8 ปีที่แล้ว

    Is this tool can work on both 64 and 32 bit systems please ?

  • @tahersadeghi6773
    @tahersadeghi6773 5 หลายเดือนก่อน

    Where are the files?Please slow down a bit.

  • @mestill6329
    @mestill6329 5 ปีที่แล้ว

    --I just KNOW this means Something....!

  • @zz9whydoihavetoenterlastna291
    @zz9whydoihavetoenterlastna291 4 ปีที่แล้ว

    2014 and 1080p HD
    wow.....

  • @jgarrett9810
    @jgarrett9810 4 ปีที่แล้ว +1

    Confused af!!!!!!!!!!

  • @NoxmilesDe
    @NoxmilesDe ปีที่แล้ว

    Hello

  • @nictuniema1249
    @nictuniema1249 6 ปีที่แล้ว

    Omg windows....

  • @-yagirlem5579
    @-yagirlem5579 8 ปีที่แล้ว +2

    Good job your telling people to how track people down....

    • @Azsiii
      @Azsiii 7 ปีที่แล้ว +5

      no.

    • @Humanoidable
      @Humanoidable 6 ปีที่แล้ว

      exactly,no.

  • @mrMamaboy17
    @mrMamaboy17 8 ปีที่แล้ว

    "Hacks" on an Acer Laptop.....

    • @FnugzGaming
      @FnugzGaming 8 ปีที่แล้ว +3

      you can "hack" on any laptop, its not the computer its the OS or tools that matter

    • @glencarbon2533
      @glencarbon2533 8 ปีที่แล้ว

      Mitnick used Toshiba

    • @Fiendel
      @Fiendel 7 ปีที่แล้ว +5

      I fucking use a Raspberry Pi for pentesting, you can hack with a toaster, if te correct tools are instaled

  • @ambassadorofpain1
    @ambassadorofpain1 9 ปีที่แล้ว

    What's with all the videos using Windows lately? Garbage.

    • @ShannonMorse
      @ShannonMorse 9 ปีที่แล้ว +1

      TOTALLY. Thanks for the view. You're paying my rent. :)

    • @ambassadorofpain1
      @ambassadorofpain1 9 ปีที่แล้ว

      Shannon Morse To clarify, I wasn't saying yourself or the show are garbage, just that Windows is. Hope that clears things up.

    • @ShannonMorse
      @ShannonMorse 9 ปีที่แล้ว

      The Aftermath Ahh, thanks for the clarification. I agree, windows does tend to be garbage sometimes. i've been using it lately because all the software I've been showing off just tends to work right in it. Also, my Linux laptop is very slow (an i3) so I like to use this one instead (an i5). Wireshark doesn't always play nice in VM's though, so I choose to just stay on the current OS. I can dual boot into a Linux os, but Windows 8 UEFI doesn't play nice all the time with trying to boot off a thumb drive.

    • @Azsiii
      @Azsiii 7 ปีที่แล้ว +1

      She said you could use whatever OS is supported. This isn't LinuxHak5. or "HaksAreOnlyUsefulOnLinuxOS5". dont be such a fangirl about things.

    • @aquibjavedrollnumber1763
      @aquibjavedrollnumber1763 4 ปีที่แล้ว

      Windows is perfect............................................,...............btw, i have a 93 gb update

  • @troller4jesus
    @troller4jesus 9 ปีที่แล้ว +3

    Wireshark is garbage. I an do more with Windows 7 command prompt and netsh

    • @troller4jesus
      @troller4jesus 9 ปีที่แล้ว +3

      *****
      FINE YOU WIN LEAVE ME ALONE

    • @DQFozz
      @DQFozz 9 ปีที่แล้ว

      Wild statement. For starters, netsh doesn't run on other platforms. On linux you can hack USB comms too. Personally I've not looked at netsh for several years but because of your comments, I will and see how it stacks up.

    • @troller4jesus
      @troller4jesus 9 ปีที่แล้ว +1

      I am starting a series on Netsh if you're interested. Stay tuned

  • @yagami_72
    @yagami_72 7 ปีที่แล้ว +3

    you cant wireshark
    you need to do all with cmd console
    git gud and use linux
    damn windows nubs

    • @xs10z
      @xs10z 6 ปีที่แล้ว

      0/10

    • @Humanoidable
      @Humanoidable 6 ปีที่แล้ว

      1/10 ( I kinda get it).

  • @ron4538
    @ron4538 3 ปีที่แล้ว

    I think I remember her from tekzilla.