You have found your next IT professional

Month: July 2022

Wireshark – MasterClass

Taken from Chris Greer https://www.youtube.com/c/ChrisGreer

This is a simple posting of the notes I took from going through Chris Greer’s Wireshark beginners series. IF you haven’t already go to his channel and learn about Wireshark.

Screen layout

  • Preferences > Layout

Change from packet bytes to header values

  • Layout > Panes

Add button

  • Right click packet > Prepare as filter > Selected > Add Button (top right)

Colour rules

  • View > Colouring Rules

Custom column

  • Preferences > Appearance > Columns > Add

Simple display filters

  • tcp.flags.syn==1

How to Capture Network Traffic

To see which library WS is using to capture the packets

  • File > About Wireshark

To edit capture options

Snaplength

  • Can be set to reduce the amount of data captured in each frame
  • Often 64B is enough to get the header information etc

Output

Command Line

Add program path ???

The Difference between Capture Filter and Display filter

  • Capture Filter
    • We determine the packets captured as we capture them
    • simpler than display filters
    • beware over doing the capture filer and then missing the packet you need to analyse
  • Display Filter
    • filtering packets we have already captured

Right click on a packet to select filter or Conversation filter

  • Then you can use brackets to add an extra filter

Not filter

  • not arp
  • not (arp or ipv6 or ssdp)
  • useful to slowly home in on the filter you need or the packets you need.

In parameter

  • tcp.port in {80 443 8080}

Clear text strings

  • frame contains google (case sensitive)
  • frame matches Google (case insensitive)

Name Resolution

  • You can also hover over a frame and right click and choose Edit Resolved Name. Then you can name ‘gateway’ or ‘client’ etc

Time Column

  • You can set the time column to various options
  • You can right click on a frame and choose Set/Unset Time reference to reset the time to 0.00 on that frame
  • This is useful as it shows the time relevant to the conversation. Not just the frame above which could be from many other conversations. Set it as a column.
  • Then you can sort the column and look for the responses that were particularly slow.
  • The ones coming from the server are often pertinent.

Statistics

  • Don’t look at each individual packet. Use statistics!!
  • Statistics > Conversations

How to Extract Files from a pcap?

  • Frame 14 contains a .png file and this is what we want to extract.
  • Firstly Right-Click on TCP layer and go to
    • Protocol Preferences
    • Allow subdissector to reassemble TCP streams
  • Reassembles the TCP stream. Otherwise it treats them one packet at a time..
  • Then go to File > Export Objects and we can see that there are 5 types of Objects that WS can export by default
  • So this is how we can extract files from the pcap
  • Executables, binaries
  • Be careful with malware that you don’t execute it!
  • If this export feature does not work, we can look at
    • Right-Click on the frame
    • Choose Follow TCP steam
    • Here we can see the data that comprises the file

Map IP Address Locations with Wireshark Using GeoIP

  • First, we need to download and extract the databases from MaxMind.
  • Now all we have to do is point WS at these databases
  • With this set we can look at the IP layer of a packet and view the GeoIP which will include the City, Country and even map coordinates
  • Now go to Statistics > Endpoints > Map > View In Browser

Enrolled in GICAST, The Open University.

I have enrolled and at the time of writing am halfway through this course provided by The Open University. Personally I find the ‘gamified’ element to be a bit strange but the actual content is relevant and a useful round up of the fundamentals of Cyber Security .

Main page here.

“The ‘Gamified Intelligent Cyber Aptitude and Skills Training’ (GICAST) course is developed by the Cyber security experts from The Open University and funded by Nesta and the Department for Education.”

“This course uses unique game-based assessment, which presents you with a series of cyber security scenarios to help assess your intuitive cyber behaviour and current understanding of cyber security concepts.”

“On completing the game, you’ll be provided with a personalised course pathway to support you with developing knowledge and understanding in cybersecurity.”

© 2025 timnott-it

Theme by Anders NorénUp ↑