Taken from Chris Greer https://www.youtube.com/c/ChrisGreer

This is a simple posting of the notes I took from going through Chris Greer’s Wireshark beginners series. IF you haven’t already go to his channel and learn about Wireshark.

Screen layout

  • Preferences > Layout

Change from packet bytes to header values

  • Layout > Panes

Add button

  • Right click packet > Prepare as filter > Selected > Add Button (top right)

Colour rules

  • View > Colouring Rules

Custom column

  • Preferences > Appearance > Columns > Add

Simple display filters

  • tcp.flags.syn==1

How to Capture Network Traffic

To see which library WS is using to capture the packets

  • File > About Wireshark

To edit capture options

Snaplength

  • Can be set to reduce the amount of data captured in each frame
  • Often 64B is enough to get the header information etc

Output

Command Line

Add program path ???

The Difference between Capture Filter and Display filter

  • Capture Filter
    • We determine the packets captured as we capture them
    • simpler than display filters
    • beware over doing the capture filer and then missing the packet you need to analyse
  • Display Filter
    • filtering packets we have already captured

Right click on a packet to select filter or Conversation filter

  • Then you can use brackets to add an extra filter

Not filter

  • not arp
  • not (arp or ipv6 or ssdp)
  • useful to slowly home in on the filter you need or the packets you need.

In parameter

  • tcp.port in {80 443 8080}

Clear text strings

  • frame contains google (case sensitive)
  • frame matches Google (case insensitive)

Name Resolution

  • You can also hover over a frame and right click and choose Edit Resolved Name. Then you can name ‘gateway’ or ‘client’ etc

Time Column

  • You can set the time column to various options
  • You can right click on a frame and choose Set/Unset Time reference to reset the time to 0.00 on that frame
  • This is useful as it shows the time relevant to the conversation. Not just the frame above which could be from many other conversations. Set it as a column.
  • Then you can sort the column and look for the responses that were particularly slow.
  • The ones coming from the server are often pertinent.

Statistics

  • Don’t look at each individual packet. Use statistics!!
  • Statistics > Conversations

How to Extract Files from a pcap?

  • Frame 14 contains a .png file and this is what we want to extract.
  • Firstly Right-Click on TCP layer and go to
    • Protocol Preferences
    • Allow subdissector to reassemble TCP streams
  • Reassembles the TCP stream. Otherwise it treats them one packet at a time..
  • Then go to File > Export Objects and we can see that there are 5 types of Objects that WS can export by default
  • So this is how we can extract files from the pcap
  • Executables, binaries
  • Be careful with malware that you don’t execute it!
  • If this export feature does not work, we can look at
    • Right-Click on the frame
    • Choose Follow TCP steam
    • Here we can see the data that comprises the file

Map IP Address Locations with Wireshark Using GeoIP

  • First, we need to download and extract the databases from MaxMind.
  • Now all we have to do is point WS at these databases
  • With this set we can look at the IP layer of a packet and view the GeoIP which will include the City, Country and even map coordinates
  • Now go to Statistics > Endpoints > Map > View In Browser