- 0 (Registered)
-
Course Content for Wire Shark Training
Table of Contents
Chapter 1: The World of Network Analysis ………………………………………………………… 1
Define Network Analysis ………………………………………………………………………………………… 2
Follow an Analysis Example ……………………………………………………………………………………. 3
Walk-Through of a Troubleshooting Session ……………………………………………………………… 6
Walk-Through of a Typical Security Scenario (aka Network Forensics) ………………………… 8
Troubleshooting Tasks for the Network Analyst …………………………………………………….. 9
Security Tasks for the Network Analyst ………………………………………………………………. 10
Optimization Tasks for the Network Analyst ……………………………………………………….. 10
Application Analysis Tasks for the Network Analyst …………………………………………….. 10
Understand Security Issues Related to Network Analysis …………………………………………… 11
Define Policies Regarding Network Analysis ……………………………………………………….. 11
Files Containing Network Traffic Should be Secured ……………………………………………. 11
Protect Your Network against Unwanted “Sniffers” ……………………………………………… 11
Be Aware of Legal Issues of Listening to Network Traffic …………………………………….. 12
Overcome the “Needle in the Haystack Issue” ………………………………………………………….. 13
Review a Checklist of Analysis Tasks……………………………………………………………………… 14
Understand Network Traffic Flows …………………………………………………………………………. 15
Switching Overview………………………………………………………………………………………….. 15
Routing Overview …………………………………………………………………………………………….. 16
Proxy, Firewall and NAT/PAT Overview ……………………………………………………………. 17
Other Technologies that Affect Packets ……………………………………………………………….. 18
Warnings about “Smarter” Infrastructure Devices …………………………………………………. 19
Launch an Analysis Session …………………………………………………………………………………… 19
iv Contents
Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com
Case Study: Pruning the “Puke” …………………………………………………………………………….. 21
Case Study: The “Securely Invisible” Network ………………………………………………………… 22
Summary …………………………………………………………………………………………………………….. 23
Practice What You’ve Learned ………………………………………………………………………………. 23
Review Questions ………………………………………………………………………………………………… 26
Answers to Review Questions ……………………………………………………………………………….. 27
Chapter 2: Introduction to Wireshark …………………………………………………………….. 29
Wireshark Creation and Maintenance ……………………………………………………………………… 30
Obtain the Latest Version of Wireshar
Contents v
Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com
Use the Main Toolbar for Efficiency ……………………………………………………………………….. 77
Toolbar Icon Definitions ……………………………………………………………………………………. 77
Focus Faster with the Filter Toolbar ………………………………………………………………………… 80
Make the Wireless Toolbar Visible …………………………………………………………………………. 82
Work Faster Using Right-Click Functionality …………………………………………………………… 83
Right Click | Edit or Add Packet Comment… ………………………………………………………. 84
Right Click | Copy ……………………………………………………………………………………………. 85
Right Click | Apply As Column ………………………………………………………………………….. 86
Right Click | Wiki Protocol Page (Packet Details Pane) …………………………………………. 88
Right Click | Filter Field Reference (Packet Details Pane) ……………………………………… 88
Right Click | Resolve Name (Packet Details Pane) ………………………………………………… 88
Right Click | Protocol Preferences ………………………………………………………………………. 89
Sign Up for the Wireshark Mailing Lists …………………………………………………………………. 90
Join ask.wireshark.org! ………………………………………………………………………………………….. 90
Know Your Key Resources ……………………………………………………………………………………. 91
Get Some Trace Files ……………………………………………………………………………………………. 92
Case Study: Detecting Database Death ……………………………………………………………………. 93
Summary …………………………………………………………………………………………………………….. 95
Practice What You’ve Learned ……………………………………………………………………………….. 95
Review Questions ……………………………………………………………………………………………….. 100
Answers to Review Questions ………………………………………………………………………………. 101
Chapter 3: Capture Traffic …………………………………………………………………………. 103
Know Where to Tap Into the Network …………………………………………………………………… 104
Run Wireshark Locally ………………………………………………………………………………………… 105
Portable Wireshark …………………………………………………………………………………………. 105
Wireshark U3 …………………………………………………………………………………………………. 106
Capture Traffic on Switched Networks ………………………………………………………………….. 107
Use a Simple Hub on Half-Duplex Networks ……………………………………………………… 107
Use a Test Access Port (TAP) on Full-Duplex Networks ……………………………………… 108
Using Analyzer Agents for Remote Capture ………………………………………………………. 112
Set up Port Spanning/Port Mirroring on a Switch ………………………………………………… 113
Example of Span Commands ……………………………………………………………………………. 114
Spanning VLANs ……………………………………………………………………………………………. 115
Analyze Routed Networks ……………………………………………………………………………………. 116
Analyze Wireless Networks …………………………………………………………………………………. 117
Monitor Mode ………………………………………………………………………………………………… 117
Native Adapter Capture Issues ………………………………………………………………………….. 118
Capture at Two Locations (Dual Captures) …………………………………………………………….. 119
Select the Right Capture Interface …………………………………………………………………………. 119
Capture on Multiple Adapters Simultaneously ………………………………………………………… 120
Interface Details (Windows Only) …………………………………………………………………………. 120
Capture Traffic Remotely …………………………………………………………………………………….. 121
Configuration Parameters for Remote Capture with rpcapd.exe ……………………………. 122
Remote Capture: Active and Passive Mode Configurations ………………………………….. 123
Save and Use Remote Capture Configurations ……………………………………………………. 123
vi Contents
Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com
Automatically Save Packets to One or More Files ………………………………………………….. 124
Create File Sets for Faster Access …………………………………………………………………….. 124
Use a Ring Buffer to Limit the Number of Files Saved ……………………………………….. 125
Define an Automatic Stop Criteria ……………………………………………………………………. 125
Optimize Wireshark to Avoid Dropping Packets …………………………………………………….. 125
Consider a Dedicated Analyzer Laptop ……………………………………………………………… 125
Capture Options for Optimization …………………………………………………………………….. 126
Display Options for Optimization …………………………………………………………………….. 126
Conserve Memory with Command-Line Capture ……………………………………………………. 126
Case Study: Dual Capture Points the Finger …………………………………………………………… 128
Case Study: Capturing Traffic at Home …………………………………………………………………. 130
Summary …………………………………………………………………………………………………………… 131
Practice What You’ve Learned …………………………………………………………………………….. 131
Review Questions ………………………………………………………………………………………………. 133
Answers to Review Questions ……………………………………………………………………………… 134
Chapter 4: Create and Apply Capture Filters …………………………………………………. 135
The Purpose of Capture Filters …………………………………………………………………………….. 136
Apply a Capture Filter to an Interface …………………………………………………………………… 137
Build Your Own Set of Capture Filters………………………………………………………………….. 139
Identifiers ……………………………………………………………………………………………………… 139
Qualifiers ………………………………………………………………………………………………………. 139
Filter by a Protocol …………………………………………………………………………………………….. 141
Filter Incoming Connection Attempts ……………………………………………………………………. 141
Create MAC/IP Address or Host Name Capture Filters …………………………………………… 141
Use a “My MAC” Capture Filter for Application Analysis ………………………………….. 143
Filter Your Traffic Out of a Trace File (Exclusion Filter) …………………………………….. 144
Capture One Application’s Traffic Only ………………………………………………………………… 145
Use Operators to Combine Capture Filters …………………………………………………………….. 145
Create Capture Filters to Look for Byte Values ………………………………………………………. 146
Manually Edit the Capture Filters File …………………………………………………………………… 147
Sample cfilters File …………………………………………………………………………………………. 148
Share Capture Filters with Others …………………………………………………………………………. 148
Case Study: Kerberos UDP to TCP Issue ………………………………………………………………. 149
Summary …………………………………………………………………………………………………………… 151
Practice What You’ve Learned …………………………………………………………………………….. 151
Review Questions ………………………………………………………………………………………………. 152
Answers to Review Questions ……………………………………………………………………………… 153
Chapter 5: Define Global and Personal Preferences ……………………………………….. 155
Find Your Configuration Folders ………………………………………………………………………….. 156
Set Global and Personal Configurations ………………………………………………………………… 156
Customize Your User Interface Settings ………………………………………………………………… 159
“File Open” Dialog Behavior …………………………………………………………………………… 159
Maximum List Entries …………………………………………………………………………………….. 159
Pane Configurations ……………………………………………………………………………………….. 160
Columns ……………………………………………………………………………………………………….. 161
Contents vii
Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com
Define Your Capture Preferences ………………………………………………………………………….. 162
Select a Default Interface for Faster Capture Launch …………………………………………… 163
Enable Promiscuous Mode to Analyze Other Hosts’ Traffic …………………………………. 163
The Future Trace File Format is Here: pcap-ng …………………………………………………… 163
See the Traffic in Real Time …………………………………………………………………………….. 164
Automatically Scroll During Capture ………………………………………………………………… 164
Automatically Resolve IP and MAC Names …………………………………………………………… 165
Resolve Hardware Addresses (MAC Name Resolution) ………………………………………. 165
Resolve IP Addresses (Network Name Resolution) …………………………………………….. 167
Plot IP Addresses on a World Map with GeoIP ………………………………………………………. 168
Resolve Port Numbers (Transport Name Resolution) ………………………………………………. 168
Resolve SNMP Information …………………………………………………………………………………. 169
Configure Filter Expressions ………………………………………………………………………………… 170
Configure Statistics Settings …………………………………………………………………………………. 171
Define ARP, TCP, HTTP/HTTPS and Other Protocol Settings …………………………………. 172
Detect Duplicate IP Addresses and ARP Storms …………………………………………………. 172
Define How Wireshark Handles TCP Traffic ……………………………………………………… 173
Set Additional Ports for HTTP and HTTPS Dissection ………………………………………… 174
Enhance VoIP Analysis with RTP Settings ………………………………………………………… 174
Configure Wireshark to Decrypt SSL Traffic ……………………………………………………… 174
Configure Protocol Settings with Right-Click …………………………………………………………. 175
Case Study: Non-Standard Web Server Setup …………………………………………………………. 176
Summary …………………………………………………………………………………………………………… 177
Practice What You’ve Learned ……………………………………………………………………………… 177
Review Questions ……………………………………………………………………………………………….. 179
Answers to Review Questions ………………………………………………………………………………. 180
Chapter 6: Colorize Traffic …………………………………………………………………………. 181
Use Colors to Differentiate Traffic Types ………………………………………………………………. 182
Disable One or More Coloring Rules …………………………………………………………………….. 183
Share and Manage Coloring Rules ………………………………………………………………………… 184
Identify Why a Packet is a Certain Color ……………………………………………………………….. 184
Create a “Butt Ugly” Coloring Rule for HTTP Errors ……………………………………………… 185
Color Conversations to Distinguish Them ……………………………………………………………… 187
Temporarily Mark Packets of Interest ……………………………………………………………………. 188
Alter Stream Reassembly Coloring ……………………………………………………………………….. 189
Case Study: Colorizing SharePoint Connections During Login …………………………………. 191
Summary …………………………………………………………………………………………………………… 192
Practice What You’ve Learned ……………………………………………………………………………… 192
Review Questions ……………………………………………………………………………………………….. 197
Answers to Review Questions ………………………………………………………………………………. 198
Chapter 7: Define Time Values and Interpret Summaries …………………………………. 199
Use Time to Identify Network Problems ………………………………………………………………… 200
Understand How Wireshark Measures Packet Time …………………………………………….. 200
Choose the Ideal Time Display Format ……………………………………………………………… 201
Deal with Timestamp Accuracy and Resolution Issues ………………………………………… 203
viii Contents
Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com
Send Trace Files Across Time Zones ……………………………………………………………………. 204
Identify Delays with Time Values ………………………………………………………………………… 205
Create Additional Time Columns ……………………………………………………………………… 206
Measure Packet Arrival Times with a Time Reference ………………………………………… 206
Identify Client, Server and Path Delays …………………………………………………………………. 208
Calculate End-to-End Path Delays ……………………………………………………………………. 209
Locate Slow Server Responses …………………………………………………………………………. 209
Spot Overloaded Clients ………………………………………………………………………………….. 209
View a Summary of Traffic Rates, Packet Sizes and Overall Bytes Transferred …………. 210
Compare Up to Three Traffic Types in a Single Summary Window ……………………… 211
Compare Summary Information for Two or More Trace Files ……………………………… 212
Case Study: Time Column Spots Delayed ACKs ……………………………………………………. 214
Summary …………………………………………………………………………………………………………… 216
Practice What You’ve Learned …………………………………………………………………………….. 216
Review Questions ………………………………………………………………………………………………. 218
Answers to Review Questions ……………………………………………………………………………… 219
Chapter 8: Interpret Basic Trace File Statistics ………………………………………………. 221
Launch Wireshark Statistics ………………………………………………………………………………… 222
Identify Network Protocols and Applications …………………………………………………………. 222
Protocol Settings Can Affect Your Results …………………………………………………………….. 224
Identify the Most Active Conversations ………………………………………………………………… 226
List Endpoints and Map Them on the Earth …………………………………………………………… 227
Spot Suspicious Targets with GeoIP ……………………………………………………………………… 228
List Conversations or Endpoints for Specific Traffic Types ……………………………………… 228
Evaluate Packet Lengths ……………………………………………………………………………………… 229
List All IPv4/IPv6 Addresses in the Traffic ……………………………………………………………. 231
List All Destinations in the Traffic ……………………………………………………………………….. 231
List UDP and TCP Usage ……………………………………………………………………………………. 232
Analyze UDP Multicast Streams ………………………………………………………………………….. 232
Graph the Flow of Traffic ……………………………………………………………………………………. 234
Gather Your HTTP Statistics ……………………………………………………………………………….. 236
Examine All WLAN Statistics ……………………………………………………………………………… 237
Case Study: Application Analysis: Aptimize Website Accelerator™ ………………………… 238
Case Study: Finding VoIP Quality Issues ………………………………………………………………. 243
Summary …………………………………………………………………………………………………………… 245
Practice What You’ve Learned …………………………………………………………………………….. 245
Review Questions ………………………………………………………………………………………………. 247
Answers to Review Questions ……………………………………………………………………………… 248
Chapter 9: Create and Apply Display Filters ………………………………………………….. 249
Understand the Purpose of Display Filters ……………………………………………………………… 250
Create Display Filters Using Auto-Complete …………………………………………………………. 253
Apply Saved Display Filters ………………………………………………………………………………… 254
Use Expressions for Filter Assistance ……………………………………………………………………. 255
Contents ix
Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com
Make Display Filters Quickly Using Right-Click Filtering ……………………………………….. 256
Apply as Filter ……………………………………………………………………………………………….. 257
Prepare a Filter ……………………………………………………………………………………………….. 257
Copy | As Filter ………………………………………………………………………………………………. 257
Filter on Conversations and Endpoints …………………………………………………………………… 258
Filter on the Protocol Hierarchy Window ………………………………………………………………. 258
Understand Display Filter Syntax ………………………………………………………………………….. 259
Combine Display Filters with Comparison Operators ………………………………………………. 260
Alter Display Filter Meaning with Parentheses ……………………………………………………….. 261
Filter on the Existence of a Field …………………………………………………………………………… 261
Filter on Specific Bytes in a Packet ……………………………………………………………………….. 262
Find Key Words in Upper or Lower Case ………………………………………………………………. 263
More Interesting Regex Filters ……………………………………………………………………………… 263
Let Wireshark Catch Display Filter Mistakes …………………………………………………………. 264
Use Display Filter Macros for Complex Filtering ……………………………………………………. 264
Avoid Common Display Filter Mistakes ………………………………………………………………… 266
Manually Edit the dfilters File ………………………………………………………………………………. 267
Case Study: Using Filters and Graphs to Solve Database Issues ………………………………… 269
Case Study: The Chatty Browser …………………………………………………………………………… 270
Case Study: Catching Viruses and Worms ……………………………………………………………… 271
Summary …………………………………………………………………………………………………………… 272
Practice What You’ve Learned ……………………………………………………………………………… 272
Review Questions ……………………………………………………………………………………………….. 274
Answers to Review Questions ………………………………………………………………………………. 275
Chapter 10: Follow Streams and Reassemble Data ………………………………………… 277
The Basics of Traffic Reassembly …………………………………………………………………………. 278
Follow and Reassemble UDP Conversations ………………………………………………………….. 278
Follow and Reassemble TCP Conversations …………………………………………………………… 280
Identify Common File Types ……………………………………………………………………………. 283
Reassemble an FTP File Transfer ……………………………………………………………………… 283
Follow and Reassemble SSL Conversations …………………………………………………………… 285
Reassemble an SMB Transfer ………………………………………………………………………………. 287
Case Study: Unknown Hosts Identified ………………………………………………………………….. 288
Summary …………………………………………………………………………………………………………… 289
Practice What You’ve Learned ……………………………………………………………………………… 289
Review Questions ……………………………………………………………………………………………….. 291
Answers to Review Questions ………………………………………………………………………………. 292
Chapter 11: Customize Wireshark Profiles ……………………………………………………. 293
Customize Wireshark with Profiles ……………………………………………………………………….. 294
Create a New Profile ……………………………………………………………………………………….. 295
Share Profiles …………………………………………………………………………………………………. 296
Create a Troubleshooting Profile ………………………………………………………………………. 297
Create a Corporate Profile ……………………………………………………………………………….. 298
Create a WLAN Profile …………………………………………………………………………………… 298
Create a VoIP Profile ………………………………………………………………………………………. 299
Create a Security Profile ………………………………………………………………………………….. 300
x Contents
Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com
Case Study: Customizing Wireshark for the Customer ……………………………………………. 301
Summary …………………………………………………………………………………………………………… 302
Practice What You’ve Learned …………………………………………………………………………….. 302
Review Questions ………………………………………………………………………………………………. 303
Answers to Review Questions ……………………………………………………………………………… 304
Chapter 12: Annotate, Save, Export and Print Packets ……………………………………. 305
Annotate a Packet or an Entire Trace File ……………………………………………………………… 306
Save Filtered, Marked and Ranges of Packets ………………………………………………………… 309
Export Packet Content for Use in Other Programs ………………………………………………….. 311
Export SSL Keys ……………………………………………………………………………………………….. 313
Save Conversations, Endpoints, IO Graphs and Flow Graph Information ………………….. 314
Export Packet Bytes ……………………………………………………………………………………………. 314
Case Study: Saving Subsets of Traffic to Isolate Problems ………………………………………. 315
Summary …………………………………………………………………………………………………………… 317
Practice What You’ve Learned …………………………………………………………………………….. 317
Review Questions ………………………………………………………………………………………………. 319
Answers to Review Questions ……………………………………………………………………………… 320
Chapter 13: Use Wireshark’s Expert System ………………………………………………….. 321
Let Wireshark’s Expert Information Guide You ……………………………………………………… 322
Launch Expert Info Quickly …………………………………………………………………………….. 322
Colorize Expert Info Elements …………………………………………………………………………. 325
Filter on TCP Expert Information Elements ……………………………………………………….. 326
Understand TCP Expert Information …………………………………………………………………….. 327
What Triggers TCP Retransmissions? ……………………………………………………………….. 327
What Triggers Previous Segment Lost? …………………………………………………………….. 328
What Triggers ACKed Lost Packet? …………………………………………………………………. 328
What Triggers Keep Alive? ……………………………………………………………………………… 328
What Triggers Duplicate ACK? ……………………………………………………………………….. 328
What Triggers Zero Window? ………………………………………………………………………….. 329
What Triggers Zero Window Probe? ………………………………………………………………… 329
What Triggers Zero Window Probe ACK? ………………………………………………………… 329
What Triggers Keep Alive ACK? …………………………………………………………………….. 329
What Triggers Out-of-Order? …………………………………………………………………………… 330
What Triggers Fast Retransmission? …………………………………………………………………. 330
What Triggers Window Update? ………………………………………………………………………. 330
What Triggers Window is Full? ……………………………………………………………………….. 331
What Triggers TCP Ports Reused? ……………………………………………………………………. 331
What Triggers 4 NOP in a Row? ………………………………………………………………………. 331
Case Study: Expert Info Catches Remote Access Headaches ……………………………………. 333
Summary …………………………………………………………………………………………………………… 337
Practice What You’ve Learned …………………………………………………………………………….. 337
Review Questions ………………………………………………………………………………………………. 338
Answers to Review Questions ……………………………………………………………………………… 339
Contents xi
Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com
Chapter 14: TCP/IP Analysis Overview …………………………………………………………. 341
TCP/IP Functionality Overview ……………………………………………………………………………. 342
When Everything Goes Right …………………………………………………………………………… 343
Follow the Multi-Step Resolution Process ………………………………………………………….. 343
Step 1: Port Number Resolution ……………………………………………………………………….. 345
Step 2: Network Name Resolution (Optional) …………………………………………………….. 345
Step 3: Route Resolution—When the Target is Local ………………………………………….. 346
Step 4: Local MAC Address Resolution …………………………………………………………….. 346
Step 5: Route Resolution—When the Target is Remote ……………………………………….. 346
Step 6: Local MAC Address Resolution for a Gateway ……………………………………….. 347
Build the Packet ………………………………………………………………………………………………….. 347
Case Study: Absolving the Network from Blame ……………………………………………………. 350
Summary …………………………………………………………………………………………………………… 351
Practice What You’ve Learned …………………………………….
xii Contents
Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com
Dissect the ARP Packet Structure …………………………………………………………………………. 382
Hardware Type ………………………………………………………………………………………………. 382
Protocol Type ………………………………………………………………………………………………… 382
Length of Hardware Address …………………………………………………………………………… 382
Length of Protocol Address ……………………………………………………………………………… 382
Opcode …………………………………………………………………………………………………………. 382
Sender’s Hardware Address …………………………………………………………………………….. 383
Sender’s Protocol Address ………………………………………………………………………………. 383
Target Hardware Address ………………………………………………………………………………… 383
Target Protocol Address ………………………………………………………………………………….. 383
Filter on ARP Traffic ………………………………………………………………………………………….. 383
Case Study: Death by ARP ………………………………………………………………………………….. 384
Case Study: The Tale of the Missing ARP …………………………………………………………….. 385
Summary …………………………………………………………………………………………………………… 387
Practice What You’ve Learned …………………………………………………………………………….. 387
Review Questions ………………………………………………………………………………………………. 388
Answers to Review Questions ……………………………………………………………………………… 389
Chapter 17: Analyze Internet Protocol (IPv4/IPv6) Traffic ………………………………… 391
Identify the Purpose of IP ……………………………………………………………………………………. 392
Analyze Normal IPv4 Traffic ………………………………………………………………………………. 393
Analyze IPv4 Problems ……………………………………………………………………………………….. 394
Dissect the IPv4 Packet Structure …………………………………………………………………………. 395
Version Field …………………………………………………………………………………………………. 395
Header Length Field ……………………………………………………………………………………….. 396
Differentiated Services Field and Explicit Congestion Notification ………………………. 396
Total Length Field ………………………………………………………………………………………….. 397
Identification Field …………………………………………………………………………………………. 397
Flags Field …………………………………………………………………………………………………….. 397
Fragment Offset Field …………………………………………………………………………………….. 398
Time to Live Field ………………………………………………………………………………………….. 399
Protocol Field ………………………………………………………………………………………………… 400
Header Checksum Field ………………………………………………………………………………….. 400
IPv4 Source Address Field ………………………………………………………………………………. 400
IPv4 Destination Address Field ………………………………………………………………………… 400
Options Field …………………………………………………………………………………………………. 401
IPv4 Broadcast/Multicast Traffic ……………………………………………………………………… 401
An Introduction to IPv6 Traffic ……………………………………………………………………………. 402
Dissect the IPv6 Packet Structure …………………………………………………………………………. 403
Version Field …………………………………………………………………………………………………. 403
Traffic Class Fields (DiffServ, ECT and ECN-CE) …………………………………………….. 403
Flow Label Field ……………………………………………………………………………………………. 403
Payload Length Field ……………………………………………………………………………………… 403
Next Header Field ………………………………………………………………………………………….. 404
Hop Limit Field ……………………………………………………………………………………………… 404
Source IPv6 Address Field ………………………………………………………………………………. 404
Destination IPv6 Address Field ………………………………………………………………………… 404
Contents xiii
Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com
Basic IPv6 Addressing ………………………………………………………………………………………… 405
Auto Configuration Mode (no DHCP Server) (M=0 and O=0) ……………………………… 408
DHCPv6 Stateful Mode (M=1) …………………………………………………………………………. 408
DHCPv6 Stateless Mode (M=0 and O=1) ………………………………………………………….. 408
6to4 Tunneling (IPv6 Tunneled Inside IPv4) ………………………………………………………. 409
Teredo …………………………………………………………………………………………………………… 410
Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) ……………………………….. 411
Sanitize Your IP Addresses in Trace Files ……………………………………………………………… 411
Set Your IPv4 Protocol Preferences ………………………………………………………………………. 413
Reassemble Fragmented IP Datagrams ………………………………………………………………. 413
Enable GeoIP Lookups ……………………………………………………………………………………. 413
Interpret the Reserved Flag as a Security Flag (RFC 3514) <g> ……………………………. 413
Troubleshoot Encrypted Communications ……………………………………………………………… 413
Filter on IPv4 Traffic …………………………………………………………………………………………… 415
Filter on IPv6 Traffic …………………………………………………………………………………………… 415
Case Study: Everyone Blamed the Router ………………………………………………………………. 416
Case Study: It’s Not the Network’s Problem! …………………………………………………………. 417
Case Study: IPv6 Addressing Mayhem ………………………………………………………………….. 418
Summary …………………………………………………………………………………………………………… 420
Practice What You’ve Learned ……………………………………………………………………………… 420
Review Questions ……………………………………………………………………………………………….. 422
Answers to Review Questions ………………………………………………………………………………. 423
Chapter 18: Analyze Internet Control Message Protocol (ICMPv4/ICMPV6)
Traffic ……………………………………………………………………………………………………. 425
The Purpose of ICMP ………………………………………………………………………………………….. 426
Analyze Normal ICMP Traffic ……………………………………………………………………………… 427
Analyze ICMP Problems ……………………………………………………………………………………… 429
Dissect the ICMP Packet Structure ……………………………………………………………………….. 430
Type ……………………………………………………………………………………………………………… 430
Code ……………………………………………………………………………………………………………… 431
Checksum ……………………………………………………………………………………………………… 433
Basic ICMPv6 Functionality ………………………………………………………………………………… 434
Filter on ICMP and ICMPv6 Traffic ……………………………………………………………………… 438
Case Study: The Dead-End Router ………………………………………………………………………… 439
Summary …………………………………………………………………………………………………………… 440
Practice What You’ve Learned ……………………………………………………………………………… 440
Review Questions ……………………………………………………………………………………………….. 441
Answers to Review Questions ………………………………………………………………………………. 442
Chapter 19: Analyze User Datagram Protocol (UDP) Traffic ………………………………. 445
The Purpose of UDP ……………………………………………………………………………………………. 446
Analyze Normal UDP Traffic……………………………………………………………………………….. 447
Analyze UDP Problems ……………………………………………………………………………………….. 448
xiv Contents
Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com
Dissect the UDP Packet Structure …………………………………………………………………………. 450
Source Port Field ……………………………………………………………………………………………. 450
Destination Port Field ……………………………………………………………………………………… 450
Length Field ………………………………………………………………………………………………….. 451
Checksum Field ……………………………………………………………………………………………… 451
Filter on UDP Traffic ………………………………………………………………………………………….. 451
Case Study: Troubleshooting Time Synchronization ……………………………………………….. 452
Summary …………………………………………………………………………………………………………… 453
Practice What You’ve Learned …………………………………………………………………………….. 453
Review Questions ………………………………………………………………………………………………. 454
Answers to Review Questions ……………………………………………………………………………… 455
Chapter 20: Analyze Transmission Control Protocol (TCP) Traffic ………………………. 457
The Purpose of TCP ……………………………………………………………………………………………. 458
Analyze Normal TCP Communications…………………………………………………………………. 459
The Establishment of TCP Connections …………………………………………………………….. 459
When TCP-based Services are Refused …………………………………………………………….. 460
The Termination of TCP Connections ………………………………………………………………. 461
How TCP Tracks Packets Sequentially ……………………………………………………………… 463
How TCP Recovers from Packet Loss ………………………………………………………………. 465
Improve Packet Loss Recovery with Selective Acknowledgments ………………………… 467
Understand TCP Flow Control …………………………………………………………………………. 470
Understand Nagling and Delayed ACKs ……………………………………………………………. 471
Analyze TCP Problems ……………………………………………………………………………………….. 473
Dissect the TCP Packet Structure …………………………………………………………………………. 477
Source Port Field ……………………………………………………………………………………………. 477
Destination Port Field ……………………………………………………………………………………… 477
Stream Index [Wireshark Field] ……………………………………………………………………….. 477
Sequence Number Field ………………………………………………………………………………….. 477
Next Expected Sequence Number [Wireshark Field] …………………………………………… 477
Acknowledgment Number Field ………………………………………………………………………. 477
Data Offset Field ……………………………………………………………………………………………. 477
Flags Field …………………………………………………………………………………………………….. 478
Window Field ………………………………………………………………………………………………… 479
Checksum Field ……………………………………………………………………………………………… 479
Urgent Pointer Field ……………………………………………………………………………………….. 479
TCP Options Area (Optional) …………………………………………………………………………… 480
Filter on TCP Traffic ………………………………………………………………………………………….. 482
Set TCP Protocol Preferences ………………………………………………………………………………. 483
Validate the TCP Checksum if Possible …………………………………………………………….. 483
Allow Subdissector to Reassemble TCP Streams ……………………………………………….. 483
Analyze TCP Sequence Numbers …………………………………………………………………….. 485
Relative Sequence Numbers …………………………………………………………………………….. 486
Window Scaling is Calculated Automatically …………………………………………………….. 486
Track Number of Bytes in Flight ………………………………………………………………………. 487
Try Heuristic Sub-Dissectors First ……………………………………………………………………. 487
Ignore TCP Timestamps in Summary ……………………………………………………………….. 487
Calculate Conversation Timestamps …………………………………………………………………. 488
Contents xv
Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com
Case Study: Connections Require Four Attempts ……………………………………………………. 489
Summary …………………………………………………………………………………………………………… 490
Practice What You’ve Learned ……………………………………………………………………………… 490
Review Questions ……………………………………………………………………………………………….. 492
Answers to Review Questions ………………………………………………………………………………. 493
Chapter 21: Graph IO Rates and TCP Trends …………………………………………………. 495
Use Graphs to View Trends………………………………………………………………………………….. 496
Generate Basic IO Graphs ……………………………………………………………………………………. 497
Filter IO Graphs ………………………………………………………………………………………………….. 498
Coloring ………………………………………………………………………………………………………… 499
Styles and Layers ……………………………………………………………………………………………. 499
X and Y Axis …………………………………………………………………………………………………. 500
Smoothing ……………………………………………………………………………………………………… 500
Print Your IO Graph ……………………………………………………………………………………….. 501
Generate Advanced IO Graphs ……………………………………………………………………………… 501
SUM(*) Calc ………………………………………………………………………………………………….. 501
MIN(*), AVG(*) and MAX(*) Calc Values ……………………………………………………….. 503
COUNT(*) Calc ……………………………………………………………………………………………… 504
LOAD(*) Calc ……………………………………………………………………………………………….. 505
Compare Traffic Trends in IO Graphs……………………………………………………………………. 506
Graph Round Trip Time ………………………………………………………………………………………. 508
Graph Throughput Rates ……………………………………………………………………………………… 510
Graph TCP Sequence Numbers over Time …………………………………………………………….. 511
Interpret TCP Window Size Issues ……………………………………………………………………. 511
Interpret Packet Loss, Duplicate ACKs and Retransmissions ……………………………….. 514
Case Study: Watching Performance Levels Drop ……………………………………………………. 515
Case Study: Graphing RTT to the Corporate Office ………………………………………………… 516
Case Study: Testing QoS Policies …………………………………………………………………………. 519
Summary …………………………………………………………………………………………………………… 520
Practice What You’ve Learned ……………………………………………………………………………… 520
Review Questions ……………………………………………………………………………………………….. 522
Answers to Review Questions ………………………………………………………………………………. 523
Chapter 22: Analyze Dynamic Host Configuration Protocol (DHCPv4/DHCPv6)
Traffic ……………………………………………………………………………………………………. 525
The Purpose of DHCP …………………………………………………………………………………………. 526
Analyze Normal DHCP Traffic …………………………………………………………………………….. 526
Analyze DHCP Problems …………………………………………………………………………………….. 530
Dissect the DHCP Packet Structure ……………………………………………………………………….. 532
Message Type ………………………………………………………………………………………………… 532
Hardware Type ………………………………………………………………………………………………. 532
Hardware Length ……………………………………………………………………………………………. 532
Hops ……………………………………………………………………………………………………………… 532
Transaction ID ……………………………………………………………………………………………….. 532
Seconds Elapsed …………………………………………………………………………………………….. 532
BOOTP Flags …………………………………………………………………………………………………. 532
Client IP Address ……………………………………………………………………………………………. 532
Your (Client) IP Address …………………………………………………………………………………. 532
xvi Contents
Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com
Next Server IP Address …………………………………………………………………………………… 532
Relay Agent IP Address ………………………………………………………………………………….. 533
Client MAC Address ………………………………………………………………………………………. 533
Server Host Name ………………………………………………………………………………………….. 533
Boot File Name ……………………………………………………………………………………………… 533
Magic Cookie ………………………………………………………………………………………………… 533
Option …………………………………………………………………………………………………………… 533
An Introduction to DHCPv6 ………………………………………………………………………………… 534
Display BOOTP-DHCP Statistics …………………………………………………………………………. 536
Filter on DHCP/DHCPv6 Traffic …………………………………………………………………………. 537
Case Study: Declining Clients ……………………………………………………………………………… 538
Summary …………………………………………………………………………………………………………… 540
Practice What You’ve Learned …………………………………………………………………………….. 540
Review Questions ………………………………………………………………………………………………. 542
Answers to Review Questions ……………………………………………………………………………… 543
Chapter 23: Analyze Hypertext Transfer Protocol (HTTP) Traffic …………………………. 545
The Purpose of HTTP …………………………………………………………………………………………. 546
Analyze Normal HTTP Communications ………………………………………………………………. 547
Analyze HTTP Problems …………………………………………………………………………………….. 551
Dissect HTTP Packet Structures …………………………………………………………………………… 554
HTTP Methods ………………………………………………………………………………………………. 555
Host ……………………………………………………………………………………………………………… 555
Request Modifiers ………………………………………………………………………………………….. 555
Filter on HTTP or HTTPS Traffic ………………………………………………………………………… 556
Export HTTP Objects …………………………………………………………………………………………. 558
Display HTTP Statistics ………………………………………………………………………………………. 558
HTTP Load Distribution …………………………………………………………………………………. 558
HTTP Packet Counter …………………………………………………………………………………….. 559
HTTP Requests ……………………………………………………………………………………………… 559
Graph HTTP Traffic Flows ………………………………………………………………………………….. 561
Choose Packets ………………………………………………………………………………………………. 561
Choose Flow Type …………………………………………………………………………………………. 561
Choose Node Address Type …………………………………………………………………………….. 561
Set HTTP Preferences …………………………………………………………………………………………. 563
Analyze HTTPS Communications ………………………………………………………………………… 564
Analyze SSL/TLS Handshake ………………………………………………………………………….. 565
Analyze TLS Encrypted Alerts ………………………………………………………………………… 569
Decrypt HTTPS Traffic …………………………………………………………………………………… 570
Export SSL Keys ……………………………………………………………………………………………. 574
Case Study: HTTP Proxy Problems ………………………………………………………………………. 575
Summary …………………………………………………………………………………………………………… 576
Practice What You’ve Learned …………………………………………………………………………….. 576
Review Questions ………………………………………………………………………………………………. 578
Answers to Review Questions ……………………………………………………………………………… 579
Contents xvii
Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com
Chapter 24: Analyze File Transfer Protocol (FTP) Traffic …………………………………… 581
The Purpose of FTP …………………………………………………………………………………………….. 582
Analyze Normal FTP Communications………………………………………………………………….. 583
Analyze Passive Mode Connections ………………………………………………………………….. 586
Analyze Active Mode Connections …………………………………………………………………… 588
Analyze FTP Problems ………………………………………………………………………………………… 589
Dissect the FTP Packet Structure ………………………………………………………………………….. 591
Filter on FTP Traffic …………………………………………………………………………………………… 594
Reassemble FTP Traffic ………………………………………………………………………………………. 595
Case Study: Secret FTP Communications ………………………………………………………………. 596
Summary …………………………………………………………………………………………………………… 598
Practice What You’ve Learned ……………………………………………………………………………… 598
Review Questions ……………………………………………………………………………………………….. 600
Answers to Review Questions ………………………………………………………………………………. 601
Chapter 25: Analyze Email Traffic ……………………………………………………………….. 603
The Purpose of POP ……………………………………………………………………………………………. 604
Analyze Normal POP Communications …………………………………………………………………. 605
Analyze POP Problems ……………………………………………………………………………………….. 606
Dissect the POP Packet Structure ………………………………………………………………………….. 608
Filter on POP Traffic …………………………………………………………………………………………… 610
The Purpose of SMTP …………………………………………………………………………………………. 611
Analyze Normal SMTP Communications ………………………………………………………………. 612
Analyze SMTP Problems …………………………………………………………………………………….. 613
Dissect the SMTP Packet Structure ……………………………………………………………………….. 614
Filter on SMTP Traffic ………………………………………………………………………………………… 616
Case Study: SMTP Problem—Scan2Email Job ………………………………………………………. 617
Summary …………………………………………………………………………………………………………… 618
Practice What You’ve Learned ……………………………………………………………………………… 618
Review Questions ……………………………………………………………………………………………….. 619
Answers to Review Questions ………………………………………………………………………………. 620
Chapter 26: Introduction to 802.11 (WLAN) Analysis ……………………………………… 621
Analyze WLAN Traffic ……………………………………………………………………………………….. 622
Analyze Signal Strength and Interference ………………………………………………………………. 623
Capture WLAN Traffic ……………………………………………………………………………………….. 626
Compare Monitor Mode vs. Promiscuous Mode …………………………………………………. 626
Select the Wireless Interface …………………………………………………………………………….. 627
Set Up WLAN Decryption ……………………………………………………………………………….. 628
Select to Prepend Radiotap or PPI Headers ………………………………………………………… 631
Compare Signal Strength and Signal-to-Noise Ratios ………………………………………….. 635
Understand 802.11 Traffic Basics …………………………………………………………………………. 636
Data Frames …………………………………………………………………………………………………… 636
Management Frames ……………………………………………………………………………………….. 636
Control Frames ………………………………………………………………………………………………. 638
Analyze Normal 802.11 Communications ……………………………………………………………… 638
Dissect the 802.11 Frame Structure ……………………………………………………………………….. 640
xviii Contents
Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com
Filter on All WLAN Traffic …………………………………………………………………………………. 641
Analyze Frame Control Types and Subtypes ………………………………………………………….. 642
Customize Wireshark for WLAN Analysis ……………………………………………………………. 647
Case Study: Cruddy Barcode Communications ………………………………………………………. 648
Case Study: Cooking the WLAN ………………………………………………………………………….. 650
Summary …………………………………………………………………………………………………………… 652
Practice What You’ve Learned …………………………………………………………………………….. 652
Review Questions ………………………………………………………………………………………………. 655
Answers to Review Questions ……………………………………………………………………………… 656
Chapter 27: Introduction to Voice over IP (VoIP) Analysis ………………………………… 659
Understand VoIP Traffic Flows ……………………………………………………………………………. 660
Session Bandwidth and RTP Port Definition ………………………………………………………….. 663
Analyze VoIP Problems ………………………………………………………………………………………. 665
Packet Loss ……………………………………………………………………………………………………. 665
Jitter ……………………………………………………………………………………………………………… 666
Examine SIP Traffic …………………………………………………………………………………………… 667
SIP Commands ………………………………………………………………………………………………. 667
SIP Response Codes ……………………………………………………………………………………….. 668
Examine RTP Traffic ………………………………………………………………………………………….. 672
Play Back VoIP Conversations …………………………………………………………………………….. 674
RTP Player Marker Definitions ……………………………………………………………………………. 675
Create a VoIP Profile ………………………………………………………………………………………….. 676
Filter on VoIP Traffic …………………………………………………………………………………………. 676
Case Study: Lost VoIP Tones ………………………………………………………………………………. 677
Summary …………………………………………………………………………………………………………… 679
Practice What You’ve Learned …………………………………………………………………………….. 679
Review Questions ………………………………………………………………………………………………. 680
Answers to Review Questions ……………………………………………………………………………… 681
Chapter 28: Baseline “Normal” Traffic Patterns …………………………………………….. 683
Understand the Importance of Baselining ………………………………………………………………. 684
Baseline Broadcast and Multicast Types and Rates …………………………………………….. 685
Baseline Protocols and Applications …………………………………………………………………. 685
Baseline Boot up Sequences …………………………………………………………………………….. 686
Baseline Login/Logout Sequences ……………………………………………………………………. 687
Baseline Traffic during Idle Times ……………………………………………………………………. 687
Baseline Application Launch Sequences and Key Tasks ……………………………………… 687
Baseline Web Browsing Sessions …………………………………………………………………….. 688
Baseline Name Resolution Sessions ………………………………………………………………….. 688
Baseline Throughput Tests ………………………………………………………………………………. 688
Baseline Wireless Connectivity ………………………………………………………………………… 689
Baseline VoIP Communications……………………………………………………………………….. 689
Case Study: Login Log Jam …………………………………………………………………………………. 690
Case Study: Solving SAN Disconnects …………………………………………………………………. 691
Summary …………………………………………………………………………………………………………… 692
Practice What You’ve Learned …………………………………………………………………………….. 692
Review Questions ………………………………………………………………………………………………. 694
Answers to Review Questions ……………………………………………………………………………… 695
Contents xix
Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com
Chapter 29: Find the Top Causes of Performance Problems …………………………….. 697
Troubleshoot Performance Problems …………………………………………………………………….. 698
Identify High Latency Times ………………………………………………………………………………… 699
Filter on Arrival Times ……………………………………………………………………………………. 700
Filter on the Delta Times …………………………………………………………………………………. 701
Filter on the Time since Reference or First Packet ………………………………………………. 701
Filter on TCP Conversation Times ……………………………………………………………………. 702
Point to Slow Processing Times ……………………………………………………………………………. 702
Practice Working with Time Issues ……………………………………………………………………….. 703
Find the Location of Packet Loss ………………………………………………………………………….. 706
Watch Signs of Misconfigurations …………………………………..
Course Content
Curriculum is empty