Wire Shark

  • admin
  • 0 (Registered)
  • (0 Review)

 

Course Content for Wire Shark Training

Table of Contents

Chapter 1: The World of Network Analysis ………………………………………………………… 1

Define Network Analysis ………………………………………………………………………………………… 2

Follow an Analysis Example ……………………………………………………………………………………. 3

Walk-Through of a Troubleshooting Session ……………………………………………………………… 6

Walk-Through of a Typical Security Scenario (aka Network Forensics) ………………………… 8

Troubleshooting Tasks for the Network Analyst …………………………………………………….. 9

Security Tasks for the Network Analyst ………………………………………………………………. 10

Optimization Tasks for the Network Analyst ……………………………………………………….. 10

Application Analysis Tasks for the Network Analyst …………………………………………….. 10

Understand Security Issues Related to Network Analysis …………………………………………… 11

Define Policies Regarding Network Analysis ……………………………………………………….. 11

Files Containing Network Traffic Should be Secured ……………………………………………. 11

Protect Your Network against Unwanted “Sniffers” ……………………………………………… 11

Be Aware of Legal Issues of Listening to Network Traffic …………………………………….. 12

Overcome the “Needle in the Haystack Issue” ………………………………………………………….. 13

Review a Checklist of Analysis Tasks……………………………………………………………………… 14

Understand Network Traffic Flows …………………………………………………………………………. 15

Switching Overview………………………………………………………………………………………….. 15

Routing Overview …………………………………………………………………………………………….. 16

Proxy, Firewall and NAT/PAT Overview ……………………………………………………………. 17

Other Technologies that Affect Packets ……………………………………………………………….. 18

Warnings about “Smarter” Infrastructure Devices …………………………………………………. 19

Launch an Analysis Session …………………………………………………………………………………… 19

iv Contents

Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com

Case Study: Pruning the “Puke” …………………………………………………………………………….. 21

Case Study: The “Securely Invisible” Network ………………………………………………………… 22

Summary …………………………………………………………………………………………………………….. 23

Practice What You’ve Learned ………………………………………………………………………………. 23

Review Questions ………………………………………………………………………………………………… 26

Answers to Review Questions ……………………………………………………………………………….. 27

Chapter 2: Introduction to Wireshark …………………………………………………………….. 29

Wireshark Creation and Maintenance ……………………………………………………………………… 30

Obtain the Latest Version of Wireshar

Contents v

Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com

Use the Main Toolbar for Efficiency ……………………………………………………………………….. 77

Toolbar Icon Definitions ……………………………………………………………………………………. 77

Focus Faster with the Filter Toolbar ………………………………………………………………………… 80

Make the Wireless Toolbar Visible …………………………………………………………………………. 82

Work Faster Using Right-Click Functionality …………………………………………………………… 83

Right Click | Edit or Add Packet Comment… ………………………………………………………. 84

Right Click | Copy ……………………………………………………………………………………………. 85

Right Click | Apply As Column ………………………………………………………………………….. 86

Right Click | Wiki Protocol Page (Packet Details Pane) …………………………………………. 88

Right Click | Filter Field Reference (Packet Details Pane) ……………………………………… 88

Right Click | Resolve Name (Packet Details Pane) ………………………………………………… 88

Right Click | Protocol Preferences ………………………………………………………………………. 89

Sign Up for the Wireshark Mailing Lists …………………………………………………………………. 90

Join ask.wireshark.org! ………………………………………………………………………………………….. 90

Know Your Key Resources ……………………………………………………………………………………. 91

Get Some Trace Files ……………………………………………………………………………………………. 92

Case Study: Detecting Database Death ……………………………………………………………………. 93

Summary …………………………………………………………………………………………………………….. 95

Practice What You’ve Learned ……………………………………………………………………………….. 95

Review Questions ……………………………………………………………………………………………….. 100

Answers to Review Questions ………………………………………………………………………………. 101

Chapter 3: Capture Traffic …………………………………………………………………………. 103

Know Where to Tap Into the Network …………………………………………………………………… 104

Run Wireshark Locally ………………………………………………………………………………………… 105

Portable Wireshark …………………………………………………………………………………………. 105

Wireshark U3 …………………………………………………………………………………………………. 106

Capture Traffic on Switched Networks ………………………………………………………………….. 107

Use a Simple Hub on Half-Duplex Networks ……………………………………………………… 107

Use a Test Access Port (TAP) on Full-Duplex Networks ……………………………………… 108

Using Analyzer Agents for Remote Capture ………………………………………………………. 112

Set up Port Spanning/Port Mirroring on a Switch ………………………………………………… 113

Example of Span Commands ……………………………………………………………………………. 114

Spanning VLANs ……………………………………………………………………………………………. 115

Analyze Routed Networks ……………………………………………………………………………………. 116

Analyze Wireless Networks …………………………………………………………………………………. 117

Monitor Mode ………………………………………………………………………………………………… 117

Native Adapter Capture Issues ………………………………………………………………………….. 118

Capture at Two Locations (Dual Captures) …………………………………………………………….. 119

Select the Right Capture Interface …………………………………………………………………………. 119

Capture on Multiple Adapters Simultaneously ………………………………………………………… 120

Interface Details (Windows Only) …………………………………………………………………………. 120

Capture Traffic Remotely …………………………………………………………………………………….. 121

Configuration Parameters for Remote Capture with rpcapd.exe ……………………………. 122

Remote Capture: Active and Passive Mode Configurations ………………………………….. 123

Save and Use Remote Capture Configurations ……………………………………………………. 123

 

vi Contents

Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com

Automatically Save Packets to One or More Files ………………………………………………….. 124

Create File Sets for Faster Access …………………………………………………………………….. 124

Use a Ring Buffer to Limit the Number of Files Saved ……………………………………….. 125

Define an Automatic Stop Criteria ……………………………………………………………………. 125

Optimize Wireshark to Avoid Dropping Packets …………………………………………………….. 125

Consider a Dedicated Analyzer Laptop ……………………………………………………………… 125

Capture Options for Optimization …………………………………………………………………….. 126

Display Options for Optimization …………………………………………………………………….. 126

Conserve Memory with Command-Line Capture ……………………………………………………. 126

Case Study: Dual Capture Points the Finger …………………………………………………………… 128

Case Study: Capturing Traffic at Home …………………………………………………………………. 130

Summary …………………………………………………………………………………………………………… 131

Practice What You’ve Learned …………………………………………………………………………….. 131

Review Questions ………………………………………………………………………………………………. 133

Answers to Review Questions ……………………………………………………………………………… 134

Chapter 4: Create and Apply Capture Filters …………………………………………………. 135

The Purpose of Capture Filters …………………………………………………………………………….. 136

Apply a Capture Filter to an Interface …………………………………………………………………… 137

Build Your Own Set of Capture Filters………………………………………………………………….. 139

Identifiers ……………………………………………………………………………………………………… 139

Qualifiers ………………………………………………………………………………………………………. 139

Filter by a Protocol …………………………………………………………………………………………….. 141

Filter Incoming Connection Attempts ……………………………………………………………………. 141

Create MAC/IP Address or Host Name Capture Filters …………………………………………… 141

Use a “My MAC” Capture Filter for Application Analysis ………………………………….. 143

Filter Your Traffic Out of a Trace File (Exclusion Filter) …………………………………….. 144

Capture One Application’s Traffic Only ………………………………………………………………… 145

Use Operators to Combine Capture Filters …………………………………………………………….. 145

Create Capture Filters to Look for Byte Values ………………………………………………………. 146

Manually Edit the Capture Filters File …………………………………………………………………… 147

Sample cfilters File …………………………………………………………………………………………. 148

Share Capture Filters with Others …………………………………………………………………………. 148

Case Study: Kerberos UDP to TCP Issue ………………………………………………………………. 149

Summary …………………………………………………………………………………………………………… 151

Practice What You’ve Learned …………………………………………………………………………….. 151

Review Questions ………………………………………………………………………………………………. 152

Answers to Review Questions ……………………………………………………………………………… 153

Chapter 5: Define Global and Personal Preferences ……………………………………….. 155

Find Your Configuration Folders ………………………………………………………………………….. 156

Set Global and Personal Configurations ………………………………………………………………… 156

Customize Your User Interface Settings ………………………………………………………………… 159

“File Open” Dialog Behavior …………………………………………………………………………… 159

Maximum List Entries …………………………………………………………………………………….. 159

Pane Configurations ……………………………………………………………………………………….. 160

Columns ……………………………………………………………………………………………………….. 161

 

Contents vii

Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com

Define Your Capture Preferences ………………………………………………………………………….. 162

Select a Default Interface for Faster Capture Launch …………………………………………… 163

Enable Promiscuous Mode to Analyze Other Hosts’ Traffic …………………………………. 163

The Future Trace File Format is Here: pcap-ng …………………………………………………… 163

See the Traffic in Real Time …………………………………………………………………………….. 164

Automatically Scroll During Capture ………………………………………………………………… 164

Automatically Resolve IP and MAC Names …………………………………………………………… 165

Resolve Hardware Addresses (MAC Name Resolution) ………………………………………. 165

Resolve IP Addresses (Network Name Resolution) …………………………………………….. 167

Plot IP Addresses on a World Map with GeoIP ………………………………………………………. 168

Resolve Port Numbers (Transport Name Resolution) ………………………………………………. 168

Resolve SNMP Information …………………………………………………………………………………. 169

Configure Filter Expressions ………………………………………………………………………………… 170

Configure Statistics Settings …………………………………………………………………………………. 171

Define ARP, TCP, HTTP/HTTPS and Other Protocol Settings …………………………………. 172

Detect Duplicate IP Addresses and ARP Storms …………………………………………………. 172

Define How Wireshark Handles TCP Traffic ……………………………………………………… 173

Set Additional Ports for HTTP and HTTPS Dissection ………………………………………… 174

Enhance VoIP Analysis with RTP Settings ………………………………………………………… 174

Configure Wireshark to Decrypt SSL Traffic ……………………………………………………… 174

Configure Protocol Settings with Right-Click …………………………………………………………. 175

Case Study: Non-Standard Web Server Setup …………………………………………………………. 176

Summary …………………………………………………………………………………………………………… 177

Practice What You’ve Learned ……………………………………………………………………………… 177

Review Questions ……………………………………………………………………………………………….. 179

Answers to Review Questions ………………………………………………………………………………. 180

Chapter 6: Colorize Traffic …………………………………………………………………………. 181

Use Colors to Differentiate Traffic Types ………………………………………………………………. 182

Disable One or More Coloring Rules …………………………………………………………………….. 183

Share and Manage Coloring Rules ………………………………………………………………………… 184

Identify Why a Packet is a Certain Color ……………………………………………………………….. 184

Create a “Butt Ugly” Coloring Rule for HTTP Errors ……………………………………………… 185

Color Conversations to Distinguish Them ……………………………………………………………… 187

Temporarily Mark Packets of Interest ……………………………………………………………………. 188

Alter Stream Reassembly Coloring ……………………………………………………………………….. 189

Case Study: Colorizing SharePoint Connections During Login …………………………………. 191

Summary …………………………………………………………………………………………………………… 192

Practice What You’ve Learned ……………………………………………………………………………… 192

Review Questions ……………………………………………………………………………………………….. 197

Answers to Review Questions ………………………………………………………………………………. 198

Chapter 7: Define Time Values and Interpret Summaries …………………………………. 199

Use Time to Identify Network Problems ………………………………………………………………… 200

Understand How Wireshark Measures Packet Time …………………………………………….. 200

Choose the Ideal Time Display Format ……………………………………………………………… 201

Deal with Timestamp Accuracy and Resolution Issues ………………………………………… 203

 

viii Contents

Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com

Send Trace Files Across Time Zones ……………………………………………………………………. 204

Identify Delays with Time Values ………………………………………………………………………… 205

Create Additional Time Columns ……………………………………………………………………… 206

Measure Packet Arrival Times with a Time Reference ………………………………………… 206

Identify Client, Server and Path Delays …………………………………………………………………. 208

Calculate End-to-End Path Delays ……………………………………………………………………. 209

Locate Slow Server Responses …………………………………………………………………………. 209

Spot Overloaded Clients ………………………………………………………………………………….. 209

View a Summary of Traffic Rates, Packet Sizes and Overall Bytes Transferred …………. 210

Compare Up to Three Traffic Types in a Single Summary Window ……………………… 211

Compare Summary Information for Two or More Trace Files ……………………………… 212

Case Study: Time Column Spots Delayed ACKs ……………………………………………………. 214

Summary …………………………………………………………………………………………………………… 216

Practice What You’ve Learned …………………………………………………………………………….. 216

Review Questions ………………………………………………………………………………………………. 218

Answers to Review Questions ……………………………………………………………………………… 219

Chapter 8: Interpret Basic Trace File Statistics ………………………………………………. 221

Launch Wireshark Statistics ………………………………………………………………………………… 222

Identify Network Protocols and Applications …………………………………………………………. 222

Protocol Settings Can Affect Your Results …………………………………………………………….. 224

Identify the Most Active Conversations ………………………………………………………………… 226

List Endpoints and Map Them on the Earth …………………………………………………………… 227

Spot Suspicious Targets with GeoIP ……………………………………………………………………… 228

List Conversations or Endpoints for Specific Traffic Types ……………………………………… 228

Evaluate Packet Lengths ……………………………………………………………………………………… 229

List All IPv4/IPv6 Addresses in the Traffic ……………………………………………………………. 231

List All Destinations in the Traffic ……………………………………………………………………….. 231

List UDP and TCP Usage ……………………………………………………………………………………. 232

Analyze UDP Multicast Streams ………………………………………………………………………….. 232

Graph the Flow of Traffic ……………………………………………………………………………………. 234

Gather Your HTTP Statistics ……………………………………………………………………………….. 236

Examine All WLAN Statistics ……………………………………………………………………………… 237

Case Study: Application Analysis: Aptimize Website Accelerator™ ………………………… 238

Case Study: Finding VoIP Quality Issues ………………………………………………………………. 243

Summary …………………………………………………………………………………………………………… 245

Practice What You’ve Learned …………………………………………………………………………….. 245

Review Questions ………………………………………………………………………………………………. 247

Answers to Review Questions ……………………………………………………………………………… 248

Chapter 9: Create and Apply Display Filters ………………………………………………….. 249

Understand the Purpose of Display Filters ……………………………………………………………… 250

Create Display Filters Using Auto-Complete …………………………………………………………. 253

Apply Saved Display Filters ………………………………………………………………………………… 254

Use Expressions for Filter Assistance ……………………………………………………………………. 255

 

Contents ix

Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com

Make Display Filters Quickly Using Right-Click Filtering ……………………………………….. 256

Apply as Filter ……………………………………………………………………………………………….. 257

Prepare a Filter ……………………………………………………………………………………………….. 257

Copy | As Filter ………………………………………………………………………………………………. 257

Filter on Conversations and Endpoints …………………………………………………………………… 258

Filter on the Protocol Hierarchy Window ………………………………………………………………. 258

Understand Display Filter Syntax ………………………………………………………………………….. 259

Combine Display Filters with Comparison Operators ………………………………………………. 260

Alter Display Filter Meaning with Parentheses ……………………………………………………….. 261

Filter on the Existence of a Field …………………………………………………………………………… 261

Filter on Specific Bytes in a Packet ……………………………………………………………………….. 262

Find Key Words in Upper or Lower Case ………………………………………………………………. 263

More Interesting Regex Filters ……………………………………………………………………………… 263

Let Wireshark Catch Display Filter Mistakes …………………………………………………………. 264

Use Display Filter Macros for Complex Filtering ……………………………………………………. 264

Avoid Common Display Filter Mistakes ………………………………………………………………… 266

Manually Edit the dfilters File ………………………………………………………………………………. 267

Case Study: Using Filters and Graphs to Solve Database Issues ………………………………… 269

Case Study: The Chatty Browser …………………………………………………………………………… 270

Case Study: Catching Viruses and Worms ……………………………………………………………… 271

Summary …………………………………………………………………………………………………………… 272

Practice What You’ve Learned ……………………………………………………………………………… 272

Review Questions ……………………………………………………………………………………………….. 274

Answers to Review Questions ………………………………………………………………………………. 275

Chapter 10: Follow Streams and Reassemble Data ………………………………………… 277

The Basics of Traffic Reassembly …………………………………………………………………………. 278

Follow and Reassemble UDP Conversations ………………………………………………………….. 278

Follow and Reassemble TCP Conversations …………………………………………………………… 280

Identify Common File Types ……………………………………………………………………………. 283

Reassemble an FTP File Transfer ……………………………………………………………………… 283

Follow and Reassemble SSL Conversations …………………………………………………………… 285

Reassemble an SMB Transfer ………………………………………………………………………………. 287

Case Study: Unknown Hosts Identified ………………………………………………………………….. 288

Summary …………………………………………………………………………………………………………… 289

Practice What You’ve Learned ……………………………………………………………………………… 289

Review Questions ……………………………………………………………………………………………….. 291

Answers to Review Questions ………………………………………………………………………………. 292

Chapter 11: Customize Wireshark Profiles ……………………………………………………. 293

Customize Wireshark with Profiles ……………………………………………………………………….. 294

Create a New Profile ……………………………………………………………………………………….. 295

Share Profiles …………………………………………………………………………………………………. 296

Create a Troubleshooting Profile ………………………………………………………………………. 297

Create a Corporate Profile ……………………………………………………………………………….. 298

Create a WLAN Profile …………………………………………………………………………………… 298

Create a VoIP Profile ………………………………………………………………………………………. 299

Create a Security Profile ………………………………………………………………………………….. 300

 

x Contents

Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com

Case Study: Customizing Wireshark for the Customer ……………………………………………. 301

Summary …………………………………………………………………………………………………………… 302

Practice What You’ve Learned …………………………………………………………………………….. 302

Review Questions ………………………………………………………………………………………………. 303

Answers to Review Questions ……………………………………………………………………………… 304

Chapter 12: Annotate, Save, Export and Print Packets ……………………………………. 305

Annotate a Packet or an Entire Trace File ……………………………………………………………… 306

Save Filtered, Marked and Ranges of Packets ………………………………………………………… 309

Export Packet Content for Use in Other Programs ………………………………………………….. 311

Export SSL Keys ……………………………………………………………………………………………….. 313

Save Conversations, Endpoints, IO Graphs and Flow Graph Information ………………….. 314

Export Packet Bytes ……………………………………………………………………………………………. 314

Case Study: Saving Subsets of Traffic to Isolate Problems ………………………………………. 315

Summary …………………………………………………………………………………………………………… 317

Practice What You’ve Learned …………………………………………………………………………….. 317

Review Questions ………………………………………………………………………………………………. 319

Answers to Review Questions ……………………………………………………………………………… 320

Chapter 13: Use Wireshark’s Expert System ………………………………………………….. 321

Let Wireshark’s Expert Information Guide You ……………………………………………………… 322

Launch Expert Info Quickly …………………………………………………………………………….. 322

Colorize Expert Info Elements …………………………………………………………………………. 325

Filter on TCP Expert Information Elements ……………………………………………………….. 326

Understand TCP Expert Information …………………………………………………………………….. 327

What Triggers TCP Retransmissions? ……………………………………………………………….. 327

What Triggers Previous Segment Lost? …………………………………………………………….. 328

What Triggers ACKed Lost Packet? …………………………………………………………………. 328

What Triggers Keep Alive? ……………………………………………………………………………… 328

What Triggers Duplicate ACK? ……………………………………………………………………….. 328

What Triggers Zero Window? ………………………………………………………………………….. 329

What Triggers Zero Window Probe? ………………………………………………………………… 329

What Triggers Zero Window Probe ACK? ………………………………………………………… 329

What Triggers Keep Alive ACK? …………………………………………………………………….. 329

What Triggers Out-of-Order? …………………………………………………………………………… 330

What Triggers Fast Retransmission? …………………………………………………………………. 330

What Triggers Window Update? ………………………………………………………………………. 330

What Triggers Window is Full? ……………………………………………………………………….. 331

What Triggers TCP Ports Reused? ……………………………………………………………………. 331

What Triggers 4 NOP in a Row? ………………………………………………………………………. 331

Case Study: Expert Info Catches Remote Access Headaches ……………………………………. 333

Summary …………………………………………………………………………………………………………… 337

Practice What You’ve Learned …………………………………………………………………………….. 337

Review Questions ………………………………………………………………………………………………. 338

Answers to Review Questions ……………………………………………………………………………… 339

Contents xi

Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com

Chapter 14: TCP/IP Analysis Overview …………………………………………………………. 341

TCP/IP Functionality Overview ……………………………………………………………………………. 342

When Everything Goes Right …………………………………………………………………………… 343

Follow the Multi-Step Resolution Process ………………………………………………………….. 343

Step 1: Port Number Resolution ……………………………………………………………………….. 345

Step 2: Network Name Resolution (Optional) …………………………………………………….. 345

Step 3: Route Resolution—When the Target is Local ………………………………………….. 346

Step 4: Local MAC Address Resolution …………………………………………………………….. 346

Step 5: Route Resolution—When the Target is Remote ……………………………………….. 346

Step 6: Local MAC Address Resolution for a Gateway ……………………………………….. 347

Build the Packet ………………………………………………………………………………………………….. 347

Case Study: Absolving the Network from Blame ……………………………………………………. 350

Summary …………………………………………………………………………………………………………… 351

Practice What You’ve Learned …………………………………….

xii Contents

Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com

Dissect the ARP Packet Structure …………………………………………………………………………. 382

Hardware Type ………………………………………………………………………………………………. 382

Protocol Type ………………………………………………………………………………………………… 382

Length of Hardware Address …………………………………………………………………………… 382

Length of Protocol Address ……………………………………………………………………………… 382

Opcode …………………………………………………………………………………………………………. 382

Sender’s Hardware Address …………………………………………………………………………….. 383

Sender’s Protocol Address ………………………………………………………………………………. 383

Target Hardware Address ………………………………………………………………………………… 383

Target Protocol Address ………………………………………………………………………………….. 383

Filter on ARP Traffic ………………………………………………………………………………………….. 383

Case Study: Death by ARP ………………………………………………………………………………….. 384

Case Study: The Tale of the Missing ARP …………………………………………………………….. 385

Summary …………………………………………………………………………………………………………… 387

Practice What You’ve Learned …………………………………………………………………………….. 387

Review Questions ………………………………………………………………………………………………. 388

Answers to Review Questions ……………………………………………………………………………… 389

Chapter 17: Analyze Internet Protocol (IPv4/IPv6) Traffic ………………………………… 391

Identify the Purpose of IP ……………………………………………………………………………………. 392

Analyze Normal IPv4 Traffic ………………………………………………………………………………. 393

Analyze IPv4 Problems ……………………………………………………………………………………….. 394

Dissect the IPv4 Packet Structure …………………………………………………………………………. 395

Version Field …………………………………………………………………………………………………. 395

Header Length Field ……………………………………………………………………………………….. 396

Differentiated Services Field and Explicit Congestion Notification ………………………. 396

Total Length Field ………………………………………………………………………………………….. 397

Identification Field …………………………………………………………………………………………. 397

Flags Field …………………………………………………………………………………………………….. 397

Fragment Offset Field …………………………………………………………………………………….. 398

Time to Live Field ………………………………………………………………………………………….. 399

Protocol Field ………………………………………………………………………………………………… 400

Header Checksum Field ………………………………………………………………………………….. 400

IPv4 Source Address Field ………………………………………………………………………………. 400

IPv4 Destination Address Field ………………………………………………………………………… 400

Options Field …………………………………………………………………………………………………. 401

IPv4 Broadcast/Multicast Traffic ……………………………………………………………………… 401

An Introduction to IPv6 Traffic ……………………………………………………………………………. 402

Dissect the IPv6 Packet Structure …………………………………………………………………………. 403

Version Field …………………………………………………………………………………………………. 403

Traffic Class Fields (DiffServ, ECT and ECN-CE) …………………………………………….. 403

Flow Label Field ……………………………………………………………………………………………. 403

Payload Length Field ……………………………………………………………………………………… 403

Next Header Field ………………………………………………………………………………………….. 404

Hop Limit Field ……………………………………………………………………………………………… 404

Source IPv6 Address Field ………………………………………………………………………………. 404

Destination IPv6 Address Field ………………………………………………………………………… 404

 

Contents xiii

Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com

Basic IPv6 Addressing ………………………………………………………………………………………… 405

Auto Configuration Mode (no DHCP Server) (M=0 and O=0) ……………………………… 408

DHCPv6 Stateful Mode (M=1) …………………………………………………………………………. 408

DHCPv6 Stateless Mode (M=0 and O=1) ………………………………………………………….. 408

6to4 Tunneling (IPv6 Tunneled Inside IPv4) ………………………………………………………. 409

Teredo …………………………………………………………………………………………………………… 410

Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) ……………………………….. 411

Sanitize Your IP Addresses in Trace Files ……………………………………………………………… 411

Set Your IPv4 Protocol Preferences ………………………………………………………………………. 413

Reassemble Fragmented IP Datagrams ………………………………………………………………. 413

Enable GeoIP Lookups ……………………………………………………………………………………. 413

Interpret the Reserved Flag as a Security Flag (RFC 3514) <g> ……………………………. 413

Troubleshoot Encrypted Communications ……………………………………………………………… 413

Filter on IPv4 Traffic …………………………………………………………………………………………… 415

Filter on IPv6 Traffic …………………………………………………………………………………………… 415

Case Study: Everyone Blamed the Router ………………………………………………………………. 416

Case Study: It’s Not the Network’s Problem! …………………………………………………………. 417

Case Study: IPv6 Addressing Mayhem ………………………………………………………………….. 418

Summary …………………………………………………………………………………………………………… 420

Practice What You’ve Learned ……………………………………………………………………………… 420

Review Questions ……………………………………………………………………………………………….. 422

Answers to Review Questions ………………………………………………………………………………. 423

Chapter 18: Analyze Internet Control Message Protocol (ICMPv4/ICMPV6)

Traffic ……………………………………………………………………………………………………. 425

The Purpose of ICMP ………………………………………………………………………………………….. 426

Analyze Normal ICMP Traffic ……………………………………………………………………………… 427

Analyze ICMP Problems ……………………………………………………………………………………… 429

Dissect the ICMP Packet Structure ……………………………………………………………………….. 430

Type ……………………………………………………………………………………………………………… 430

Code ……………………………………………………………………………………………………………… 431

Checksum ……………………………………………………………………………………………………… 433

Basic ICMPv6 Functionality ………………………………………………………………………………… 434

Filter on ICMP and ICMPv6 Traffic ……………………………………………………………………… 438

Case Study: The Dead-End Router ………………………………………………………………………… 439

Summary …………………………………………………………………………………………………………… 440

Practice What You’ve Learned ……………………………………………………………………………… 440

Review Questions ……………………………………………………………………………………………….. 441

Answers to Review Questions ………………………………………………………………………………. 442

Chapter 19: Analyze User Datagram Protocol (UDP) Traffic ………………………………. 445

The Purpose of UDP ……………………………………………………………………………………………. 446

Analyze Normal UDP Traffic……………………………………………………………………………….. 447

Analyze UDP Problems ……………………………………………………………………………………….. 448

 

xiv Contents

Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com

Dissect the UDP Packet Structure …………………………………………………………………………. 450

Source Port Field ……………………………………………………………………………………………. 450

Destination Port Field ……………………………………………………………………………………… 450

Length Field ………………………………………………………………………………………………….. 451

Checksum Field ……………………………………………………………………………………………… 451

Filter on UDP Traffic ………………………………………………………………………………………….. 451

Case Study: Troubleshooting Time Synchronization ……………………………………………….. 452

Summary …………………………………………………………………………………………………………… 453

Practice What You’ve Learned …………………………………………………………………………….. 453

Review Questions ………………………………………………………………………………………………. 454

Answers to Review Questions ……………………………………………………………………………… 455

Chapter 20: Analyze Transmission Control Protocol (TCP) Traffic ………………………. 457

The Purpose of TCP ……………………………………………………………………………………………. 458

Analyze Normal TCP Communications…………………………………………………………………. 459

The Establishment of TCP Connections …………………………………………………………….. 459

When TCP-based Services are Refused …………………………………………………………….. 460

The Termination of TCP Connections ………………………………………………………………. 461

How TCP Tracks Packets Sequentially ……………………………………………………………… 463

How TCP Recovers from Packet Loss ………………………………………………………………. 465

Improve Packet Loss Recovery with Selective Acknowledgments ………………………… 467

Understand TCP Flow Control …………………………………………………………………………. 470

Understand Nagling and Delayed ACKs ……………………………………………………………. 471

Analyze TCP Problems ……………………………………………………………………………………….. 473

Dissect the TCP Packet Structure …………………………………………………………………………. 477

Source Port Field ……………………………………………………………………………………………. 477

Destination Port Field ……………………………………………………………………………………… 477

Stream Index [Wireshark Field] ……………………………………………………………………….. 477

Sequence Number Field ………………………………………………………………………………….. 477

Next Expected Sequence Number [Wireshark Field] …………………………………………… 477

Acknowledgment Number Field ………………………………………………………………………. 477

Data Offset Field ……………………………………………………………………………………………. 477

Flags Field …………………………………………………………………………………………………….. 478

Window Field ………………………………………………………………………………………………… 479

Checksum Field ……………………………………………………………………………………………… 479

Urgent Pointer Field ……………………………………………………………………………………….. 479

TCP Options Area (Optional) …………………………………………………………………………… 480

Filter on TCP Traffic ………………………………………………………………………………………….. 482

Set TCP Protocol Preferences ………………………………………………………………………………. 483

Validate the TCP Checksum if Possible …………………………………………………………….. 483

Allow Subdissector to Reassemble TCP Streams ……………………………………………….. 483

Analyze TCP Sequence Numbers …………………………………………………………………….. 485

Relative Sequence Numbers …………………………………………………………………………….. 486

Window Scaling is Calculated Automatically …………………………………………………….. 486

Track Number of Bytes in Flight ………………………………………………………………………. 487

Try Heuristic Sub-Dissectors First ……………………………………………………………………. 487

Ignore TCP Timestamps in Summary ……………………………………………………………….. 487

Calculate Conversation Timestamps …………………………………………………………………. 488

 

Contents xv

Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com

Case Study: Connections Require Four Attempts ……………………………………………………. 489

Summary …………………………………………………………………………………………………………… 490

Practice What You’ve Learned ……………………………………………………………………………… 490

Review Questions ……………………………………………………………………………………………….. 492

Answers to Review Questions ………………………………………………………………………………. 493

Chapter 21: Graph IO Rates and TCP Trends …………………………………………………. 495

Use Graphs to View Trends………………………………………………………………………………….. 496

Generate Basic IO Graphs ……………………………………………………………………………………. 497

Filter IO Graphs ………………………………………………………………………………………………….. 498

Coloring ………………………………………………………………………………………………………… 499

Styles and Layers ……………………………………………………………………………………………. 499

X and Y Axis …………………………………………………………………………………………………. 500

Smoothing ……………………………………………………………………………………………………… 500

Print Your IO Graph ……………………………………………………………………………………….. 501

Generate Advanced IO Graphs ……………………………………………………………………………… 501

SUM(*) Calc ………………………………………………………………………………………………….. 501

MIN(*), AVG(*) and MAX(*) Calc Values ……………………………………………………….. 503

COUNT(*) Calc ……………………………………………………………………………………………… 504

LOAD(*) Calc ……………………………………………………………………………………………….. 505

Compare Traffic Trends in IO Graphs……………………………………………………………………. 506

Graph Round Trip Time ………………………………………………………………………………………. 508

Graph Throughput Rates ……………………………………………………………………………………… 510

Graph TCP Sequence Numbers over Time …………………………………………………………….. 511

Interpret TCP Window Size Issues ……………………………………………………………………. 511

Interpret Packet Loss, Duplicate ACKs and Retransmissions ……………………………….. 514

Case Study: Watching Performance Levels Drop ……………………………………………………. 515

Case Study: Graphing RTT to the Corporate Office ………………………………………………… 516

Case Study: Testing QoS Policies …………………………………………………………………………. 519

Summary …………………………………………………………………………………………………………… 520

Practice What You’ve Learned ……………………………………………………………………………… 520

Review Questions ……………………………………………………………………………………………….. 522

Answers to Review Questions ………………………………………………………………………………. 523

Chapter 22: Analyze Dynamic Host Configuration Protocol (DHCPv4/DHCPv6)

Traffic ……………………………………………………………………………………………………. 525

The Purpose of DHCP …………………………………………………………………………………………. 526

Analyze Normal DHCP Traffic …………………………………………………………………………….. 526

Analyze DHCP Problems …………………………………………………………………………………….. 530

Dissect the DHCP Packet Structure ……………………………………………………………………….. 532

Message Type ………………………………………………………………………………………………… 532

Hardware Type ………………………………………………………………………………………………. 532

Hardware Length ……………………………………………………………………………………………. 532

Hops ……………………………………………………………………………………………………………… 532

Transaction ID ……………………………………………………………………………………………….. 532

Seconds Elapsed …………………………………………………………………………………………….. 532

BOOTP Flags …………………………………………………………………………………………………. 532

Client IP Address ……………………………………………………………………………………………. 532

Your (Client) IP Address …………………………………………………………………………………. 532

xvi Contents

Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com

Next Server IP Address …………………………………………………………………………………… 532

Relay Agent IP Address ………………………………………………………………………………….. 533

Client MAC Address ………………………………………………………………………………………. 533

Server Host Name ………………………………………………………………………………………….. 533

Boot File Name ……………………………………………………………………………………………… 533

Magic Cookie ………………………………………………………………………………………………… 533

Option …………………………………………………………………………………………………………… 533

An Introduction to DHCPv6 ………………………………………………………………………………… 534

Display BOOTP-DHCP Statistics …………………………………………………………………………. 536

Filter on DHCP/DHCPv6 Traffic …………………………………………………………………………. 537

Case Study: Declining Clients ……………………………………………………………………………… 538

Summary …………………………………………………………………………………………………………… 540

Practice What You’ve Learned …………………………………………………………………………….. 540

Review Questions ………………………………………………………………………………………………. 542

Answers to Review Questions ……………………………………………………………………………… 543

Chapter 23: Analyze Hypertext Transfer Protocol (HTTP) Traffic …………………………. 545

The Purpose of HTTP …………………………………………………………………………………………. 546

Analyze Normal HTTP Communications ………………………………………………………………. 547

Analyze HTTP Problems …………………………………………………………………………………….. 551

Dissect HTTP Packet Structures …………………………………………………………………………… 554

HTTP Methods ………………………………………………………………………………………………. 555

Host ……………………………………………………………………………………………………………… 555

Request Modifiers ………………………………………………………………………………………….. 555

Filter on HTTP or HTTPS Traffic ………………………………………………………………………… 556

Export HTTP Objects …………………………………………………………………………………………. 558

Display HTTP Statistics ………………………………………………………………………………………. 558

HTTP Load Distribution …………………………………………………………………………………. 558

HTTP Packet Counter …………………………………………………………………………………….. 559

HTTP Requests ……………………………………………………………………………………………… 559

Graph HTTP Traffic Flows ………………………………………………………………………………….. 561

Choose Packets ………………………………………………………………………………………………. 561

Choose Flow Type …………………………………………………………………………………………. 561

Choose Node Address Type …………………………………………………………………………….. 561

Set HTTP Preferences …………………………………………………………………………………………. 563

Analyze HTTPS Communications ………………………………………………………………………… 564

Analyze SSL/TLS Handshake ………………………………………………………………………….. 565

Analyze TLS Encrypted Alerts ………………………………………………………………………… 569

Decrypt HTTPS Traffic …………………………………………………………………………………… 570

Export SSL Keys ……………………………………………………………………………………………. 574

Case Study: HTTP Proxy Problems ………………………………………………………………………. 575

Summary …………………………………………………………………………………………………………… 576

Practice What You’ve Learned …………………………………………………………………………….. 576

Review Questions ………………………………………………………………………………………………. 578

Answers to Review Questions ……………………………………………………………………………… 579

Contents xvii

Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com

Chapter 24: Analyze File Transfer Protocol (FTP) Traffic …………………………………… 581

The Purpose of FTP …………………………………………………………………………………………….. 582

Analyze Normal FTP Communications………………………………………………………………….. 583

Analyze Passive Mode Connections ………………………………………………………………….. 586

Analyze Active Mode Connections …………………………………………………………………… 588

Analyze FTP Problems ………………………………………………………………………………………… 589

Dissect the FTP Packet Structure ………………………………………………………………………….. 591

Filter on FTP Traffic …………………………………………………………………………………………… 594

Reassemble FTP Traffic ………………………………………………………………………………………. 595

Case Study: Secret FTP Communications ………………………………………………………………. 596

Summary …………………………………………………………………………………………………………… 598

Practice What You’ve Learned ……………………………………………………………………………… 598

Review Questions ……………………………………………………………………………………………….. 600

Answers to Review Questions ………………………………………………………………………………. 601

Chapter 25: Analyze Email Traffic ……………………………………………………………….. 603

The Purpose of POP ……………………………………………………………………………………………. 604

Analyze Normal POP Communications …………………………………………………………………. 605

Analyze POP Problems ……………………………………………………………………………………….. 606

Dissect the POP Packet Structure ………………………………………………………………………….. 608

Filter on POP Traffic …………………………………………………………………………………………… 610

The Purpose of SMTP …………………………………………………………………………………………. 611

Analyze Normal SMTP Communications ………………………………………………………………. 612

Analyze SMTP Problems …………………………………………………………………………………….. 613

Dissect the SMTP Packet Structure ……………………………………………………………………….. 614

Filter on SMTP Traffic ………………………………………………………………………………………… 616

Case Study: SMTP Problem—Scan2Email Job ………………………………………………………. 617

Summary …………………………………………………………………………………………………………… 618

Practice What You’ve Learned ……………………………………………………………………………… 618

Review Questions ……………………………………………………………………………………………….. 619

Answers to Review Questions ………………………………………………………………………………. 620

Chapter 26: Introduction to 802.11 (WLAN) Analysis ……………………………………… 621

Analyze WLAN Traffic ……………………………………………………………………………………….. 622

Analyze Signal Strength and Interference ………………………………………………………………. 623

Capture WLAN Traffic ……………………………………………………………………………………….. 626

Compare Monitor Mode vs. Promiscuous Mode …………………………………………………. 626

Select the Wireless Interface …………………………………………………………………………….. 627

Set Up WLAN Decryption ……………………………………………………………………………….. 628

Select to Prepend Radiotap or PPI Headers ………………………………………………………… 631

Compare Signal Strength and Signal-to-Noise Ratios ………………………………………….. 635

Understand 802.11 Traffic Basics …………………………………………………………………………. 636

Data Frames …………………………………………………………………………………………………… 636

Management Frames ……………………………………………………………………………………….. 636

Control Frames ………………………………………………………………………………………………. 638

Analyze Normal 802.11 Communications ……………………………………………………………… 638

Dissect the 802.11 Frame Structure ……………………………………………………………………….. 640

 

xviii Contents

Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com

Filter on All WLAN Traffic …………………………………………………………………………………. 641

Analyze Frame Control Types and Subtypes ………………………………………………………….. 642

Customize Wireshark for WLAN Analysis ……………………………………………………………. 647

Case Study: Cruddy Barcode Communications ………………………………………………………. 648

Case Study: Cooking the WLAN ………………………………………………………………………….. 650

Summary …………………………………………………………………………………………………………… 652

Practice What You’ve Learned …………………………………………………………………………….. 652

Review Questions ………………………………………………………………………………………………. 655

Answers to Review Questions ……………………………………………………………………………… 656

Chapter 27: Introduction to Voice over IP (VoIP) Analysis ………………………………… 659

Understand VoIP Traffic Flows ……………………………………………………………………………. 660

Session Bandwidth and RTP Port Definition ………………………………………………………….. 663

Analyze VoIP Problems ………………………………………………………………………………………. 665

Packet Loss ……………………………………………………………………………………………………. 665

Jitter ……………………………………………………………………………………………………………… 666

Examine SIP Traffic …………………………………………………………………………………………… 667

SIP Commands ………………………………………………………………………………………………. 667

SIP Response Codes ……………………………………………………………………………………….. 668

Examine RTP Traffic ………………………………………………………………………………………….. 672

Play Back VoIP Conversations …………………………………………………………………………….. 674

RTP Player Marker Definitions ……………………………………………………………………………. 675

Create a VoIP Profile ………………………………………………………………………………………….. 676

Filter on VoIP Traffic …………………………………………………………………………………………. 676

Case Study: Lost VoIP Tones ………………………………………………………………………………. 677

Summary …………………………………………………………………………………………………………… 679

Practice What You’ve Learned …………………………………………………………………………….. 679

Review Questions ………………………………………………………………………………………………. 680

Answers to Review Questions ……………………………………………………………………………… 681

Chapter 28: Baseline “Normal” Traffic Patterns …………………………………………….. 683

Understand the Importance of Baselining ………………………………………………………………. 684

Baseline Broadcast and Multicast Types and Rates …………………………………………….. 685

Baseline Protocols and Applications …………………………………………………………………. 685

Baseline Boot up Sequences …………………………………………………………………………….. 686

Baseline Login/Logout Sequences ……………………………………………………………………. 687

Baseline Traffic during Idle Times ……………………………………………………………………. 687

Baseline Application Launch Sequences and Key Tasks ……………………………………… 687

Baseline Web Browsing Sessions …………………………………………………………………….. 688

Baseline Name Resolution Sessions ………………………………………………………………….. 688

Baseline Throughput Tests ………………………………………………………………………………. 688

Baseline Wireless Connectivity ………………………………………………………………………… 689

Baseline VoIP Communications……………………………………………………………………….. 689

Case Study: Login Log Jam …………………………………………………………………………………. 690

Case Study: Solving SAN Disconnects …………………………………………………………………. 691

Summary …………………………………………………………………………………………………………… 692

Practice What You’ve Learned …………………………………………………………………………….. 692

Review Questions ………………………………………………………………………………………………. 694

Answers to Review Questions ……………………………………………………………………………… 695

Contents xix

Wireshark Network Analysis—Second Edition à Download book files from www.wiresharkbook.com

Chapter 29: Find the Top Causes of Performance Problems …………………………….. 697

Troubleshoot Performance Problems …………………………………………………………………….. 698

Identify High Latency Times ………………………………………………………………………………… 699

Filter on Arrival Times ……………………………………………………………………………………. 700

Filter on the Delta Times …………………………………………………………………………………. 701

Filter on the Time since Reference or First Packet ………………………………………………. 701

Filter on TCP Conversation Times ……………………………………………………………………. 702

Point to Slow Processing Times ……………………………………………………………………………. 702

Practice Working with Time Issues ……………………………………………………………………….. 703

Find the Location of Packet Loss ………………………………………………………………………….. 706

Watch Signs of Misconfigurations …………………………………..

Course Content

Time: 10 weeks

Curriculum is empty

Instructor

0.0

0 rating

5 stars
0%
4 stars
0%
3 stars
0%
2 stars
0%
1 star
0%
Free

Leave a Reply

Your email address will not be published. Required fields are marked *