官术网_书友最值得收藏!

Using Wireshark filters

If you're not familiar with Wireshark, then you'll soon find out how powerful and effective this tool can be. Wireshark is a packet analyzer software that's open source and free to use. It can be used to troubleshoot networking issues and hunt down malicious activities. Basically, every bit (literally) of information that flows in and out of a network can be captured and dumped into a single location. Then we can take our time analyzing this information, using filters to narrow down our search. As of writing this book, the current version of Wireshark is 2.2.2, but always make sure that yours is up-to-date:

  1. When you launch Wireshark, you should see the following screen. You will need to select the interface you want to scan on, depending on whether you use an Ethernet or a wireless connection. I am connected via Wi-Fi, so that is what I choose. Yours may be named differently, but for now go ahead and select the one with the most traffic, which you can see from the line next to the interface selection. The more traffic there is, the more peaks the line will have:
  1. Once selected, go ahead and click on the blue shark fin button at the top left corner. You should then see something like this:

As you can see, there is a lot of information to decipher, but Wireshark organizes it so that you don't waste time searching. Let's inspect the source IP address of the selected packet. We can see that it has an address of 192.168.0.123; in binary this is 11000000 10101000 00000000 01111011 because an IP address is 32 bits. Use the following chart to help:

-------------------------------------------------------

0 0 0 0 0 0 0 0

-------------------------------------------------------

128 --- 64 --- 32 --- 16 --- 8 --- 4 --- 2 --- 1

-------------------------------------------------------

1 1 0 0 0 0 0 0 = 192

1 0 1 0 1 0 0 0 = 168

0 0 0 0 0 0 0 0 = 0

0 1 1 1 1 0 1 0 = 123

-------------------------------------------------------

The source is address is 192.168.0.123

In the following table the middle column at the bottom displays the hexadecimal of each packet, and the bottom right column shows its ASCII conversions. You can use the following chart to understand HEX conversion:

A = 10 | B = 11 | C = 12 | D = 13 | E = 14 | F = 15

ASCII is essentially clear text data, so when you send messages or data that's not encrypted, you will be able to read what the message contains. One unique feature that I like to mention about Wireshark is that, when you select a portion of the HEX, the correlating ASCII is also highlighted. This is a very handy and useful feature when performing packet dissection paired with filtering options.

主站蜘蛛池模板: 栾城县| 淮南市| 锡林郭勒盟| 梧州市| 湛江市| 大城县| 会同县| 呼和浩特市| 班玛县| 绍兴市| 达州市| 霸州市| 大田县| 凤山县| 奎屯市| 莆田市| 潮安县| 镇安县| 前郭尔| 临汾市| 张北县| 怀仁县| 安国市| 准格尔旗| 玛纳斯县| 搜索| 藁城市| 阿勒泰市| 龙陵县| 湘潭县| 靖江市| 阿克苏市| 长宁县| 蓝山县| 昌图县| 岚皋县| 兖州市| 大安市| 原平市| 朔州市| 陆良县|