wireshark network analysing software
TRANSCRIPT
![Page 1: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/1.jpg)
Wireshark - Network analyzing software(Website Vulnerability scanner)
Present by:
LAXMI INSTITUTION OF TECHNOLOGY
Sr. no. Name Enrollment No.
1 Nakum Dharmesh M. 150863109005
2 Nayakvade Ragini B. 150863109006
3 Parmar Ashish V. 150863109007
4 Patel Bhavin S. 150863109008
5 Yadav Dhananjay I . 140603109063
Sub: Cyber Security 2150002
![Page 2: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/2.jpg)
Content What is Wireshark Where it use How it works Some practical things
![Page 3: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/3.jpg)
What is Wireshark?
- Network packet/protocol analyzer- One of the best open source packet analyzers available today for UNIX and Windows
![Page 4: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/4.jpg)
You could think of a network packet analyzer as a measuring device used to examine what’s going on inside a network cable, just like a voltmeter is used by an electrician to examine what’s going on inside an electric cable (but at a higher level, of course).
Wireshark is perhaps one of the best open source packet analyzers available today.
![Page 5: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/5.jpg)
Where it use?
- Network Administrators use it to troubleshoot network problems- Network security engineers use it to examine security problems- Testers use it to detect defects :)- People use it to learn network protocol internals.
![Page 6: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/6.jpg)
WireShark – Sample Demo
![Page 7: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/7.jpg)
A vulnerability scanner is a computer program designed to assess computers,
computer systems, networks or applications for weaknesses.
They can be run either as part of
vulnerability management by those tasked with protecting systems - or by black hat attackers looking to gain unauthorized access.
Website Vulnerability Scanner:
![Page 8: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/8.jpg)
The following are some of the many features Wireshark provides: •Available for UNIX and Windows.•Capture live packet data from a network interface. •Open files containing packet data captured with tcpdump / WinDump, •Wireshark, and a number of other packet capture programs. •Import packets from text files containing hex dumps of packet data. •Display packets with very detailed protocol information. •Save packet data captured. •Export some or all packets in a number of capture file formats. •Filter packets on many criteria.•Search for packets on many criteria.•Colorize packet display based on filters.•Create various statistics.... and a lot more!.
Features:
![Page 9: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/9.jpg)
How it works?For Windows- download (http://www.wireshark.org/download.html)
- install- use
![Page 10: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/10.jpg)
![Page 11: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/11.jpg)
Open Wireshark. Click the "Capture" menu, then click "Interfaces." A small window with all of your networking interfaces will appear. If you use any network traffic, you will start to see packets coming in.
![Page 12: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/12.jpg)
![Page 13: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/13.jpg)
Wireshark Interface
13
![Page 14: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/14.jpg)
14
Wireshark Interface
![Page 15: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/15.jpg)
Status Bar
15
![Page 16: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/16.jpg)
HTTP Analysis
![Page 17: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/17.jpg)
HTTP Analysis – Load Distribution
Click “Create Stat” buttonYou can add “filter” to onlyShow selected traffic
![Page 18: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/18.jpg)
HTTP Analysis – Packet Counter
![Page 19: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/19.jpg)
HTTP Analysis – Requests
![Page 20: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/20.jpg)
Each line represents a packet, and there are 7 columns that provide information about it is number column shows the order of the packet when you start recording network traffic. This is to provide you with number reference so that you can easily identify particular packet.
The time is in seconds, up to 6 decimals, when the packet was received after you started to record network traffic.
The source includes the Internet Protocol (IP) address of the packet's origin.
The destination IP records where a particular packet is going.
The protocol the packet uses. The most common are TCP, UDP and HTTP.
Examine each packet's information.
![Page 21: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/21.jpg)
![Page 22: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/22.jpg)
Video
![Page 23: Wireshark network analysing software](https://reader036.vdocuments.site/reader036/viewer/2022062316/58ef1df11a28ab76068b45b5/html5/thumbnails/23.jpg)
The End