wireshark
TRANSCRIPT
![Page 1: Wireshark](https://reader031.vdocument.in/reader031/viewer/2022030316/5871e7001a28ab6a7b8b72dd/html5/thumbnails/1.jpg)
Wireshark
![Page 2: Wireshark](https://reader031.vdocument.in/reader031/viewer/2022030316/5871e7001a28ab6a7b8b72dd/html5/thumbnails/2.jpg)
What is Wireshark
• Wireshark is a free and open source packet analyzer.
• A protocol analyzer, such as Wireshark, is used to copy frames off of an active network
• These frames are like the cars on the highway• By capturing and examining these frames we can
see exactly what is happening on the network
![Page 3: Wireshark](https://reader031.vdocument.in/reader031/viewer/2022030316/5871e7001a28ab6a7b8b72dd/html5/thumbnails/3.jpg)
Why Wireshark
• What I liked about it!• Multi-platform: Windows, Linux, OS X, Solaris,
FreeBSD, NetBSD.• It has a user friendly interface (GUI)• Colo-ring• And most importantly its ability to decode
most of the algorithms namely ASCII,HEX
![Page 5: Wireshark](https://reader031.vdocument.in/reader031/viewer/2022030316/5871e7001a28ab6a7b8b72dd/html5/thumbnails/5.jpg)
The Start screen
![Page 6: Wireshark](https://reader031.vdocument.in/reader031/viewer/2022030316/5871e7001a28ab6a7b8b72dd/html5/thumbnails/6.jpg)
Copyright 2007-2010 Kenneth M. Chipps Ph.D. www.chipps.com
Wireshark
The frames that were captured
The layers in the currently selected frame
The contents of the current layer in hex and ASCII
![Page 7: Wireshark](https://reader031.vdocument.in/reader031/viewer/2022030316/5871e7001a28ab6a7b8b72dd/html5/thumbnails/7.jpg)
Copyright 2007-2010 Kenneth M. Chipps Ph.D. www.chipps.com
TCP/IP Model
![Page 8: Wireshark](https://reader031.vdocument.in/reader031/viewer/2022030316/5871e7001a28ab6a7b8b72dd/html5/thumbnails/8.jpg)
Copyright 2007-2010 Kenneth M. Chipps Ph.D. www.chipps.com
The Layers
The frame shown in detail below
All the layers in this frame
The contents of the selected layer
The contents in hex
The contents in ASCII
![Page 9: Wireshark](https://reader031.vdocument.in/reader031/viewer/2022030316/5871e7001a28ab6a7b8b72dd/html5/thumbnails/9.jpg)
Copyright 2007-2010 Kenneth M. Chipps Ph.D. www.chipps.com
The Data Link Layer
![Page 10: Wireshark](https://reader031.vdocument.in/reader031/viewer/2022030316/5871e7001a28ab6a7b8b72dd/html5/thumbnails/10.jpg)
Copyright 2007-2010 Kenneth M. Chipps Ph.D. www.chipps.com
The Network Layer
![Page 11: Wireshark](https://reader031.vdocument.in/reader031/viewer/2022030316/5871e7001a28ab6a7b8b72dd/html5/thumbnails/11.jpg)
Copyright 2007-2010 Kenneth M. Chipps Ph.D. www.chipps.com
The Transport Layer
![Page 12: Wireshark](https://reader031.vdocument.in/reader031/viewer/2022030316/5871e7001a28ab6a7b8b72dd/html5/thumbnails/12.jpg)
Copyright 2007-2010 Kenneth M. Chipps Ph.D. www.chipps.com
The Application Layer
![Page 13: Wireshark](https://reader031.vdocument.in/reader031/viewer/2022030316/5871e7001a28ab6a7b8b72dd/html5/thumbnails/13.jpg)
How wireshark can be used to launch an attack ?
1-Capturing sensitive or personal information 2-Capturing usernames and passwords(Which will be shown in the demo )
![Page 14: Wireshark](https://reader031.vdocument.in/reader031/viewer/2022030316/5871e7001a28ab6a7b8b72dd/html5/thumbnails/14.jpg)
Demo ,,
![Page 15: Wireshark](https://reader031.vdocument.in/reader031/viewer/2022030316/5871e7001a28ab6a7b8b72dd/html5/thumbnails/15.jpg)
Recourses
http://www.wireshark.org2007-2010 Kenneth M. Chipps Ph.D.
www.chipps.com