Sei sulla pagina 1di 36

Packet Capture Basics

For internal use


1 © Nokia Siemens Networks
Non-Technical Interpretation

Data travels around your network


like a train. With a packet sniffer,
get the ability to capture the data
and look inside the packets to
see what is actually moving long
the tracks.

For internal use


2 © Nokia Siemens Networks
Technical Representation

For internal use


3 © Nokia Siemens Networks
Ethereal/Wireshark Application
Open source protocol analyzer for Ethernet based traffic.
Old name “Ethereal”, now “Wireshark”: same tool, new name.
Stand-alone tool for capture and analysis.
GUI and command-line tools.

Throughout this
presentation the
snapshots are from
Ethereal, but apply
as well to Wireshark.
In your projects you
should use the latest
version, which is here:
http://www.wireshark.org/

For internal use


4 © Nokia Siemens Networks
Wireshark on Windows/Linux and WinPcap
Wireshark displays and analyses the traffic.
Wireshark relies on a packet capture library to capture traffic.
On Linux/Unix, this libpcap library is normally included in the system.
On Windows, we need open source WinPcap library http://www.winpcap.org/.

Windows: Linux/Unix:
Wireshark – application for sniffing packets
WinPcap libpcap
packet capture library packet capture library
running in user space running in user space
Windows Operating System Linux/Unix operating system
WinPcap Network Packet Filter (NPF) Linux Socket Filter (LSF)
device driver or BSD Packet Filter (BPF)
running in kernel space running in kernel space
Network Card Drivers
Network Interface Card
For internal use
5 © Nokia Siemens Networks
View of Ethereal/Wireshark

Packet List

Packet Details

Packet Bytes

For internal use


6 © Nokia Siemens Networks
Packet List
Packet Order

Time Order
Destination IP Information

Source IP Protocol

For internal use


7 © Nokia Siemens Networks
Packet Details

Source and Destination TCP Ports

Source and Destination IP

Breakdown of the Frame, the Packet, the TCP portion

For internal use


8 © Nokia Siemens Networks
Packet Bytes

View of the data – Hexadecimal and Raw Data

For internal use


9 © Nokia Siemens Networks
Running Ethereal/Wireshark

For internal use


10 © Nokia Siemens Networks
Running Ethereal/Wireshark

For internal use


11 © Nokia Siemens Networks
Running Ethereal/Wireshark

For internal use


12 © Nokia Siemens Networks
Running Ethereal/Wireshark

For internal use


13 © Nokia Siemens Networks
Running Ethereal/Wireshark

For internal use


14 © Nokia Siemens Networks
Running Ethereal/Wireshark

For internal use


15 © Nokia Siemens Networks
What Ethereal/Wireshark saw

For internal use


16 © Nokia Siemens Networks
What Ethereal/Wireshark saw

For internal use


17 © Nokia Siemens Networks
What Ethereal/Wireshark saw

For internal use


18 © Nokia Siemens Networks
What Ethereal/Wireshark saw

For internal use


19 © Nokia Siemens Networks
What Ethereal/Wireshark saw

For internal use


20 © Nokia Siemens Networks
Display Packet Filtering

For internal use


21 © Nokia Siemens Networks
Display Packet Filtering

For internal use


22 © Nokia Siemens Networks
Saving Captures

Captured Views
Range of Packets
All Packets
Naming is critical:
• Was it the client?
• Was it the Server?

For internal use


23 © Nokia Siemens Networks
Saving Captures

Captured Views
Range of Packets
All Packets
Naming is critical:
• Was it the client?
• Was it the Server?

For internal use


24 © Nokia Siemens Networks
After Filter/Save/Open

For internal use


25 © Nokia Siemens Networks
Time Column & Delta

For internal use


26 © Nokia Siemens Networks
FTP Only Filter

For internal use


27 © Nokia Siemens Networks
Follow the Stream

For internal use


28 © Nokia Siemens Networks
Follow the Stream

For internal use


29 © Nokia Siemens Networks
Advanced Display Filtering
Caveat: The display filters differ from the capture filters!
Filter for just that TCP stream
• (ip.addr eq 207.46.133.140 and ip.addr eq 172.17.22.56) and
(tcp.port eq 21 and tcp.port eq 3511)

Filter for traffic between two hosts


• ip.addr == 207.46.133.140 and ip.addr == 172.17.22.56

Filter for IP Traffic and removal of other traffic


• ip and !(nbns) and !(msnms) and !(browser) and !(rip)

Exclude all traffic from and to host 207.46.133.140


• This will work: not ip.addr == 207.46.133.140
• Attention, this won’t work: ip.addr != 207.46.133.140
• For the reasons why, check out the display filter manual.
For internal use
30 © Nokia Siemens Networks
Filtering Out Traffic Of One Address

filters out a.b.c.d:


not ip.addr == a.b.c.d
Ùnot (ip.src == a.b.c.d or ip.dst == a.b.c.d)

does not filter out a.b.c.d:


ip.addr != a.b.c.d
Ùip.src != a.b.c.d or ip.dst != a.b.c.d
For internal use
31 © Nokia Siemens Networks
Summary Info

For internal use


32 © Nokia Siemens Networks
Summary Info

For internal use


33 © Nokia Siemens Networks
Protocol Hierarchy

For internal use


34 © Nokia Siemens Networks
I/O Graphing

For internal use


35 © Nokia Siemens Networks
HTTP Breakdown

For internal use


36 © Nokia Siemens Networks

Potrebbero piacerti anche