Preview

Lab 2.6.2: Using Wireshark

Powerful Essays
Open Document
Open Document
2260 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 2.6.2: Using Wireshark
Lab 2.6.2: Using Wireshark™ to View Protocol Data Units

Learning Objectives

• Be able to explain the purpose of a protocol analyzer (Wireshark).

• Be able to perform basic PDU capture using Wireshark.

• Be able to perform basic PDU analysis on straightforward network data traffic.

• Experiment with Wireshark features and options such as PDU capture and display filtering.

Background

Wireshark is a software protocol analyzer, or "packet sniffer" application, used for network troubleshooting, analysis, software and protocol development, and education. Before June 2006, Wireshark was known as Ethereal.

A packet sniffer (also known as a network analyzer or protocol analyzer) is computer software that can intercept and log data traffic passing over a data network. As data streams travel back and forth over the network, the sniffer "captures" each protocol data unit (PDU) and can decode and analyze its content according to the appropriate RFC or other specifications.

Wireshark is programmed to recognize the structure of different network protocols. This enables it to display the encapsulation and individual fields of a PDU and interpret their meaning.

It is a useful tool for anyone working with networks and can be used with most labs in the CCNA courses for data analysis and troubleshooting.

For information and to download the program go to - http://www.Wireshark.org

Scenario

To capture PDUs the computer on which Wireshark is installed must have a working connection to the network and Wireshark must be running before any data can be captured.

When Wireshark is launched, the screen below is displayed.

[pic]

To start data capture it is first necessary to go to the Capture menu and select the Options choice.
The Options dialog provides a range of settings and filters which determines which and how much data traffic is captured.

[pic]
First, it is necessary to ensure that Wireshark is set to monitor

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Select an ARP frame labeled Who has ##.##.##.##? where ##.##.##.## is the default gateway address recorded on page 1. Make the Ethereal Application window full screen if it isn’t already full screen.…

    • 434 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    2. Briefly explain how each of the Linux-based tools demonstrated in this lab can be used to monitor bandwidth, protocol, and network traffic information.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    2. Briefly explain how each of the Linux-based tools demonstrated in this lab can be used to monitor bandwidth, protocol, and network traffic information.…

    • 1518 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 2469 Words
    • 10 Pages

    In order to do so, the packet analyzer must “understand” the structure of all messages exchanged by protocols. For example, suppose we are interested in displaying the various fields in messages exchanged by the HTTP protocol in Figure 1. The packet analyzer understands the format of Ethernet frames, and so can identify the IP datagram within an Ethernet frame. It also understands the IP datagram format, so that it can extract the TCP segment within the IP datagram. Finally, it understands the TCP segment structure, so it can extract the HTTP message contained in the TCP segment. Finally, it understands the HTTP protocol and so, for example, knows that the first bytes of an HTTP message will contain the string “GET,” “POST,” or “HEAD,” as shown in Figure 2.8 in the…

    • 2469 Words
    • 10 Pages
    Good Essays
  • Satisfactory Essays

    100 NT2580 Lab01 Final

    • 287 Words
    • 2 Pages

    In this lab, you explored the common tools available in the virtual lab environment. You used…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Comp230 wk4 Ilab

    • 822 Words
    • 4 Pages

    In the space provided below, copy and paste your IP_Array.vbs Program Code. If it doesn’t fit, use the next page for the continuation of your sourcecode program…

    • 822 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    vlab wk 1

    • 1842 Words
    • 9 Pages

    Copy and paste the following screenshots from your Using Show Commands to Investigate Network Status lab.…

    • 1842 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Lab 12

    • 3059 Words
    • 13 Pages

    In this lab you will use the Wireshark packet analyzer to capture and display the control information and data stored in packets transmitted over a network. Wireshark collects network traffic data and creates files that display packet header information in a layered format like that used by the Internet model. These layers can be expanded to view details that may prove helpful in determining the source of problems that your network might be experiencing. Creating filters that hide unwanted data and facilitate data analysis will also be discussed in this lab.…

    • 3059 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Packet sniffing is a type of attack in which the attacker uses the collection of network messages as it is traveling from the user to the server in order to divulge…

    • 488 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 7 security threats

    • 449 Words
    • 2 Pages

    Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. It lets you capture and interactively browse the traffic running on a computer network. Wireshark is a network protocol and packet analyser,…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Securing Windows Media

    • 481 Words
    • 2 Pages

    | The Windows Media distribution server uses a port within this UDP In port range to receive data packets from the origin server.…

    • 481 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    quiz 2

    • 651 Words
    • 3 Pages

    3. This tool uses the command-line to identify and report the protocol statistics of current TCP/IP connections using NBT (NetBIOS over TCP/IP).…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Networking basics

    • 519 Words
    • 3 Pages

    Describe what is meant by soft skills and explain why they are important in networking projects…

    • 519 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    yuffgtf

    • 1299 Words
    • 7 Pages

    18. Tracks Various Activities – “TeleTrack provides the ability to view field activity from privacy of own private Internet website, and is password protected” [ (TeleTrack Time and Attendence solutions, 2007) ].…

    • 1299 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SIMD Architecture

    • 652 Words
    • 3 Pages

    Since the system is implemented in Manual, so the response is very slow. The transactions are executed in off-line mode, hence on-line data capture and modification is not possible.…

    • 652 Words
    • 3 Pages
    Satisfactory Essays