

How to use Wireshark for packet analysis and filtering

Determine systems within the network that are heavy on bandwidth consumption.Determine network statistics by filtering network packets based on your requirements.Determine which machines and resources to isolate from the network due to the traffic coming from them.Detect malicious traffic from malware or network intrusions from unauthorized or malicious individuals/parties.Analyze problems within the network by assessing the packets as traffic runs through the network.In order for us to understand what we are dealing with and to troubleshoot the problem, we make use of packet analyzers such as Wireshark in order to perform network analysis. Click on Export Objects, and then SMB.There are many things that can go wrong within a network. To export SMB objects (such as transferred files): SMB is a favorite to capture, as it is usually not encrypted and you may be able to exfiltrate files over the wire. To export FTP objects (such as transferred files): Remember to always Right-Click a packet, and Follow the TCP Stream to get more details from the raw data.įTP is pretty simple, since all traffic is sent in plaintext. To export HTTP objects (such as images or pages): If non-encrypted HTTP traffic was captured, we may be able to extract juicy details. In the Menu, click on Statistics and select Protocol Hierarchy. Understanding the Packet Captureīefore diving too deep, it’s always a good idea to get an idea of what type of traffic was captured so you know which filters to apply. This post will be updated as time goes on. However, I wanted to create this ‘short’ list that contains my favorite go-to’s after performing Man in the Middle attacks. There are literally hundreds of these type of posts on the internet, with one of my favorites being.
