How to Use Wireshark: The Complete Beginners Guide

How to Use Wireshark
Image by .freepik.com

You might want to think about tracing each network packet separately if you are constantly troubleshooting different network issues, either at home or at work. The simplest way to accomplish this is to begin using Wireshark. Learn how to use Wireshark to capture network traffic, get IP, get passwords, and how it can assist you in identifying typical network problems.

How to Use Wireshark 

Wireshark is essential if you find yourself debugging network problems and need to examine individual packets. The de facto, must-know-how-to application for capturing and delving into network traffic is Wireshark. Additionally, as Wireshark is the most popular tool for this task, let’s go over some program fundamentals, including how to utilize filters, capture network packets, download locations for Wire Shark, and more.

Wireshark is one of the most valuable tools for any IT worker. You can capture and view network packets at a finer level with the aid of Wire Shark. You can utilize these packets for offline or real-time analysis after they have been dissected. With the help of this tool, you can examine your network traffic through a microscope, filter it, and carry out deep dives to identify the core causes of issues. This helps with network analysis and, eventually, network security. To properly diagnose, you will learn how to collect, analyze, filter, and inspect data packets with this free Wireshark lesson.

What Does Wireshark Do?

Traffic is captured by Wireshark, which then transforms it from binary to a format that can be read by humans. This makes determining the types of traffic that are flowing through your network, their quantities, their frequency, the latency between different hops, and other details simple.

Even though Wireshark is compatible with over two thousand network protocols—many of which are obscure, rare, or antiquated—analyzing IP packets will provide the most immediate benefit for the current security expert. TCP, UDP, and ICMP packets probably make up the bulk of the traffic on your network.

The ability to filter the vast amount of traffic that flows via a normal business network is what makes Wireshark so valuable. Only the traffic types that interest you will be captured by capture filters. Wireshark captures the traffic and then converts it from binary to a human-readable format. This makes determining the types of traffic that are flowing through your network, their quantities, their frequency, the latency between different hops, and other details simple.

Even though Wireshark is compatible with over two thousand network protocols—many of which are obscure, rare, or antiquated—analyzing IP packets will provide the most immediate benefit for the current security expert. TCP, UDP, and ICMP packets probably make up the bulk of the traffic on your network. The ability to filter the vast amount of traffic that flows via a normal business network is what makes Wireshark so valuable. Only the traffic types that interest you will be captured by the capture filters.

How to Use Wireshark

To determine what is odd, you must first know what is normal, and Wireshark has capabilities to help you establish baseline statistics. Even though Wireshark is not an intrusion detection system (IDS), but rather a network protocol analyzer, it can be incredibly helpful in identifying malicious traffic once a red flag has been raised.

TLS-encrypted traffic can also be intercepted and analyzed with Wireshark. An administrator can load symmetric session keys into Wireshark and view unencrypted web traffic if they have the proper browser settings, user consent, and knowledge. Symmetric session keys are saved in the browser. There are graphical tools in Wireshark for visualizing the statistics. This facilitates the identification of broad trends and the communication of findings to non-technical management.

Wireshark Features:

  • Packet capture: You can use your network interface to record traffic using Wireshark.
  • Analysis of protocols: With Wire Shark, you may decode and examine more than 3000 network protocols to comprehend their composition and organization.
  • Packet filtering: To filter network traffic, Wire Shark has strong capture and display filters.
  • Reconstructing network packets with Wire Shark allows you to view application-level protocols and, consequently, web pages, pictures, and other application data.
  • Statistics and visualizations of network traffic: Wireshark offers statistics and traffic visualizations.
  • Customization: Wireshark’s plugins allow you to add features and alter the program.

How to Use Wireshark to Capture Network Traffic 

You can submit a packet capture (pcap) file or record network traffic using Wireshark. Now let’s examine network traffic capture.

Since Wireharsk already exists on Kali Linux, here are three easy steps to start capturing network traffic:

Step 1: Launch the Wireshark software. Click the button to launch the Wireshark application first. The welcome screen of Wireshark will greet you. 

Step 2: Decide which network interface to use for traffic capture.

Choose which of your network interfaces you wish to record traffic on from the welcome page. The line to the right of the interface shows the flow of network traffic through the interface.

Step 3: Putting an end to the packet capture To begin capturing packets, double-click on the capture interface where you wish to capture traffic.

Click the red “Stop Capture” button to end capturing packets.

This will enable you to carry out your investigation by storing the packet capture in a temporary file.

To store your information in a certain file. Choose File > Save As, then type the filename and location where you want to store this data.

Click the Start Capture button to begin capturing a new packet. Any captured data that is not stored will be automatically removed.

Using precise criteria a packet must fulfill, you can use Wireshark’s capture filters to restrict the network packets that the program should collect when capturing network traffic. They assist you in minimizing Wireshark’s processing overhead and limiting the scope of the network traffic recorded to only that which is pertinent to you. 

How to Use Wireshark to Get Ip 

You can use the DHCP details to locate the host you’re looking for if you want to know its IP address on your network:

  • Use Wireshark’s Promiscuous Mode.
  • Enter either “dhcp” or “bootp” in the filter toolbar, based on the version of Wireshark you are using.
  • Pick a packet that has been screened out. The packet’s Info section must display “DHCP request.”
  • Go to the details pane of the package.
  • Extend the line titled “Bootstrap Protocol.”
  • The device identifier that sent the request is displayed there.

When a device powers on, most of them will use DHCP to obtain an IP address. Before the unknown IP/MAC device is powered on, make sure Wireshark is open so you can capture its DHCP request 

How to Use Wireshark to Get IP Address on a PS4

Consider your PS4 as a device that has no IP at startup if you wish to find its IP address:

  • Get a listening device ready. A computer with Wireshark installed may do this.
  • Verify that the listening device’s wire shark is in promiscuous mode.
  • Activate the PlayStation 4.
  • On the listening device, look for the DHCP request that your PS4 sent.
  • Your PS4 and the DHCP request should match.
  • Check the details package window for the sender’s information.
  • You will be able to write down the IP address, MAC, and name of your PS4.

Try the following if your PS4 is already on and you’re trying to find someone else’s IP address:

Possess Wire shark 

  • Open Wireshark and let it listen on your network. 
  • Assuming you have a listening device, confirm that Promiscuous Mode is activated.
  • Connect your listening device and PS4 to the internet using an internet hub, or use the listening device to connect PS4 to the internet (e.g., by turning it into a WiFi host).
  • Find the IP address of your PS4.
  • Go to a party with the individual you are trying to locate the IP for.
  • Monitor PS4 traffic with Wireshark. 

The sender address in incoming packets is their IP address. You won’t be able to obtain the exact IP address of another person since, regrettably, the majority of incoming IP addresses are hidden by the protocol and service provider.

Games that connect peers-to-peers will frequently allow all players to converse with one another (in the background) so that Wireshark can obtain the IP addresses of other participants. Don’t get your hopes up; this is frequently thwarted by different service providers. The name of the service provider and an approximate location will be your best bet.

How to Use Wireshark to Get Passwords

Are you curious about how to get passwords using Wireshark? This section provides an easy-to-follow tutorial on how to use and decode passwords using Wireshark. 

#1. Discover How to Uncover Passwords Using Wireshark

A network protocol analyzer called Wireshark is used to record and examine packets that are transmitted over a network. It is strong and adaptable, with the capacity to decrypt passwords, identify network problems, and aid in network security. With support for numerous operating systems, Wireshark is available for both home and business use.

How to Get Passwords Out of Wireshark

There are various procedures you must follow in order to use Wireshark to expose passwords. These are the following:

  • Install Wireshark on your PC after downloading it.
  • Use Wireshark to capture a network packet.
  • Utilizing the Wireshark interface, examine the traffic.
  • Examine the packet for any patterns that could indicate passwords.
  • Keep any passwords you come across.

You may quickly learn how to use Wireshark to disclose passwords by following these steps. It’s crucial to take precautions against fraudulent attempts to obtain passwords using Wireshark, though, and to be aware of these methods.

#2. How to Begin Using Wireshark to Find Passwords

One potent packet analyzer is called Wireshark. You can utilize network traffic to find passwords if you know how to use it appropriately. The following advice will help you get started:

  • Initially, confirm that Wireshark is loaded and operating on your system.
  • After it opens, choose the “Capture” menu item. You have the option of capturing all or only the traffic belonging to a certain protocol.
  • The data packets will now begin to flow over your screen. Examine the data and look for any wires that might have passwords on them. These are typically identified by identifiers such as “auth” or “login.”
  • Clicking on a packet that might contain password information will cause the Packet Details box to pop up.
  • Use the “Export Object” option in this box to save the packet to your computer. You should now have access to the password list.
  • Prior to acting, be sure to thoroughly examine the data.

Knowing the proper approach to utilizing Wireshark can be quite helpful. Remember that correctly capturing passwords is a challenging task that calls for patience and close attention. However, you will have a potent addition to your toolkit of security tools once you have mastered the instrument.

How Do I Start Working With Wireshark? 

Using Wireshark to capture your traffic

  • Click on Interface Capture.
  • Choose the interface that needs to have packets collected. To begin the capture, click the Start button.
  • Make the issue again.
  • Click Stop once the issue that needs to be examined has been replicated.
  • Using the default format, save the packet trace.

How Do I Run a Command in Wireshark? 

These are steps on how to run a command in Wireshark:

  • Wireshark can be launched by utilizing the Run command box.
  • Press the Windows key + R to bring up the Start menu.
  • In the Run command window, type Wire Shark.
  • Hit the Enter key.

How to Collect Data From Wireshark? 

To gather data from Wireshark, you have to:

  • Install Wire Shark on a PC after downloading it.
  • Link the hub to the IP network from the AlphaCom.
  • Link the hub and PC together.
  • Launch the Wireshark software.
  • In Wire shark, pick ‘Capture -> Options..’ from the menu.
  • ‘Start’ will initiate the capture. 
  • Press ‘Stop’ once the capture is complete.

How Do I Analyse Packets in Wireshark?

To examine data packets in Wire Shark, you must first access the relevant file that was saved during the packet capture procedure. Next, users can apply Wireshark’s filter options to further refine their search. Here are a few examples of how to use wire shark filters: displaying only traffic coming from a specific port.

Reference

0 Shares:
Leave a Reply

Your email address will not be published. Required fields are marked *

You May Also Like