Wireshark: Packet Operations
Continuing with wireshark features:-
Statistics: provides multiple statistics options to help users see the big picture in terms of the scope of the traffic, available protocols, endpoints and conversations, and specific protocols.
Resolved Addresses:-
It helps analysts identify IP addresses and DNS names.
Statistics → Resolved Addresses
Protocol Hierarchy
This option breaks down all available protocols from the capture file and helps to view the protocols in a tree view based on packet counters and percentages.
Statistics → Protocol Hierarchy
Conversations
represents traffic between two specific endpoints. This option provides the list of the conversations in five base formats; ethernet, IPv4, IPv6, TCP and UDP. Thus analysts can identify all conversations and contact endpoints for the event of interest.
Statistic → Conversations
Endpoints
Provides unique information for a single information field (Ethernet, IPv4, IPv6, TCP and UDP ). Thus analysts can identify the unique endpoints in the capture file and use it for the event of interest.
Statistics → Endpoints
Wireshark provides MAC addresses, IP and port name resolution options as well. However, these options are not enabled by default. If you want to enable them Edit → Preferences → Name Resolution
IPv4 and IPv6
The analysts can identify and list all events linked to specific IP versions in a single window and use it for the event of interest.
Statistics → IPvX Statistics
DNS
This option breaks down all DNS packets from the capture file and helps analysts view the findings in a tree view based on packet counters and percentages of the DNS protocol.
Statistics → DNS
HTTP
This option breaks down all HTTP packets from the capture file and helps analysts view the findings in a tree view based on packet counters and percentages of the HTTP protocol.
Statistics → HTTP
Packet Filtering:-
it has two types capture filters which filters the scope, direction, protocols and ports and display filters.
Display Filter:-
IP Filter:-
TCP/UDP Filters:-
HTTP/DNS Filters:-
Advanced Filters:-
Commands or queries used
To get the packet sent in Kanas City:
ip.geoip.dst_summary contains “Kansas City”
To get the packets from host “rad.msn.com”:
http.host == “rad.msn.com”
To get the packets which have type A DNS Queries:
dns.resp.type == 1
To get the packets with even TTL numbers:
string(ip.ttl) matches “[2468]$”
The room link:
TryHackMe | Wireshark: Packet Operations
Created on 2nd June 2023