Kali Linux Tutorial - How to use Wireshark to Monitor Network Traffic - Network Hacking




What is Wireshark ?

  • Wireshark is an open source and network packet analyser.
  • It is used for the following terms,
    • To capture network packets and displayed that packet data.
    • To troubleshoot network problems.
    • To debug protocol implementations.
    • To learn network protocol

Features :

  • It is available for UNIX and Windows
  • It has filter packets and search for packets.
  • It can import and export packet data.
  • It is used to colorize packet display based on filters.
  • It can capture open and save packet data.
 Wireshark Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Wireshark Tool - Ethical Hacking examples - Ethical Hacking programs

Alternatives of Wireshark :

Cloud Shark

  • Cloud shark is a Web-based platform which is used to analyse and share packet capture files in a browser
  • It is helpful to solve network problems and managing network captures easily.
 Cloud Shark Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Cloud Shark Tool - Ethical Hacking examples - Ethical Hacking programs

Sysdig

  • Sysdig is an Open source tool which is used to monitor and secure containers both for windows and mac
  • It is helpful to track the system acidity.
  • It can accelerate transition to containers.
 Sysdig Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Sysdig Tool - Ethical Hacking examples - Ethical Hacking programs

Mojo Packets

  • Mojo packets is an ideal tool for cloud based troubleshooting tool and WiFi analysis.
  • It is helpful to store and organize traces in packets for quick access.
  • It has visualization of WiFi connections and visual coding.
 Mojo Packets Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Mojo Packets Tool - Ethical Hacking examples - Ethical Hacking programs

Debookee

  • Debookee is a network traffic analyser & monitoring tool which is used to intercept and motor the traffic of any device in the same subnet.
  • It is helpful to find out who is using WiFi bandwidth and to select/intercept their traffic via Man-in-the-middle attack.
 Debooke Tool

Learn Ethical Hacking - Ethical Hacking tutorial - Debooke Tool - Ethical Hacking examples - Ethical Hacking programs

Step by Step Procedures

Step 1 :

  • Download Wireshark from browser.

Step 2:

  • Choose eth0, which is used for monitoring network such as protocols , sessions , packs and then select the shark tail symbol or double tap the eth0.
 Select Shark Tail Symbol

Learn Ethical Hacking - Ethical Hacking tutorial - Select Shark Tail Symbol - Ethical Hacking examples - Ethical Hacking programs

Step 3 :

  • Now Capturing will start which shows sender and receiver IP address , it means trace router root, protocols and response time in milli seconds.
 Capturing Will Start

Learn Ethical Hacking - Ethical Hacking tutorial - Capturing Will Start - Ethical Hacking examples - Ethical Hacking programs

Step 4 :

  • Protocols are displayed, which are TCP , UDP & ARP. When you want to stop the capturing, then click the red button from top left.
 Protocols are Displayed

Learn Ethical Hacking - Ethical Hacking tutorial - Protocols are Displayed - Ethical Hacking examples - Ethical Hacking programs

Step 5 :

  • Here Checking TCP protocol (TCP - Transmission Control Protocol ) which is used to view Ethernet type , Internet Protocol version , Frame rates in bytes the all data's are important for networking analysis.
 Checking TCP Protocol

Learn Ethical Hacking - Ethical Hacking tutorial - Checking TCP Protocol - Ethical Hacking examples - Ethical Hacking programs

Step 6 :

  • Now Click Transmission control protocol it will shows some data’s such as
    • Source port
    • Destination port
    • Sequence number
    • Ack – Acknowledgement details and
    • Header values
    • .
 Click TCP

Learn Ethical Hacking - Ethical Hacking tutorial - Click TCP - Ethical Hacking examples - Ethical Hacking programs

Now capture the login credentials from http sites such as user name and password, through Wireshark tool. It will work in http sites only for demo purpose, using in own system demo site is https://demo.testfire.net

Step 7 :

 Open Browser

Learn Ethical Hacking - Ethical Hacking tutorial - Open Browser - Ethical Hacking examples - Ethical Hacking programs

Step 8 :

  • Type demo.testfire.net which is for demo purpose.
 Demo TestFire Site

Learn Ethical Hacking - Ethical Hacking tutorial - Demo TestFire Site - Ethical Hacking examples - Ethical Hacking programs

Step 9 :

  • Page is appeared successfully. Now click sign in for member login.
 Click Sign in

Learn Ethical Hacking - Ethical Hacking tutorial - Click Sign in - Ethical Hacking examples - Ethical Hacking programs

Step 10 :

  • Fill username and password. Click login. Then login username as admin and password as admin.
 Fill Username and Password

Learn Ethical Hacking - Ethical Hacking tutorial - Fill Username and Password - Ethical Hacking examples - Ethical Hacking programs

Step 11 :

  • Account is successfully logged as admin member.
 Account Logged

Learn Ethical Hacking - Ethical Hacking tutorial - Account Logged - Ethical Hacking examples - Ethical Hacking programs

Step 12 :

  • Now type http then view the http protocol (for http filtering).
 HTTP Filtering

Learn Ethical Hacking - Ethical Hacking tutorial - HTTP Filtering - Ethical Hacking examples - Ethical Hacking programs

Step 13 :

  • Choose the POST method info, Which means the login details are validate through post method.
 Post Method Info

Learn Ethical Hacking - Ethical Hacking tutorial - Post Method Info - Ethical Hacking examples - Ethical Hacking programs

Step 14 :

  • Click Hypertext protocol, which is used for identify host name , cookies , etc.,
 Hyper Text Protocol

Learn Ethical Hacking - Ethical Hacking tutorial - Hyper Text Protocol - Ethical Hacking examples - Ethical Hacking programs

Step 15 :

 Hostname Browser Cookie Details

Learn Ethical Hacking - Ethical Hacking tutorial - Browser Cookie Details - Ethical Hacking examples - Ethical Hacking programs

Step 16 :

  • Now click the Html Form URL Encoded which is for user credentials are stored in URL encoded tag, then http web page login details are displayed.
 HTML Form URL

Learn Ethical Hacking - Ethical Hacking tutorial - HTML Form URL - Ethical Hacking examples - Ethical Hacking programs

Step 17 :

  • After you will test the user name and password on demo.testfire.net page. Finally click File -> Quit.
 Click File Quit

Learn Ethical Hacking - Ethical Hacking tutorial - Click File Quit - Ethical Hacking examples - Ethical Hacking programs

Step 18 :



Related Searches to How to use Wireshark to Monitor Network Traffic