Network: Traffic Analysis with Wireshark

Listen to this Post

2025-02-10

Wireshark is a powerful tool for network analysis, providing deep insights into network traffic. It allows you to capture and analyze data packets in real-time, making it invaluable for troubleshooting, security analysis, and network optimization. Below are some practical commands and techniques to get the most out of Wireshark.

Basic Wireshark Commands and Usage

1. Starting Wireshark

To start Wireshark from the terminal:

wireshark

2. Capturing Traffic on a Specific Interface

To capture traffic on a specific network interface (e.g., eth0):

wireshark -i eth0

3. Saving Captured Traffic to a File

To save captured packets to a file for later analysis:

wireshark -i eth0 -w capture.pcap

4. Reading a Saved Capture File

To open a previously saved capture file:

wireshark -r capture.pcap

5. Filtering Traffic

Wireshark allows you to filter traffic to focus on specific protocols or IP addresses. For example:
– To filter HTTP traffic:

http

– To filter traffic from a specific IP address (e.g., 192.168.1.1):

ip.src == 192.168.1.1

6. Analyzing TCP Streams

To follow a TCP stream and see the data exchanged between two endpoints:
– Right-click on a TCP packet → Follow → TCP Stream.

7. Detecting Network Issues

Use Wireshark’s built-in expert system to detect common network issues:
– Go to Analyze → Expert Info.

8. Identifying Malicious Traffic

Look for unusual patterns, such as excessive ICMP requests or unexpected port scans. Use filters like:

icmp || tcp.flags.syn == 1 && tcp.flags.ack == 0

9. Visualizing Network Flows

Use Wireshark’s Statistics menu to visualize network flows, IO graphs, and protocol hierarchies.

10. Extracting Files from Traffic

If files are transferred over the network, you can extract them using:
– File → Export Objects → HTTP.

What Undercode Say

Wireshark is an indispensable tool for anyone involved in network administration, cybersecurity, or application development. Its ability to capture and analyze network traffic in real-time provides unparalleled insights into network behavior. Below are some additional Linux commands and techniques to complement your Wireshark usage:

1. Monitor Network Interfaces

Use `ifconfig` or `ip` to monitor network interfaces:

ifconfig eth0
ip addr show eth0

2. Check Open Ports

Use `netstat` or `ss` to check open ports and connections:

netstat -tuln
ss -tuln

3. Capture Traffic with tcpdump

For command-line packet capturing, use `tcpdump`:

tcpdump -i eth0 -w capture.pcap

4. Analyze Traffic with tshark

`tshark` is the command-line version of Wireshark:

tshark -i eth0 -f "tcp port 80"

5. Detect ARP Spoofing

Use `arp-scan` to detect ARP spoofing attacks:

arp-scan -l

6. Monitor Bandwidth Usage

Use `iftop` to monitor real-time bandwidth usage:

iftop -i eth0

7. Scan for Vulnerabilities

Use `nmap` to scan your network for vulnerabilities:

nmap -sV -O 192.168.1.0/24

8. Analyze Logs

Use `grep` and `awk` to analyze system logs for suspicious activity:

grep "Failed password" /var/log/auth.log

9. Secure Your Network

Use `iptables` to set up a firewall:

iptables -A INPUT -p tcp --dport 22 -j ACCEPT
iptables -A INPUT -j DROP

10. Automate Tasks with Scripts

Write bash scripts to automate network monitoring tasks:

#!/bin/bash
tcpdump -i eth0 -w capture_$(date +%F).pcap -c 1000

By combining Wireshark with these Linux commands, you can gain a comprehensive understanding of your network, detect anomalies, and secure your systems effectively. For further reading, visit the official Wireshark documentation: https://www.wireshark.org/docs/.

References:

Hackers Feeds, Undercode AIFeatured Image