Introduction to Wireshark
Last Updated :
30 Sep, 2022
Wireshark is a software tool used to monitor the network traffic through a network interface. It is the most widely used network monitoring tool today. Wireshark is loved equally by system administrators, network engineers, network enthusiasts, network security professionals and black hat hackers.
The extent of its popularity is such, that experience with Wireshark is considered as a valuable/essential trait in a computer networking-related professional.
There are many reasons why Wireshark is so popular :
- It has a great GUI as well as a conventional CLI(T Shark).
- It offers network monitoring on almost all types of network standards (ethernet, wlan, Bluetooth etc)
- It is open-source with a large community of backers and developers.
- All the necessary components for monitoring, analyzing and documenting the network traffic are present. It is free to use.
History of Wireshark
Wireshark was started with the intention of developing a tool for closely analyzing network packets. It was started by Gerald Combez in 1997. Its initial name was Ethereal. It was initially released in July 1998 as version 0.2.0. Due to the support it got from the developer community, it grew rapidly and was released as version 1.0 in 2008, almost two years after it was renamed to Wireshark.
Wireshark installation:
Windows :
- You can do a proper installation or run Wireshark as a portable app on your windows system. To download the installation executable or the portable app go to Wireshark Downloads
- Run the executable and follow on-screen instructions to complete the installation.
On Linux:
- Install using your package manager. See the manual for your package manager for correct syntax.
Most Debian Linux OS have apt(advanced packaging tool) package manager pre-installed. Similarly Fedora family of OS have "yum" package manager pre-installed.
The generic command is
html
<package-manager-name> install Wireshark
Wireshark installation in ubuntu/ Linux :
Open terminal in your system or press ALT + CTRL + T and run the below command:
sudo add-apt-repository ppa:wireshark-dev/stable
Update the repository:
sudo apt-get update
Install wire shark using the below command:
sudo apt-get install wireshark
To run the wire shark use the below command
sudo wireshark
You can opt for a security-based Linux OS that has Wireshark pre-installed, like Kali Linux.
The basic features of Wireshark are:
Packet Monitor: This segment visually shows the packets flowing inside the network. There are color codes for each type of packet. The packets are shown with the following information :
1. Source address
2. Destination address
3. Packet type
4. Hex dump of the packet
5. Contents of the packet in text
6. Source port(if applicable)
7. Destination port(if applicable)
Import from a capture file: This feature lets you import packets dump from a capture file to analyse further. There are many formats supported by Wireshark, some of them are:
- pcapng
- libpcap
- Oracle snoop and atmsnoop
- Finisar (previously Shomiti) Surveyor captures
- Microsoft Network Monitor captures
- Novell LANalyzer captures
- AIX iptrace captures
- Cinco Networks NetXray captures
- Network Associates Windows-based Sniffer and Sniffer Pro captures
- Network General/Network Associates DOS-based Sniffer (compressed or uncompressed) captures
- AG Group/WildPackets/Savvius EtherPeek/TokenPeek/AiroPeek/EtherHelp/PacketGrabber captures
- RADCOM’s WAN/LAN Analyzer captures
- Network Instruments Observer version 9 captures
- Lucent/Ascend router debug output
- HP-UX’s nettl
- Toshiba’s ISDN routers dump output
- ISDN4BSD i4btrace utility
- Traces from the EyeSDN USB S0
- IPLog format from the Cisco Secure Intrusion Detection System
- the output from VMS’s TCPIPtrace/TCPtrace/UCX$TRACE utilities
- the text output from the DBS Etherwatch VMS utility
- Visual Networks’ Visual UpTime traffic capture
- the output from CoSine L2 debug
- the output from Accellent’s 5Views LAN agents
- Endace Measurement Systems’ ERF format captures
- Linux Bluez Bluetooth stack hcidump -w traces
- Catapult DCT2000 .out files
- Gammu generated text output from Nokia DCT3 phones in Netmonitor mode
- IBM Series (OS/400) Comm traces (ASCII & UNICODE)
- Juniper Netscreen snoop captures
- Symbian OS btsnoop captures
- Tamosoft CommView captures
- Textronix K12xx 32bit .rf5 format captures
- Textronix K12 text file format captures
- Apple PacketLogger captures
- Captures from Aethra Telecommunications’ PC108 software
Export to a capture file: Wireshark lets you save the results as a capture file to continue working on them at later point of time. The supported formats are:
- pcapng (*.pcapng)
- libpcap, tcpdump and various other tools using tcpdump’s capture format (*.pcap, *.cap, *.dmp)
- Accellent 5Views (*.5vw)
- HP-UX’s nettl (*.TRC0, *.TRC1)
- Microsoft Network Monitor - NetMon (*.cap)
- Network Associates Sniffer - DOS (*.cap, *.enc, *.trc, *fdc, *.syc)
- Network Associates Sniffer - Windows (*.cap)
- Network Instruments Observer version 9 (*.bfr)
- Novell LANalyzer (*.tr1)
- Oracle (previously Sun) snoop (*.snoop, *.cap)
- Visual Networks Visual UpTime traffic (*.*).
As a beginner, you should focus only on familiarising yourself with the basics of Wireshark UI and other basics( the formats given here are for giving a glance, you don't have to do anything with them at this time).
With these basics done you can now start playing around with the tool. Launch Wireshark, select an interface( select one that is currently communicating, which can be verified by the zigzag pattern in front of the name of the interface) and click on the fin icon to start capturing packets. Save the result as a capture file and exit after you are done seeing the traffic. This concludes the fundamentals.
Similar Reads
Introduction to Sniffers
Introduction: A sniffer, also known as a packet analyzer or network analyzer, is a tool used to capture and analyze network traffic. It is a software or hardware tool that intercepts and records data packets transmitted between computers or devices on a network. Packet sniffers are commonly used for
3 min read
Introduction to TELNET
TELNET stands for Teletype Network. It is a client/server application protocol that provides access to virtual terminals of remote systems on local area networks or the Internet. The local computer uses a telnet client program and the remote computers use a telnet server program. In this article, we
7 min read
Introduction to Netcat
Netcat or NC is a utility tool that uses TCP and UDP connections to read and write in a network. It can be used for both attacking and security. In the case of attacking. It helps us to debug the network along with investigating it. It runs on all operating systems. Getting Started with Netcat To st
3 min read
How to Install Wireshark on Windows?
Wireshark is software that is widely used in the analysis of data packets in a network. Wireshark is completely free and open source. This packet analyzer is used for a variety of purposes like troubleshooting networks, understanding communication between two systems, developing new protocols, etc.
3 min read
Wireshark - Packet Capturing and Analyzing
Prerequisite: Introduction to Wireshark This article will introduce the methods of packet capturing and analyzing. It will also introduce some advanced tools that are used for increasing efficiency during capture and analysis. Why sniff around? If you have prior experience with securing systems, you
4 min read
Introduction to basic Networking Terminology
For a specific purpose if things are connected together, are referred to as a NETWORK. A network can be of many types, like a telephone network, television network, computer network, or even a people network. Similarly, a COMPUTER NETWORK is also a kind of setup, where it connects two or more device
4 min read
Different Functionalities of MTP3 Layer
In the field of computer networking, the network management functions are widely used to signal links or restore the failed links, activate the idle links, deactivate the aligned links, also, maintaining the services if the signal links and SPs are lost, forced routing, control routing and signaling
11 min read
Data Communication Tutorial
Data communication plays an important role in today's interconnected world and enables the exchange of information between devices and networks. Whether you're sending an email, making a video call, or browsing the web, data communication ensures that information flows smoothly. This Data Communicat
5 min read
Network Protocols and Communications
Data communication are the exchange of data between two nodes via some form of link (transmission medium) such as cable. Now these Data are exchanged in three ways : Simplex Half Duplex Full Duplex Now let us understand them one by one : Simplex : Communication is always unidirectional, i.e., one de
2 min read
Networks and Process of Network Communications
If someone is interested or willing to join the world of Cyber Security he/she must be familiar with how Network Communication takes place. As the basic job of a cybersecurity analyst is to trace the event occur on the network. The record of the incident is stored in log files in systems involving i
5 min read