Module 162.2.L2 Using Wireshark For Network Analysis
Module 162.2.L2 Using Wireshark For Network Analysis
WIRESHARK
Managing and Manipulating Data
Module 02 Objectives:
Follow Steps 1
through 9.
HTTP server names in the column display when
filtering on ssl.handshake.type == 1.
HTTP Host and server names in the column display
when filtering on:
http.request or ssl.handshake.type == 1
Adding
Source/
Destination
Port
Columns
USING WIRESHARK TO
IDENTIFY HOSTS AND USERS
DHCP Traffic
Host Information From Traffic Assists in identifying hosts for almost any
sort of machine connected to your
A MAC address, an IP address, and a host name are network.
the three identifiers of a host of a network.
NBNS Traffic
In most situations, suspicious activity alerts are based Is primarily generated by pcs running
on IP addresses. If you have access to complete Microsoft Windows, or by Apple hosts
network packet capture, a pcap retrieved on an running MacOS.
internal IP address should show an associated MAC
address and hostname.
DHCP: DORA
Filter: DHCP
❑ After applying the DHCP Filter, select one of the frames that shows DHCP Request in the information column.
❑ Go to the frame details section and expand the line for Dynamic Host Configuration Protocol (Request) as
shown in Picture 01.
❑ Expand the lines for Client Identifier and Host Name as indicated in Picture 02.
❑ Client Identifier details should reveal the MAC address, and the Host Name details should reveal a host name.
IP Address
HOST NAME
Mac Address
Device Models and Operating User-agent strings from HTTP
headers can show the operating
Systems from HTTP Traffic system. If the HTTP traffic is from an
Android smartphone, you may be
able to identify the device's
manufacturer and model.