FA15 Beginner Wireshark 22AF

advertisement
Packet Analysis Using Wireshark
for Beginners 22AF
Lisa Bock
Pennsylvania College of Technology
Monday October 5, 2015 9:30am - 10:45am
Track AF | Level 1 | Atlantic VI
Learning Objectives
•
•
•
•
Understand Traffic Capture and Analysis
Layers and Encapsulation
Explore the Wireshark interface
Examine Common Protocols
– TCP, HTTP, DNS, and FTP
UNDERSTAND TRAFFIC CAPTURE AND
ANALYSIS
Overview of Packet Analysis
• Packet analysis uses a packet sniffer
• Monitor and troubleshoot network traffic
• As data flows across the network
– Sniffer captures each packet and decodes the
packet's raw bits
– Showing the field values in the packet
according to the appropriate RFC or other
specification
Uses for Packet Analysis
•
•
•
•
•
•
•
Analyze network problems
Detect intrusion attempts
Identify network misuse
Content monitoring
Assess bandwidth utilization
Verify endpoint security status
Gather network statistics
Common Packet Analyzers
•
•
•
•
•
•
•
•
Cain and Abel
Carnivore – now NarusInsight
dSniff
ettercap
Ngrep
OmniPeek
Snoop
Tcpdump
Carnivore
Packet Capture
• Dependent on where you capture
• On a switch
– Packet sniffer will see only data going to
and from the switch to the capture
device
http://wiki.wireshark.org/CaptureSetup/Ethernet
Packet Capture
• Traffic on a wired switch
– Unicast, broadcast, or multicast.
• To see all traffic
– Port monitoring or SPAN
– Use a full duplex tap in line with traffic
http://wiki.wireshark.org/CaptureSetup/Ethernet
LAYERS AND ENCAPSULATION
The OSI Model
To understand packet analysis
you must understand the
encapsulation process
The OSI Model
• A seven-layer representation
• How data changes as each layer
provides services to the next layer
–Data encapsulates
–Data de-encapsulates
The OSI Model
PDU
Address
Data
Segment
Port
Packet
IP
Frame
Bits
MAC
EXPLORE THE WIRESHARK INTERFACE
Wireshark
• The tool for this lab is Wireshark
• Download and install Wireshark
–Install WinPCap if you are using
Windows
http://www.wireshark.org
Wireshark
• For a live capture
–Launch Wireshark
–Go to -> Capture Interfaces
–Click the name of an interface
–Start capturing packets on that
interface
Wireshark
Checkmark
the interface
you want to
capture
• Configure advanced features by clicking Options
• Select the interface with active packet exchange
The OSI Model
• In Wireshark, select any http frame and
you will see the layers 2-7
Frame
Packet
Segment
Data
For a review go to http://wiki.wireshark.org/Ethernet
Help in Wireshark
Easily find help in
Wireshark-including
Sample Captures
Capture Packets
• We will use pre-captured packets
• Review normal traffic
Capture Packets
• Once you open a capture you will see
three panes:
– Top: packet list of all of the packets
received during the capture session
– Middle: details of a single frame
– Bottom: the bytes of a single frame
EXAMINE COMMON PROTOCOLS - TCP
A TCP Example
• Normal traffic
• Three-way handshake packets 1,2,3
• Review
– Port numbers
– Flags
– SEQ ACK numbers
– Stream index
EXAMINE COMMON PROTOCOLS - UDP
UDP Example
• Connectionless Transport Layer service
• No handshake, sequencing or
acknowledgement
• Few problems occur with UDP
UDP Applications
• Commonly used in video streaming and
time-sensitive applications.
–
–
–
–
–
Domain Name System (DNS)
Routing Information Protocol (RIP)
Voice over IP (VoIP)
Trivial File Transfer Protocol (TFTP)
Domain Host Configuration Protocol (DHCP)
EXAMINE COMMON PROTOCOLS - DNS
DNS
• DNS is essential to any network
• Converts host names (google.com)
to an IP address (72.14.204.103)
• Client sends query to DNS server for
an IP address
• Server responds with information
– Or asks other DNS servers for the
information
DNS
• Transfers name information between DNS
servers
– DNS uses TCP in a zone transfer
• Look up other host names such as mail
exchange (MX) records
DNS
• All DNS packets have four (4) sections:
– Questions
– Answer Resource Records
– Authority Resources Records
– Additional Resource Records
DNS Packet Structure - Flags
If RD is set, it directs the
name server to pursue the
query recursively.
EXAMINE COMMON PROTOCOLS FTP
FTP – Grab a Pic
• Purpose of FTP is to transfer files over TCP
• Uses both ports 20 and 21
– Command channel is designated on port 21 for
the FTP server.
– To transfer data like directory contents or
files, a secondary channel, port 20 is used.
Reassemble the Streams
• Can reassemble and obtain content if data is not
encrypted
• Filter ftp-data traffic
• Right click follow TCP stream 74 and save the file
as raw data and click save as mystery.jpg
• Go to where you saved the file and open it!
EXAMINE COMMON PROTOCOLS HTTP
HTTP 1.1
Hypertext Transfer Protocol
 Actors in Web interaction
– HTML
– HTTP
– Browser and the Web Server
• HTTP is a stateless protocol
• Two types of HTTP messages
– Request and response
Hypertext Transfer Protocol
 Web page consists of objects
 Identified by a URL or URI
•
•
•
•
•
Request line (GET or POST methods)
Additional information about the request
Status code line
Header Fields
Data
HTTP Response Status Codes
•
•
•
•
2xx:
3xx:
4xx:
5xx:
Success
Redirection
Client Error
Server Error
QUESTIONS?
More Resources
• For more Packet Captures go to
http://www.netresec.com/?page=PcapFiles
• Wireshark Network Analysis, by Laura Chappell,
Chappell Binding
• Practical Packet Analysis: Using Wireshark to
Solve Real-World Network Problems, by Chris
Sanders, No Starch Press, Incorporated
• Article on using Wireshark to troubleshoot
Rational problems
On IBMi
• Install the QSPTLIB library which is
available as a save file PTF
–
–
–
–
–
V5R2M0
V5R3M0
V5R4M0
V6R1M0
V7R1M0
-
SE06946
SE16633
SE24152
SE32507
SE45610
• Use a binary FTP transfer and load the
save file onto the IBMi system.
On IBMi
• Restore the library
– RSTLIB SAVLIB(QSPTLIB) DEV(*SAVF)
SAVF(QGPL/QSE45610)
• Run Trace Connection command (x's are
the IP address of the remote system)
TRCCNN SET(*ON) TRCTYPE(*IP) TRCTBL(TRCCNNIP) SIZE(998000)
TCPDTA(*N () () *N 'xxx.xxx.xxx.xxx')
On IBMi
• Turn off tracing.
– TRCCNN SET(*OFF) TRCTBL(TRCCNNIP) CCSID(*ASCII)
• Output is a spooled file called QSYSPRT.
• Run to access support tools menu:
– ADDLIBLE SPTLIB
– SPT
On IBMi
• Option 12 to displays the Communications
Trace menu.
• Option 15 to converts the spooled trace to
a CAP file.
– CVTTRCCNN SPLF(QSYSPRT * *LAST)
OUTF('/lisa_traces/mystery-trace.cap')
• Copy out to a machine running Wireshark
Lynda.com
• See my course on Lynda.com!
• Troubleshooting your Network with Wireshark
Download