Professional Documents
Culture Documents
Wireshark Capture
Raul Mendoza
CSOL 570
Mike Hallman
Wireshark Capture
4. Select Wireshark
5. Wireshark will start at which point you will need to select an interface to begin
packet capture.
WIRESHARK CAPTURE 3
6. Select eth0
Note: No filters have been applied, therefore, all traffic will be seen.
If we want to see specific traffic, we can apply different filters that will show only what
we want to see. In this instance, I applied a TCP filter showing only Web traffic captured on port
80 (tcp.port == 80)
WIRESHARK CAPTURE 4
In order to show encrypted traffic, I opened the Iceweasel browser and navigated to
www.navyfederal.org. Because Navy federal allows for online banking, encryption is used for
Summary
Wireshark provides administrators the ability to monitor traffic within a specific network.
As an open source tool, it has opened the door for multiple security experts to analyze packets
without having to spend a large sum of money. This tool enables Network administrators the
developers to debug protocol implementations, and provides users an effective way to learn
about protocols. Wireshark is extremely powerful and should be included in any security experts
tool bag.