Cyber Security Enthusiast
Part time Bug Hunter
Student of Gujrat Forensic Sciences University
Network packet/protocol analyzer.
Captures network packets (Link Layer PDUs) ,Analyzes it's contens.
Multi-platform (Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and others).`
You could think of the nework packet analyzer as a measuring device used o examine what's going on inside a network cable, just like a Voltmeter is used by and electrician to examine what's going on inside the electric cable (but at a higher level, of course).
Live capture and offline analysis.
Rich VoIP analysis.
Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others.
It can only capture on networks supported by pcap.
Network security engineers: examine security problems
First version was released in 1998.
The name Wireshark was adopted in June 2006.
Quite Similar to TCPdump.
Analysis of scada system.
• Here there are four RTU (Remote Terminal Unit) which are connected to the MTU (Master Terminal Unit) of Industrial network.
• A windows RDP client (IP: 192.168.2.201/24) send the request to the windows RDP server (IP:192.168.2.101/24).
• Through the Production network (IP: 192.168.2.0/24) the requests are Transmitting from the client to server.
• Now the request is received by the server and then sent to the Data Acquisition server (IP: 192.168.2.102/24) for gaining data of the request.
• HMI (Human Machine Interface) is used for handle the industrial machines and network.
• Now the relevant data of request are goes back to the client through production network.
• If server found any intrusion from the client then the request will goes for reset to client, otherwise the client will get the output.
• There is also a firewall exist for monitoring and denying from the unauthorized access or harmful services.
• DAS (Data Acquisition Server) will also make a mirror file that is store in the Reporting and visualization server. Here, which are connected to corporate network .Firewall don’t allow any other IP's to access the Reporting and visualization server. It is just use for Security and Backup purpose.
• Scada.pcap file contains the information about the packets
• Here, An image shows different columns that contains the information related to packets . • We can show here the details such as time , source IP address of packets(Client IP) ,destination IP of packets(Server IP) ,protocols which are used for transfer the data or packets , Length of the packet(Size) and the Info: which shows communication details of the client and server • Here, first line shows the 192.168.2.187 is the client that sent the request for ack= Acknowledgement to the 192.168.2.101 server using the T.125 protocol. • Now the communication between the two IP's are running after sometime the server gets one kind of intrusion in the network.
Conversation between 192.168.2.101 & 192.168.2.187
• Here, the red line in screen shows the intrusion in the server. the red line information shows here the communication has been finished (5802> ms-wbt-server [FIN, ACK]) between the 192.168.2.187 and 192.168.2.101 IP's.
• Here, we found that the intrusion is done by port number 5802 so now we have to find the information about that port.
•Port number 5802 is an open port which is used by the TCP protocol and the Trojan and Y3KRAT services are used for the intrusion in to the network.