Monday, October 6, 2014
Wireshark Capture Options
Promiscuous mode:
if promiscuous mode is disabled
- Wireshark can capture traffic destined only to interface on which the capture is enabled + multicast and broadcast traffic
if promiscuous mode is enabled
- Wireshark can capture traffic from/to all MAC addresses
- prosmiscous mode does not enable WLAN adapater to capture traffic regardless of SSID
Monitor Mode:
- enables Wireshark to capture WLAN traffic regardless of SSID
- available with AirPcap Adapters
*** with the normal adapters you can capture wireless traffic but most likely the 802.11 header will be replaced with a fake Ethernet header
AirPcap Adapter
- can capture wireless traffic on Windows environment
- on monitor mode they can capture all 802.11 management control and data frames
- they add a Radiotap or PPI header in front of 802.11 header wich provides channel and signal information at the moment the packets were captures
*** if you want to capture packets on more channels you can use multiples AirPcap NICs with AirPcap aggregate driver
Wednesday, October 1, 2014
Wireshark Capture Filters
Capture filter:
-should be used if you only want to save a small portion of the packets
-uses Berkeley Packet Filter syntax
-has different format than display filter
Configuration
-in order to configure a capture filter click on Capture->Options and set the Capture Filter
*** there is also a shortcut button on the main ribbon ( 2nd from the left)
-there is a list of predefined capture filters in Capture->Capture Filters
you can used those example in order to customize your own filters
***the predefined capture filters are saved on the following folder:
C:\Documents and Settings\<Your user>\Application Data\Wireshark\cfilters
Examples:
ether host 00:00:10:00:00:01
capture only traffic from MAC displayed
ether host 00:00:10:00:00:01 and port 80
capture all http traffic form MAC displayed
port 53
capture all DNS traffic. capture all TCP and UDP traffic to/from port 53
arp
all ARP packets
tcp port 110
capture pop traffic
*** cannot use pop instead of this
udp port 67
all DHCP packets
net 10.0.0.0/24
capture traffic only from the specific network range
tcp portrange 1501-1549
capture traffic from specified port range
tcp port 23 not src host 10.0.0.1
capture all telnet traffic not from 10.0.0.1
http://wiki.wireshark.org/CaptureFilters
http://biot.com/capstats/bpf.html
Wireshark University videos
Subscribe to:
Posts (Atom)