Reading directory
- Wireshark Introduction
- Wireshark cannot do
- Wireshark vs fiddler
- Other similar tools
- Who will use Wireshark?
- Wireshark starts packet capture
- Wireshark window Introduction
- Wireshark display Filtering
- Save Filter
- Filter expression
- Packet List Pane)
- Packet details pane)
- Wireshark and corresponding OSI Layer-7 Model
- Specific content of the TCP package
- Instance analysis TCP three-way handshake process
Wireshark Introduction
Wireshark official download site: http://www.wireshark.org/
Wireshark is a very popular network packet analysis software with powerful functions. You can intercept various network packets to display the details of network packets.
Wireshark is an open-source software that can be safely used. It can run on Windows and Mac OS.
Wireshark users must understand the network protocol. Otherwise, Wireshark cannot be understood.
Wireshark cannot do
For security considerations, Wireshark can only view packets, but cannot modify the contents of the packets or send packets.
Wireshark vs fiddler
Fiddler is a program running on Windows. It is specially used to capture HTTP and HTTPS.
Wireshark can obtain HTTP and https, but cannot decrypt https, so Wireshark cannot understand the content in https
To sum up, if HTTP and HTTPS are processed, or Fiddler is used, other protocols such as TCP and UDP use Wireshark.
Other similar tools
Microsoft Network Monitor
Sniffer
Who will use Wireshark?
1. The network administrator will use Wireshark to check network problems
2. Software Testing engineers use Wireshark to capture packets and analyze the software they test.
3. engineers engaged in socket programming will use Wireshark for debugging
4. I heard that most engineers of Huawei and ZTE will use Wireshark.
In short, Wireshark may be used for network-related things.
Wireshark starts packet capture
Start Interface
Wireshark is a network package that captures a certain network card on the machine. When there are multiple network cards on your machine, you need to select a network card.
Click caputre-> interfaces .. The following dialog box is displayed. Select the correct Nic. Click "start" to start packet capture.
Wireshark window Introduction
Wireshark is mainly divided into these interfaces
1. Display filter, used for filtering
2. Packet List Pane (packet list): displays the captured packets, source addresses, target addresses, and port numbers. Different colors, representing
3. Packet details pane (packet details) to display the fields in the packet
4. dissector pane (hexadecimal data)
5. miscellanous (Address Bar, miscellaneous)
Wireshark display Filtering
Filtering is very important. When Beginners use Wireshark, they will get a lot of redundant information, which is so difficult to find what they need in thousands or even tens of thousands of records. Confused.
Filters help us quickly find the information we need in a large amount of data.
There are two filters,
One is the display filter, which is the one on the main interface used to find the desired record in the captured record.
One is the capture filter, which is used to filter captured packets to avoid capturing too many records. Set in capture-> capture Filters
Save Filter
In the Filter column, fill in the filter expression and click Save to get a name. For example, "filter 102 ",
A "filter 102" button is added to the Filter column.
Filter expression rules
Expression rules
1. Protocol Filtering
For example, TCP only displays the TCP protocol.
2. IP address filtering
For example, IP. src = 192.168.1.102 indicates that the source address is 192.168.1.102,
IP. dst = 192.168.1.102, Destination Address: 192.168.1.102
3. Port Filtering
TCP. Port = 80, port 80
TCP. srcport = 80, only display the port of TCP protocol is 80.
4. http mode filtering
HTTP. Request. Method = "get", only the http get method is displayed.
5. The logical operator is and/or.
Common filter expressions
Filter expression |
Purpose |
HTTP |
View Only HTTP protocol records |
IP. src = 192.168.1.102 or IP. dst = 192.168.1.102 |
The source address or target address is 192.168.1.102. |
|
|
|
|
Packet List Pane)
The number, timestamp, source address, target address, protocol, length, and packet information are displayed on the panel of the package list. You can see that different protocols are displayed in different colors.
You can also modify the display color rules, view-> coloring rules.
Packet details pane)
This panel is the most important for us to view every field in the Protocol.
Each row information is
Frame: data frame overview of the Physical Layer
Ethernet II: Ethernet frame header information at the data link layer
Internet Protocol Version 4: Internet layer IP packet header information
Transmission Control Protocol: information about the data segment header of transport layer T, which is TCP
Hypertext Transfer Protocol: information of the application layer. This is the HTTP protocol.
Wireshark and corresponding OSI Layer-7 Model
Specific content of the TCP package
Each field in the TCP packet captured by Wireshark is displayed.
Instance analysis TCP three-way handshake process
Now we have a preliminary understanding of wireshak.
The three-way handshake process is
I have read this picture many times. This time we used Wireshark to analyze the three handshakes.
Open Wireshark, open browser input http://www.cnblogs.com/tankxiao
Enter HTTP filtering in Wireshark, select the record of get/tankxiao HTTP/1.1, right-click and click "follow TCP stream ",
The purpose of this operation is to obtain the data packets related to opening the website in a browser.
As shown in the figure, Wireshark intercepts three data packets of three handshakes. The fourth packet is HTTP, which indicates that HTTP uses TCP to establish a connection.
First handshake packet
The client sends a TCP packet. The flag is SYN and the serial number is 0, indicating that the client requests to establish a connection. For example
The second handshake packet.
The server sends back the confirmation packet. The flag is SYN, and ACK. Sets acknowledgement number to the customer's I S N plus 1 to. 0 + 1 = 1, as shown in
Data packet for the third handshake
The client resends the ack syn flag to 0 and the ACK flag to 1. in addition, the serial number field + 1 sent from the server is placed in the confirmation field and sent to the other party. and put the ISN's + 1 in the data segment, for example:
In this way, the TCP three-way handshake is used to establish a connection.
If you have read this blog and want to learn more, click[Recommended]
If you want to repost this blog,Please specify the source
If you have any comments or suggestions for this article, please leave a message.
Thank you for reading this article. Please follow up on my blog
Wireshark network packet capture tool