Source: small tank Date:
Wireshark is a very popular network packet analysis software with powerful functions. You can intercept various network packets to display the details of network packets. Wireshark users must understand the network protocol. Otherwise, Wireshark cannot be understood.
For security considerations, Wireshark can only view packets, but cannot modify the contents of the packets or send packets.
Wireshark can obtain HTTP and https, but cannot decrypt HTTPS. Therefore, Wireshark does not understand the content in HTTPS. To sum up, if it is to process HTTP, https still uses Fiddler,For other protocols such as TCP, UDP uses Wireshark.
Wireshark (network sniffer packet capture tool) v1.4.9 Chinese version (including Chinese manual + Main Interface operation menu) score: 3.5 category: Remote Monitoring size: 22 m language: Chinese
View Details> download 11115 times
Wireshark starts packet capture
Start Interface
Wireshark is a network package that captures a certain network card on the machine.When your machine has multiple NICs, You need to select one.
Click caputre-> interfaces .. The following dialog box is displayed. Select the correct Nic. Click "start" to start packet capture.
Wireshark window Introduction
Wireshark is mainly divided into these interfaces
1. Display filter, used for filtering
2. Packet List Pane (packet list): displays the captured packets, source addresses, target addresses, and port numbers. Different colors, representing
3. Packet details pane (packet details) to display the fields in the packet
4. dissector pane (hexadecimal data)
5. miscellanous (Address Bar, miscellaneous)
Filtering is very important. When Beginners use Wireshark, they will get a lot of redundant information, which is so difficult to find what they need in thousands or even tens of thousands of records. Confused.
Filters help us quickly find the information we need in a large amount of data.
There are two filters,
One is the display filter, which is the one on the main interface used to find the desired record in the captured record.
One is the capture filter, which is used to filter captured packets to avoid capturing too many records. Set in capture-> capture Filters
Save Filter
In the Filter column, fill in the filter expression and click Save to get a name. For example, "filter 102 ",
A "filter 102" button is added to the Filter column.
Filter expression rules
Expression rules
1. Protocol Filtering
For example, TCP only displays the TCP protocol.
2. IP address filtering
For example, IP. src = 192.168.1.102 indicates that the source address is 192.168.1.102,
IP. dst = 192.168.1.102, Destination Address: 192.168.1.102
3. Port Filtering
TCP. Port = 80, port 80
TCP. srcport = 80, only display the port of TCP protocol is 80.
4. http mode filtering
HTTP. Request. Method = "get", only the http get method is displayed.
5. The logical operator is and/or.
Common filter expressions
Filter expression |
Purpose |
HTTP |
View Only HTTP protocol records |
IP. src = 192.168.1.102 or IP. dst = 192.168.1.102 |
The source address or target address is 192.168.1.102. |
|
|
|
|
Packet List Pane)
The number, timestamp, source address, target address, protocol, length, and packet information are displayed on the panel of the package list. You can see that different protocols are displayed in different colors.
You can also modify the display color rules, view-> coloring rules.
Packet details pane)
This panel is the most important for us to view every field in the Protocol.
Each row information is
Frame: data frame overview of the Physical Layer
Ethernet II: Ethernet frame header information at the data link layer
Internet Protocol Version 4: Internet layer IP packet header information
Transmission Control Protocol: information about the data segment header of transport layer T, which is TCP
Hypertext Transfer Protocol: information of the application layer. This is the HTTP protocol.
Specific content of the TCP package
Each field in the TCP packet captured by Wireshark is displayed.
Now we have a preliminary understanding of wireshak.
The three-way handshake process is
I have read this picture many times. This time we used Wireshark to analyze the three handshakes.
Open Wireshark, open browser input http://www.cr173.com
Enter HTTP filtering in Wireshark, select the record of get/tankxiao HTTP/1.1, right-click and click "follow TCP stream ",
The purpose of this operation is to obtain the data packets related to opening the website in a browser.
As shown in the figure, Wireshark intercepts three data packets of three handshakes. The fourth packet is HTTP, which indicates that HTTP uses TCP to establish a connection.
First handshake packet
The client sends a TCP packet. The flag is SYN and the serial number is 0, indicating that the client requests to establish a connection. For example
The second handshake packet.
The server sends back the confirmation packet. The flag is SYN, and ACK. Sets acknowledgement number to the customer's I S N plus 1 to. 0 + 1 = 1, as shown in
Data packet for the third handshake
The client resends the ack syn flag to 0 and the ACK flag to 1. in addition, the serial number field + 1 sent from the server is placed in the confirmation field and sent to the other party. and put the ISN's + 1 in the data segment, for example:
In this way, the TCP three-way handshake is used to establish a connection.