SlideShare ist ein Scribd-Unternehmen logo
Traffic Data
Analysis using
Wireshark
Fundamentles
● IP Address
● URL
● Finding IP address from URL
2
• IP Address
 An IP address is a unique identifier assigned to
each device connected to a network . They are
required for your device to access internet . It
allows devices to communicate with each other
over the internet.
• Here’s an example of an IP address :
192.155.12.1
• Example: Imagine you’re sending a letter (data
packet) to a friend’s house (server). The IP
address acts like the postal code, ensuring
your letter reaches the correct destination.
cont.…
IP address
● There are mainly two types of IP addresses: IPv4 & IPv6
● 1)IPv4 :
○ Address Size: IPv4 uses a 32-bit address, expressed in decimal
notation.
○ Example: An IPv4 address like 192.0.2.126.
○ Challenges: Despite its large address space, IPv4 addresses are running
out due to the rapid increase in networked and virtual devices.
cont.…
IP address
● 2)IPv6 :
○ Address Size: IPv6 uses a 128-bit address, providing an enormous
address space.
○ Example: An IPv6 address like
2001:0db8:85a3:0000:0000:8a2e:0370:7334.
○ Purpose: IPv6 is the recent version designed to address the limitations
of IPv4.
• URL
 A URL (Uniform Resource Locator) is the address
used to find and access a specific webpage or file
on the internet
• It starts with a protocol, like "https://" or
"http://", indicating how to access the
resource.
• Then it includes the domain name, such as
"example.com", which is like the name of the
website or server.
• It may also have additional parts like a path,
indicating the specific location of a file or page,
such as "/images/picture.jpg".
• Example :
https://pixabay.com/videos/search/flowers/
• Finding IP address from URL
Command: ping -4 www.example.com
Explanation: Use this command in the command prom
or terminal to specifically
get the IPv4 address for the domain name
"www.google.com".
“
 Introduction of Wireshark
o Wireshark is a tool that helps you to see what's
happening on your network.
o Wireshark is a packet sniffing and packet
capturing
tool .
o You can not watch what is under packet but you
can trace that which packet is transferring from
which device and in which time
Installation of
Wireshark
Cont.…..
1.Visit the Official Wireshark Website: Go to the Wireshark
Downloads page using any web browser.
Cont.…..
Choose the Stable Version for Windows: On the download page,
select the stable version suitable for Windows. You’ll find options
like:
1.Windows x64 Installer
2.Windows Arm64 Installer
3.Windows x64 Portabellas®
Cont.…..
Download and Run the Installer:
Click on the appropriate installer for your system (e.g., Windows x64
Installer).
The executable file will be saved to your default downloads location.
Run the downloaded file and follow the installation wizard.
Cont.…..
Cont.…..
Installing Wireshark on Linux can be a little different depending
on the Linux distribution.
(Part-1)
Cont.…..
Installing Wireshark on Linux can be a little different depending
on the Linux distribution.
1. ip.addr==172.26.132.151
The filter ip.addr == 172.26.132.151 captures all traffic with either a source IPv4 address or a destination IPv4
address of 172.26.132.1511. This filter is useful for narrowing down network packet analysis to only those
packets involving this specific IP address.
2. ip.src==172.26.132.151
The filter ip.src == 172.26.132.151 captures all network traffic where the source IPv4 address matches
172.26.132.1511. In other words, it isolates packets originating from this specific IP address.
3. ip.dst==172.26.132.151
The filter ip.dst == 172.26.132.151 captures all network traffic where the destination IPv4 address matches
172.26.132.1511. In other words, it isolates packets destined for this specific IP address.
4. tcp, udp,http
5 . dns.qry.name==www.example.com
The filter dns.qry.name == www.example.com captures all DNS
packets where the query name matches www.example.com. In
other words, it isolates DNS queries specifically targeting the
domain “www.example.com.”
6 . http.response.code==200
The filter http.response.code == 200 captures all HTTP responses
with a status code of 200. In other words, it isolates successful
responses where the server has handled the request without any
errors.
7. Tcp.port==80
The filter Tcp.port == 80 captures all network traffic where the TCP
port number is 801. In other words, it isolates packets associated
with web traffic using the standard HTTP port.
8. tcp.analysis.flags
Thank you

Weitere ähnliche Inhalte

Ähnlich wie Traffic Data Analysis using Wireshark.pptx

Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
Cengage Learning
 

Ähnlich wie Traffic Data Analysis using Wireshark.pptx (20)

IP Address
IP AddressIP Address
IP Address
 
Running head network design 1 netwo
Running head network design                             1 netwoRunning head network design                             1 netwo
Running head network design 1 netwo
 
+ Network Programming.pdf
+ Network Programming.pdf+ Network Programming.pdf
+ Network Programming.pdf
 
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptxDHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
DHCP DNS P1 DHCP & Wireless Communication Methods Unicasting.pptx
 
Networking chapter VI
Networking chapter VINetworking chapter VI
Networking chapter VI
 
Unit-4 networking basics in java
Unit-4 networking basics in javaUnit-4 networking basics in java
Unit-4 networking basics in java
 
09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx09 Systems Software Programming-Network Programming.pptx
09 Systems Software Programming-Network Programming.pptx
 
RHSA_1_Chapter(11)_Resume_chaptre_11.pptx
RHSA_1_Chapter(11)_Resume_chaptre_11.pptxRHSA_1_Chapter(11)_Resume_chaptre_11.pptx
RHSA_1_Chapter(11)_Resume_chaptre_11.pptx
 
Asas Pelayaran Internet
Asas Pelayaran InternetAsas Pelayaran Internet
Asas Pelayaran Internet
 
Ccna1v3 Mod09
Ccna1v3 Mod09Ccna1v3 Mod09
Ccna1v3 Mod09
 
Unit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptxUnit 1- Network Layer and Protocols-4.pptx
Unit 1- Network Layer and Protocols-4.pptx
 
ffuyu yguyguyg.pptx
ffuyu yguyguyg.pptxffuyu yguyguyg.pptx
ffuyu yguyguyg.pptx
 
Unit05
Unit05Unit05
Unit05
 
Troubleshooting Network and Network Utilities
Troubleshooting Network and Network UtilitiesTroubleshooting Network and Network Utilities
Troubleshooting Network and Network Utilities
 
3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic3.7.10 Lab Use Wireshark to View Network Traffic
3.7.10 Lab Use Wireshark to View Network Traffic
 
Itep
ItepItep
Itep
 
Ipv4 & ipv6
Ipv4 & ipv6Ipv4 & ipv6
Ipv4 & ipv6
 
Network analysis Using Wireshark 4: Capture Filters
Network analysis Using Wireshark 4: Capture FiltersNetwork analysis Using Wireshark 4: Capture Filters
Network analysis Using Wireshark 4: Capture Filters
 
Network.pptx
Network.pptxNetwork.pptx
Network.pptx
 
Packet Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing ConferencePacket Analysis - Course Technology Computing Conference
Packet Analysis - Course Technology Computing Conference
 

Kürzlich hochgeladen

Kürzlich hochgeladen (20)

Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptx
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
Intro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджераIntro in Product Management - Коротко про професію продакт менеджера
Intro in Product Management - Коротко про професію продакт менеджера
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 

Traffic Data Analysis using Wireshark.pptx

  • 2. Fundamentles ● IP Address ● URL ● Finding IP address from URL 2
  • 3. • IP Address  An IP address is a unique identifier assigned to each device connected to a network . They are required for your device to access internet . It allows devices to communicate with each other over the internet. • Here’s an example of an IP address : 192.155.12.1 • Example: Imagine you’re sending a letter (data packet) to a friend’s house (server). The IP address acts like the postal code, ensuring your letter reaches the correct destination.
  • 4. cont.… IP address ● There are mainly two types of IP addresses: IPv4 & IPv6 ● 1)IPv4 : ○ Address Size: IPv4 uses a 32-bit address, expressed in decimal notation. ○ Example: An IPv4 address like 192.0.2.126. ○ Challenges: Despite its large address space, IPv4 addresses are running out due to the rapid increase in networked and virtual devices.
  • 5. cont.… IP address ● 2)IPv6 : ○ Address Size: IPv6 uses a 128-bit address, providing an enormous address space. ○ Example: An IPv6 address like 2001:0db8:85a3:0000:0000:8a2e:0370:7334. ○ Purpose: IPv6 is the recent version designed to address the limitations of IPv4.
  • 6. • URL  A URL (Uniform Resource Locator) is the address used to find and access a specific webpage or file on the internet • It starts with a protocol, like "https://" or "http://", indicating how to access the resource. • Then it includes the domain name, such as "example.com", which is like the name of the website or server. • It may also have additional parts like a path, indicating the specific location of a file or page, such as "/images/picture.jpg". • Example : https://pixabay.com/videos/search/flowers/
  • 7. • Finding IP address from URL Command: ping -4 www.example.com Explanation: Use this command in the command prom or terminal to specifically get the IPv4 address for the domain name "www.google.com".
  • 8. “  Introduction of Wireshark o Wireshark is a tool that helps you to see what's happening on your network. o Wireshark is a packet sniffing and packet capturing tool . o You can not watch what is under packet but you can trace that which packet is transferring from which device and in which time
  • 10. Cont.….. 1.Visit the Official Wireshark Website: Go to the Wireshark Downloads page using any web browser.
  • 11. Cont.….. Choose the Stable Version for Windows: On the download page, select the stable version suitable for Windows. You’ll find options like: 1.Windows x64 Installer 2.Windows Arm64 Installer 3.Windows x64 Portabellas®
  • 12. Cont.….. Download and Run the Installer: Click on the appropriate installer for your system (e.g., Windows x64 Installer). The executable file will be saved to your default downloads location. Run the downloaded file and follow the installation wizard.
  • 14. Cont.….. Installing Wireshark on Linux can be a little different depending on the Linux distribution. (Part-1)
  • 15. Cont.….. Installing Wireshark on Linux can be a little different depending on the Linux distribution.
  • 16. 1. ip.addr==172.26.132.151 The filter ip.addr == 172.26.132.151 captures all traffic with either a source IPv4 address or a destination IPv4 address of 172.26.132.1511. This filter is useful for narrowing down network packet analysis to only those packets involving this specific IP address.
  • 17. 2. ip.src==172.26.132.151 The filter ip.src == 172.26.132.151 captures all network traffic where the source IPv4 address matches 172.26.132.1511. In other words, it isolates packets originating from this specific IP address.
  • 18. 3. ip.dst==172.26.132.151 The filter ip.dst == 172.26.132.151 captures all network traffic where the destination IPv4 address matches 172.26.132.1511. In other words, it isolates packets destined for this specific IP address.
  • 20. 5 . dns.qry.name==www.example.com The filter dns.qry.name == www.example.com captures all DNS packets where the query name matches www.example.com. In other words, it isolates DNS queries specifically targeting the domain “www.example.com.”
  • 21. 6 . http.response.code==200 The filter http.response.code == 200 captures all HTTP responses with a status code of 200. In other words, it isolates successful responses where the server has handled the request without any errors.
  • 22. 7. Tcp.port==80 The filter Tcp.port == 80 captures all network traffic where the TCP port number is 801. In other words, it isolates packets associated with web traffic using the standard HTTP port.