This document discusses the network packet analysis tool Wireshark. It begins with an introduction to Jim Gilsinn and his background in cybersecurity and industrial control systems. It then provides an overview of Wireshark, describing it as an open-source, multi-platform network protocol analyzer that allows users to capture, interactively browse, and decode network traffic. Key features of Wireshark like its large protocol support and graphical interface are highlighted. The document concludes by discussing advanced analysis features, developing custom protocol decoders, and providing resources for more information on Wireshark.
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
Â
Network Packet Analysis with Wireshark
1. Network Packet
Analysis with Wireshark
Jim Gilsinn
National Institute of Standards & Technology
Engineering Laboratory
Standards
Certification
Education & Training
Publishing
Conferences & Exhibits
2. Jim Gilsinn - Bio
⢠Electronics Engineer with NIST/EL for over 20 years
⢠Cybersecurity for Factory Control Systems
â Co-Chair and General Editor, ISA99 Committee
â Co-Chair, ISA99 WG2, Security Program
â Co-Chair, ISA99 WG7, Safety & Security
⢠Factory Equipment Network Testing Framework
â Co-Investigator & Main Developer, FENT software
â Extension of previous IENetP project
⢠Education
â MSEE in Controls from Johns Hopkins University
â BSEE in Controls from Drexel University
2
3. What is Wireshark?
⢠The De-Factor Network Protocol Analyzer
â
â
â
â
Open-Source (GNU Public License)
Multi-platform
Easily extensible
Large development group
⢠Allows Users toâŚ
â Capture network traffic
â Interactively browse that traffic
â Decode packet protocols using dissectors
⢠Previously Named âEtherealâ
3
4. What is Wireshark?
⢠Development Version (as of last night @ 11:30pm)
â 1,300+ Protocols
â 112,600+ Protocol Header Fields
⢠Almost Every Ethernet/TCP/IP Protocol
⢠Many Industrial Ethernet Protocols
â
â
â
â
â
â
â
â
â
â
â
â
BACnet
EtherNet/IP & CIP, CIP Safety, CIP Motion
DNP 3.0
EtherCAT
Foundation Fieldbus
IEC 61850 & GOOSE
Modbus & Modbus/TCP
openSAFETY
Profinet
SERCOS III
TTEthernet
Zigbee
4
5. Network Layering
⢠Network Protocols Generally Have Some Header
â
â
â
â
Who sent the information
Who needs the information
Information about the payload
Other protocol specific information
⢠Headers Can Be Significant Part of Packet
â Ethernet/IP/UDP
â Minimum 42 Bytes of Header (65%)
â Minimum 64 Bytes Ethernet packet
â Many industrial Ethernet protocols only transmit a few bytes of data in
real-time
?? Bytes
8/20+ Bytes
20 Bytes
IP Header
Protocol
Header
UDP/TCP
Header
Data
TCP Payload
IP Payload
14 Bytes
Ethernet
Header
Ethernet Payload
5
11. Using & Interfacing With Wireshark
⢠Wireshark Strictly Uses GNU Public License
â Any derived work with Wireshark code SHALL be open-source
⢠You Can Use Wireshark Hands-Off, Though
â Network Socket Interface
â Tshark.exe
⢠Network Socket Interface
â Rudimentary control
⢠Tshark.exe
â Most features available through command-line interface
11
12. Developing Your Own Protocol Dissectors
⢠Not Every Protocol Exists in Wireshark
â When you need a protocol that doesnât exist, you can relatively
easily build your own dissector
⢠Not Every Protocol Dissector Has Full Coverage
â Open-source software allows anyone to modify the code
â Protocols generally change over time
â The original dissector developer may not exist any longer
⢠Bugs Can Exist in Dissectors
â Code almost always has bugs
12
13. For More InformationâŚ
⢠Wireshark Website
â http://www.wireshark.org
⢠Wireshark Documentation
â http://www.wireshark.org/docs/
⢠Wireshark Wiki
â http://wiki.wireshark.org
13