This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| network_stuff:wireshark [2022/06/10 12:53] – jotasandoku | network_stuff:wireshark [2025/07/10 21:21] (current) – jotasandoku | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| **__WIRESHARK NOTES__**\\ | **__WIRESHARK NOTES__**\\ | ||
| - | [[https://softbackbone.duckdns.org/ | + | [[https://panda314159.net/ |
| - | ssh root@router tcpdump -i eth0 -U -s0 -w - 'not port 22' | wireshark | + | |
| + | This is to caprutue and show in wireshark live traffic. Running on a linux based router | ||
| + | | ||
| tcpdump -nni any -U -s0 'port 22 and not host 10.33.3.6' | tcpdump -nni any -U -s0 'port 22 and not host 10.33.3.6' | ||
| - | Before jumping to the pcap, have a look at these linux commands: \\ | + | Before jumping to the pcap, have a look at these linux commands |
| + | \\ | ||
| ss -s | ss -s | ||
| netstat -s | netstat -s | ||
| Line 23: | Line 26: | ||
| Edit -> Preferences -> Name Resolution -> Resolve MAC addresses) | Edit -> Preferences -> Name Resolution -> Resolve MAC addresses) | ||
| Preference> | Preference> | ||
| - | Ctrl-Shift-A | + | Ctrl-Shift-A |
| Line 32: | Line 35: | ||
| __Analyse__\\ | __Analyse__\\ | ||
| - | FIRST THING determine in which end of the conversation we are capturing the packets << | + | FIRST THING determine in which end of the conversation we are capturing the packets << |
| \\ | \\ | ||
| Line 46: | Line 49: | ||
| __Flow graph__: this is a good start to locate full tcp convos | __Flow graph__: this is a good start to locate full tcp convos | ||
| \\ | \\ | ||
| - | __Tcptrace graph__, long flat areas might mean end system and/or human user processing time. | + | __Tcptrace graph__: (statistics> |
| \\ | \\ | ||
| - | __Window Scaling__ (Statistics > TCP Streams > Window Scaling) | + | __Window Scaling__ (Statistics > TCP Streams > Window Scaling): It graphs bytes in flight together with rwnd. The latter must always be over the bytes in flight otherwise there' |
| \\ | \\ | ||
| {{: | {{: | ||
| Line 138: | Line 141: | ||
| dumpcap -i eth0 -b duration: | dumpcap -i eth0 -b duration: | ||
| | | ||
| + | |||
| + | ---- | ||
| + | *** DECRYPT A TLS SESSION *** | ||
| + | Several applications honor the SSLKEYLOGFILE environment variable, which allows you to log the TLS session key, and which e.g., Wireshark can read to then decrypt the TLS packets.1 To use it, simply export SSLKEYLOGFILE=/ | ||
| + | |||
| + | \\ | ||
| + | |||
| + | both Chrome and Firefox honor the SSLKEYLOGFILE environment variable, making dissecting packets nice and easy. | ||
| + | |||
| + | $ export SSLKEYLOGFILE=/ | ||
| + | $ / | ||