Skip to content

thegreatkw/WiresharkNetSec

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 

Repository files navigation

Wireshark for Network Security Analysis


Description

• Practiced troubleshooting with Wireshark, captured traffic and analyzed acquired traffic. Used display and capture filters to examine details.
• Generated, captured and analyzed RADIUS, DNS, HTTP and Telnet unencrypted traffic. Decrypted a RADIUS encrypted password.
• Generated, captured and analyzed SSH and HTTPS encrypted Traffic. Decrypted HTTPS traffic in Wireshark.

Utilities

• Wireshark

Steps

1. Used Wireshark and much of its functionalities to capture network traffic currently flowing and analyzing traffic by opening a stored pcap file.

image

2. Generated and captured RADIUS traffic. Analyzed and viewed in Wireshark. Reviewed RADIUS architecture elements and decrypted the password using Wireshark.

image

3. Reviewed the basics of HTTP and analyzed the differences between Wireshark’s filters. Connected to an HTTP server and initiated HTTP authentication. Captured the traffic in Wireshark.

4. Initiated HTTP form-based authentication and captured in Wireshark. Identified the username and password in the form POST and recognized the vulnerabilities in an HTTP form.

image

5. Started a telnet session with a remote device using Powershell and captured traffic in Wireshark. Analyzed the capture from a security perspective.

6. Opened an SSH session and captured the traffic. Compared the results to telnet. Filtered traffic based on the host and recognized different conversations that can occur within a single capture.

7. Generated and captured HTTPS traffic and decrypted the HTTPS traffic in Wireshark.

image

Releases

No releases published

Packages

No packages published