Author Topic: Basic Forensics with Wireshark  (Read 29512 times)

0 Members and 1 Guest are viewing this topic.

Offline Daemon

  • VIP
  • Baron
  • *
  • Posts: 845
  • Cookies: 153
  • A wise man fears a gentle mans anger
    • View Profile
Re: Basic Forensics with Wireshark
« Reply #30 on: February 02, 2013, 05:31:38 am »

+1 He really is <3 u Daemon  8)

:D
I love you guys. Buttsecks skidiot?

And thanks to you too Griffon :)
« Last Edit: February 02, 2013, 05:32:47 am by Daemon »
This lifestyle is strictly DIY or GTFO - lucid

Because sexploits are for h0edays - noncetonic


Xires burns the souls of HF skids as a power supply

Offline p_2001

  • Royal Highness
  • ****
  • Posts: 684
  • Cookies: -64
    • View Profile
Re: Basic Forensics with Wireshark
« Reply #31 on: February 02, 2013, 06:15:50 am »
Ok, here is my problem.
I can see data from my computer but not from the router.
So I googled and it said that I need to mitm.
tried that but not working. Anyone help?
"Always have a plan"

Offline iTpHo3NiX

  • EZ's Pirate Captain
  • Administrator
  • Titan
  • *
  • Posts: 2920
  • Cookies: 328
    • View Profile
    • EvilZone
Re: Basic Forensics with Wireshark
« Reply #32 on: February 02, 2013, 06:21:25 am »
:D
I love you guys. Buttsecks skidiot?

And thanks to you too Griffon :)





[09:27] (+lenoch) iTpHo3NiX can even manipulate me to suck dick
[09:27] (+lenoch) oh no that's voluntary
[09:27] (+lenoch) sorry

Offline Daemon

  • VIP
  • Baron
  • *
  • Posts: 845
  • Cookies: 153
  • A wise man fears a gentle mans anger
    • View Profile
Re: Basic Forensics with Wireshark
« Reply #33 on: February 02, 2013, 06:59:10 am »
Ok, here is my problem.
I can see data from my computer but not from the router.
So I googled and it said that I need to mitm.
tried that but not working. Anyone help?
Between the router and another computer? If so then yeah, you need mitm or to run wireshark on the router itself.
This lifestyle is strictly DIY or GTFO - lucid

Because sexploits are for h0edays - noncetonic


Xires burns the souls of HF skids as a power supply

Offline Griffon Bossi

  • /dev/null
  • *
  • Posts: 15
  • Cookies: -8
    • View Profile
Re: Basic Forensics with Wireshark
« Reply #34 on: February 02, 2013, 08:02:59 am »
im just happy to get help cause other places i have been the people were not as nice/helpful. It was either you knew what you were doing or gtfo.

one more thing, it only seems like my activity is being put up onto wire shark and im in a college dorm so i know im not the only one on. any idea why it is like that and how can i change it?

Staff note: double post!
« Last Edit: February 02, 2013, 10:10:03 am by Kulverstukas »

Offline sn0w

  • Serf
  • *
  • Posts: 39
  • Cookies: 16
  • Do your best and prepare for the worst.
    • View Profile
Re: Basic Forensics with Wireshark
« Reply #35 on: February 02, 2013, 09:05:18 am »
Thanks a lot man. This tutorial is awesome. I recently started to learn  about Nmap & Wireshark. This is going to help me a lot.

Offline RedBullAddicted

  • VIP
  • Sir
  • *
  • Posts: 519
  • Cookies: 189
    • View Profile
Re: Basic Forensics with Wireshark
« Reply #36 on: February 02, 2013, 09:22:19 am »
Quote from: Griffon Bossi
one more thing, it only seems like my activity is being put up onto wire shark and im in a college dorm so i know im not the only one on. any idea why it is like that and how can i change it?

Seems like you are on a switched network which means only traffic directed to your client will be send to your machine (network card). Thats basically the difference between a hub and a switch. If you were connected to a hub you would see all traffic cause the hub just sends out the data to all connected clients. Wireless Access Points work the same way as a hub. There are some other things you are able to see cause they are send as a broadcast (directed to all clients on a subnet) which brings us to your next question.

Quote from: Griffon Bossi
on my server there are lines that are saying stuff like "hey who is xxx.xxx.xxx.xxx respond to xx.xxx.xxx.xxx" and i was wondering how to send packets like that to the router

This is a standard ARP request and a pretty good example for traffic that is send as broadcast. ARP is a layer 2 protocol and every client has a ARP table which gets dynamically updated in a specific time interval. The ARP table is used to create a IP Address - MAC binding. You can use tools like ettercap or you can script your own with python/scapy (its the most simple way) to perform ARP Protocol based attacks. This for example would be a way to capture traffic which is normally not visible for you (just a very basic explanation). If you want to learn more about ARP and the attack and the way network administrators are able to stop it please read this one (shameless plug.. lol)

http://evilzone.org/tutorials/network-securtiy-features-and-how-to-get-pass-part-1-dynamic-arp-protection/

EDIT:
lol.. I really had the feeling I am repeating what I already said and it is true. Its the third reply on the first page of that thread

Quote from: RedBullAddicted
+1 Very good... couldn't havb done it better by myself and I am using wireshark nearly everyday for my job. Nice that you mentioned that wireshark can even be used for doing good stuff like hunting network performance issues (e.g. looking for TCP Retransmissions and analyse why you have them).

Now that you have explained how people can find interessting stuff in a capture file they surely want to know how to capture stuff. I just want to add some ideas for further reading. You need to know that your capture quality depends on the point where you are capturing. For doing some analysis you should capture on both machines, the sender and the recipiant and compare your results later. Normally you will capture on your own box and for this you will only be able to see the traffic regarding your own machine (and some broadcasts like DHCP Discover and Request). Some things you can use to see a little bit more.
1. If you have access to a managed network switch you can implement a mirror port
2. Do some ARP poisoning like I have explained http://evilzone.org/tutorials/network-securtiy-features-and-how-to-get-pass-part-1-dynamic-arp-protection/
3. You can use some DHCP attacks (I am writing on a tutorial about that at the moment)
4. Use a Network Tab (google for it, they can be easily build by yourself)

Do you know the difference between a switch and a hub? Basically the switch only sends the traffic to the regarding port while a hub just sends it out to all ports. This means a hub is very nice for capturing. As I said before, an WLAN accesspoint is just working the same way as a hub.

Again... thanks for that great tutorial. You will become a great networking guy if you go on with this.

You guys should just read all posts on a thread before you start to ask questions.. lol :)
@Griffon Bossi: please edit your post and do not double post. If skidiot.h sees this he will not be amused :)

Damn.. nearly forgot it.. you guys really make me jealous. Can I join the Buttseckz Daemon, skidiot?.. we can make it a real orgy :) lol
« Last Edit: February 02, 2013, 09:54:52 am by RedBullAddicted »
Deep into that darkness peering, long I stood there, wondering, fearing, doubting, dreaming dreams no mortal ever dared to dream before. - Edgar Allan Poe

Offline iTpHo3NiX

  • EZ's Pirate Captain
  • Administrator
  • Titan
  • *
  • Posts: 2920
  • Cookies: 328
    • View Profile
    • EvilZone
Re: Basic Forensics with Wireshark
« Reply #37 on: February 02, 2013, 10:17:12 am »
Damn.. nearly forgot it.. you guys really make me jealous. Can I join the Buttseckz Daemon, skidiot?.. we can make it a real orgy :) lol








ACCEPTED
[09:27] (+lenoch) iTpHo3NiX can even manipulate me to suck dick
[09:27] (+lenoch) oh no that's voluntary
[09:27] (+lenoch) sorry