Contents
hide
In the âOutputâ settings section of the options setup interface, check âUse promiscuous mode on all interfacesâ for Packet type identification.
Example 6: Packet type identification filter where the source address is 192.168.1.53 or the destination address is 192.168.1.1
Wireshark Packet Capture and Common Protocol Analysis
1. Common Protocol Packets



Double click the network card and packet capture starts automatically

1.2 Introduction to Promiscuous Mode
How to Disable and Enable Promiscuous Mode

Click on âCaptureââ âOptionsâ in the program toolbar

In the âOutputâ settings section of the options setup interface, check âUse promiscuous mode on all interfacesâ for Packet type identification.

This enables it. By default, promiscuous mode is enabled.
1.3 Using the Wireshark Filter

Next, we open a browser and visit Baidu.

After visiting, click stop capture, we donât need too many packets.

There are many packets visible, but how can we find the corresponding packet type?

Example 1: Using a Filter to Screen TCP Packets
Note:

Example 2: Using a Filter to Screen ARP Packets

Example 3: Using a Filter to Screen UDP Packets

Extensions:

Example 4: Using a Filter to Screen HTTP Packets

Example 5: Using a Filter to Screen DNS Packets

Example 6: Packet type identification filter where the source address is 192.168.1.53 or the destination address is 192.168.1.1

Then modify the filter condition to:

and


2. Practical Application: Using Wireshark to Capture and Analyze Common Protocols
2.1 Common Protocol Analysis â ARP Protocol
Start capturing packets â Filter ARP

Use nmap to perform a scan based on the ARP protocol


View the contents of the Address Resolution Protocol (request) ARP request packet:


Summary:

2.2 Common Protocol Analysis â ICMP Protocol

Open a terminal

First look at the request packet content; we can see this is a Layer 4 protocol packet

Next, begin analyzing the ICMP packet: Packet type identification.
ICMP Protocol Analysis Request Packet


ICMP Protocol Analysis Reply Packet

Working Process:

2.3 Common Protocol Analysis â TCP Protocol
âFirst, clear the packets, then filter by TCP and start capturing: Packet type identificationâ



View the TCP Protocol:

Open the flag details

Analyze the second packet

Flags Information


Analyze the third packet

The three-way handshake process ends here.

Generate a chart to observe the data interaction process


Full Project Analysis As Follows:
2.4 Common Protocol Analysis â HTTP Protocol

Open a terminal and enter the following command

About curl

The 4th and the 6th are our HTTP packets

Complete Process Analysis:

3. Practical Application: WireShark Packet Capture to Solve a Server Being Blocked from the Internet
Extended Supplement:
Conduct Testing


Practical Packet Capture and Analysis

Start capturing, filter ICMP protocol
Then go back to Wireshark to view the packets


What happens if you change the TTL value to 2?

Restore system kernel parameters

Example: Detect communication quality to all nodes of xuegod.cn
