Episode: 1146 Title: HPR1146: Wireshark-1 Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr1146/hpr1146.mp3 Transcribed: 2025-10-17 19:46:08 --- Well, hello there. This is the fake Ken found from Hacker Public Radio. And I'd like to invite every single one of you out there to Common Join us on New Year's Eve for the Hacker Public Radio Internet Party at 24 hour blast. Common Join us details available on HackerPublicRadio.org. It will be simply grand. Hello, Hacker Public Radio. This is the new age techno hippie. And I'm bringing you another episode this time on Wireshark. I had talked to Ken a long time ago about doing this. I still don't know if I'm going to have time to go into the right detail on it. But this is going to be just an introductory episode. Hopefully, if people want to know more, they can ask questions. And then I'll sort of try and get out episodes here there about the different topics. I'm going to start out some real basic stuff, which is if you're kind of having an idea, you've seen Wireshark, you look really cool and interesting, and you can capture packets and you can look at what's going on and how things work. Really, the first level to start at is head over to Wikipedia, at least take a look at the communications protocol page. And I'll give a high level of how protocols are organized, sort of the basic rules that are people play by, how they're structured. It's a place to start. If you don't really understand what a communications protocol is, it's, you know, at the simplest level, just away from her greed method by which two parties will talk to each other. It's like saying, I say hello, and then you're obligated to say hello back to me before we can do anything else. And then after that, we can go into something and I can ask a question and you will respond with the answer. And then you ask a question and I respond with the answer. It's the structured way by which two parties communicate. You can go, you know, as far back as you want in time and people always have the piece sorts of protocols. In the computer world, one of the best known is the stuff that all the internet runs on, which is the TCP, IP, UDP, all these sorts of three-letter acronyms and letter ones, but the basic protocols that run those. And if you're going to use wireshark to capture those, you sort of need to understand what all those different protocols are. And one of the great spots that you could go to get some of that information is a website called www.protocols.com. And that's it. We'll have a list of all the different other ones, not all, but probably not all, but a lot of the different protocols that are out there and how they're structured and what they mean and what the responses are and the acknowledgments and, you know, what order packets go in and how that stuff's all structured. I mean, it's a pretty interesting site that design is, I don't know, I think a little bit lacking, but they have some links in the front page when you first go there and some general ideas of the protocols that you're going to be looking at. And I think that if we're going to start looking at wireshark, one of the first things you really need to do is understand some of the very basics. And if you're looking at something like TCP, IP, suite of protocols, it'll go into sort of and you click on the TCP IP at protocols.com. You see a general layout of how the protocols are structured, what the information is. And then what you need to do is you need to go through wireshark, capture some data on your local network, as you're sort of surfing the web or something, and then you start taking a look and you look for these different protocols of what you're doing. So you find those protocols at protocols.com, and then you take a look at those same protocols and wireshark that you're doing. Now to help you with that, obviously you need to go get wireshark from the download page. The link will be in the show notes, in case you don't already have it. If you're not on, if you're a Windows or Mac, if you're on a Linux, it's going to be in the repository or portage tree or something like that. It'll be readily available to you from where you normally get your software. Now on the wireshark org page, you know, you're going to get, there's a documentation section. So in the reshark cut to that in the show notes as well, on basically slash docs after wireshark.org. And in the center of that page is a just sort of a rundown of some videos with, you know, hands-on introduction to wireshark. And a whole little series of that somebody did there, like showing different techniques that you can use to look up certain types of data for a wireshark. And then obviously there's the complete user guide for wireshark. And that'll also be out there. There's a lot of things that you can do with wireshark. One thing to keep in mind though is that it's capturing the protocol packets and it's only able to capture stuff that the live pcap can capture. So if your computer lets you have access to the device and you can capture on that device, which is most of your ethernet cards or if you have the right types of 802-11 year, the 802-11 stuff you can capture your network traffic on that and look at the communication protocols for those or whatever other network devices that you have in your computer. It's not going to let you do protocol analysis. And when you look at the communications protocol page, you get an idea for this that it talks about stuff sort of on all levels. But it's not going to look readily. You're not normally going to use something like wireshark to be capturing protocols and looking at like USB protocols back and forth between devices. You're just looking at your network type protocols that you're getting off of your ethernet card. Now that being said, there's a lot of interesting things that you can look at for those communications protocols. So some of the things that you know I just thought about recently of doing which I wound up just chucking my GPS because I hated it. So bad rather than spending all the time, which I don't have to reverse it here, how they're working it, but some of the new TomTom GPS devices, and I've found out because I had a Garmin device, they did a two very similar thing. And I eventually might want to do that with that because I so fed up with the TomTom device that I just got rid of it. But they're using treating the device when you plug it in to the USB port. It's not showing up as a hard drive anymore. It's showing up as a network device and you communicate with that as a network device. But when you do that, you can now capture on that network port. So if you wanted to make a driver or interact on the same software level with one of these GPS devices, one of these new TomTom the VS series. And I think they said Mike Garmin, NewVee or whatever it does the same way. If you want to activate or work with one of these devices on the same level that their software did or makes software to do so, one of the things that you need to understand is how's it talking back and forth. And you can do that by using something like Wireshark to capture the network traffic between your computer and the device and look at how it's passing the data back and forth between those two devices. And there's going to be a lot of other sort of network attached appliances. And you can use Wireshark to find out more about how these network attached appliances work by using something like Wireshark. And it'll give you an idea for how they're working. So sort of just a quick introduction. And if there's more stuff that people want to know, then we can go into that. I didn't want to recover a lot of what was on the Wireshark.org website. The introduction video was about five minutes. Good place to start. There's a whole bunch of little short, you know, anywhere between, you know, one and ten minute videos going down there. And there's also some links to the sort of their conference type stuff for the Wireshark when they get together and that goes over some of the presentations and links to the presentations for how to do it. There's a lot of reading out there if you want to come up to speed on it. Now I'm not objectionable to covering some of that material in pod, you know, in this pod, it has format. But I think that the video walkthroughs that are on the site are a good place to start. If there's other stuff that needs to be done, you know, if you want to hear more about it or hear more about something in particular, then I can look at that and maybe come up with something. But until I get an idea of what exactly you would like to know, there's so many protocols out there. There's so many ways that you can use Wireshark to look at the different protocols and you can use it to look at the different protocols and so many features to Wireshark. It's a very, very, very mature program. You know, an awesome GPL tool that we have that can use to do very professional level work. I can't cover in any one podcast or even a series of podcasts. I can go on to the, you know, probably not the end of time, but for a very long time doing podcast, that for podcasts, just sort of exploring all the different protocols that are out there. So if there's a particular protocol that you know, maybe we want to take a look at and how it functions or, you know, possibly look into the, well, the why did, you know, why maybe they did that? I can, you know, offer that sort of armchair commentary on why a certain protocol might look like it does or something like that. I've done a little bit of protocol design, but mostly on a serial level, not a lot of network protocol design, just sort of, you know, saying, okay, well, here's two devices and I'm going to come up with, you know, my own serial protocol to make these two things talk that were not necessarily meant to talk or, you know, needed some way to kind of say, okay, well, let's take this hardware and I'm not using it the way that it's supposed to be used. And so I need to make it, you know, talk to this other piece of software for custom hardware software integration development that I've done in the past, you know, to create an entire system, but that's on a different level than sort of looking at these internet protocols and taking a look and saying, well, do we want to, you know, take a look at a particular protocol for the internet that's slightly different than that sort of work which I've done in the past. I've also done network troubleshooting with things like Wireshark and just sort of, well, you know, oh, why is it disworking or why am I, you know, not able to get to this server, that server with this protocol and I have a device over here and it's not making it to this other end and where do I want to put my equipment, you know, get your equipment in a spot where you can see more of the packets that are going back and forth. That's the other thing to be aware of, what Wireshark is, is that you're only going to see the packets that are that you're connected to. So your computer's only going to see the packets that it has access to based on where it is in your network. So if you connect Wireshark up and it's on the, you know, on your router behind your net, it's not going to see stuff necessarily on the other side of your net. If you're, if you're tiered off and you're blocked off on a router, you're going to see stuff that comes into your subnet, you're not going to like see stuff on the outside. So you need to make sure that the computer that has Wireshark on it is connected to the part of the network that you want to look at or has access to it. So you're just seeing what's coming into that network card or going out of that network card. You're not actually able to look at stuff elsewhere unless you sort of put your computer in between parts of the network. So if you wanted to look at different computer, you don't want to look at, it's into the traffic. You want to look at the traffic flowing from it to another part of the network and you need to position your computer in between those two, to monitor that and do capture. So you could set up your computer to do full pass routing and then stick it in the center and monitor the incoming and outgoing Ethernet cards. And as it does, it'll take a look at every packet to go again and then every packet that's coming out and you've set yourself up with a very basic network analyzer sort of setup. And I remember when I was working as a general admin and looking at servers and managing a lab that was a fun little piece of equipment to have a network analyzer like that. And this is big standalone bulky unit that had two Ethernet ports on it and a little laptop into this because you had to have this laptop with it to plug into the unit to do the network analyzer traffic. And now you have a wire shark and you can do it for free. And it's pretty cool. So I hope that you guys have an idea of where to start with the protocol stuff. I mean a lot of you guys probably already know this stuff. But for the most part, that's what it's really about. It's about understanding what your target is and kind of have a general idea of what you're getting yourself into first with a particular protocol and then taking a look at how it's functioning. The software itself wire shark is, if you watch the introduction video on wireshark.org, it's pretty, you'll get yourself rolling pretty quickly. But if there's other questions, please just submit them into the feedback through the website and or through my Gmail account. And I'll get back to you know, try and record an episode on whatever people want to hear an episode on if I can. All right. And if I can't then I'll post an episode saying that you know I completely bomb on this and maybe this is a better source of information and point you towards where I think I can find where you know we're might be able to find the information at. But in general I'm just going to sort of leave it there and have a good night. You have been listening to Hacker Public Radio at Hacker Public Radio does our We are a community podcast network that releases shows every weekday Monday through Friday. Today's show, like all our shows, was contributed by a HPR listener like yourself. If you ever consider recording a podcast then visit our website to find out how easy it really is. Hacker Public Radio was founded by the digital dark pound and the economical and computer cloud. HPR is funded by the binary revolution at binref.com. All binref projects are crowd- Exponsored by linear pages. From shared hosting to custom private clouds, go to lunarpages.com for all your hosting needs. Unless otherwise stasis, today's show is released under a creative comments, attribution, share a like, lead us our license.