wireshark Flashcards

(56 cards)

1
Q

how to find ip address both way source and destination

A

ip.addr= xx.xx.xx.xx
ip.src == xx.xx.xx.xx
ip.dst=xx.xx.xx.xx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

how to find subnet

A

ip == xx.xx.xx.0/24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what source and destination network

A

source is outgoing traffic
destination is incoming traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

how to find required port and in both ways

A

tcp.port== xx or udp.port ==xx
tcp.srcport==x or udp.srcport ==xx
tcp.dstport==x or udp.dstport==xx

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

type of Application Level Protocol Filters

A

HTTP,HTTPS,DNS,DHCP,SMTP,POP3,IMAP,SNMP,Telent,SSH,RDP,SIP,BGP,LDAP,NFS,SMB,ICMP,MQTT,Kerberos,bootp,rdp,smb or smb2,websocket

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

HTTP

A

http

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Capture HTTP Requests

A

http.request.method == “XXX”
we can use POST,GET,PUT,DELETE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Capture Specific HTTP Response Codes

A

http.response.code ==XXX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

how to find hash (sha256,sha1and etc) value of the capture file?

A

statistics->capture file proprties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

how to search for specified string in packet examples(shash)

A

edit -> find packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

how to find files within capture packet

A

file -> export objects (option : http,smp,tftp,DICOM,imf)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

apply it as a filter in Packet List Pane

A

select packet -> double click -> apply as filiter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Statistics –> Resolved Addresses

A

hosts,ports,capture file comment information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Statistic –> Conversations

A

ethernet, IPv4, IPv6, TCP and UDP.(show conversations event within capture pcap file)
Conversations focus on interactions between them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Statistics –> Endpoints

A

Ethernet, IPv4, IPv6, TCP and UDP only endpoints device traffic
Endpoints focus on single devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

statistics ->ipv4 statistics

A

all ip addressess
destinations and ports
IP protocol type
source and destinations addressess traffic info

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

statistics -> dns

A

all DNS packets from the capture file
DNS service’s overall usage, including rcode, opcode, class, query type, service and query stats

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

statistics -> http

A

packet counter (count http request,response code)
requests (request by host )
load distribution ()
request sequences

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Search a value inside packets explane with question find all apache servers

A

contains
examples :http.server contains “Apache”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Search a pattern of a regular expression. and examples Find all .php and .html pages.

A

matches
http.host matches “.(php|html)”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Search a value or field inside of a specific scope and examples :Find all packets that use ports 80, 443 or 8080.

A

in
tcp.port in {80 443 8080}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

upper and lower

A

for uppercase use upper
lowercase use lower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Convert a non-string value to a string.
Example Find all frames with odd numbers.

A

string(frame.number) matches “[13579]$”

output:
1
3
5
7
9
11
13
15

24
Q

tcp connect scan in wireshark

A

tcp.flags.syn==1 and tcp.flags.ack==0 and tcp.window_size > 1024

25
SYN Scans
tcp.flags.syn==1 and tcp.flags.ack==0 and tcp.window_size <= 1024
26
udp scan
icmp.type==3 and icmp.code==3
27
only syn flag only ack flag
tcp.flags==2(only display syn flags) tcp.flags==16(only display ack flags)
28
syn flag is set. The rest of the bits are not important. ACK flag is set. The rest of the bits are not important.
tcp.flags.syn == 1(display include flags like syn,ack.. tcp.flags.ack == 16 (display include flags like ack.rst,syn.ack..
29
Only SYN, ACK flags.
tcp.flags == 18
30
Only RST flag.
tcp.flags == 4
31
RST flag is set. The rest of the bits are not important.
tcp.flags.reset == 1 (rst.ack
32
RST and ACK are set. The rest of the bits are not important.
(tcp.flags.reset == 1) and (tcp.flags.ack == 1)
33
arp requests
arp.opcode==1
34
arp response
arp.opcode==2
35
mac address
eth.addr
36
source MAC and destination MAC address
eth.src eth.dst
37
Possible ARP flooding from detection:
((arp) && (arp.opcode == 1)) && (arp.src.hw_mac == xx:xx:xx:xx:xx:xx)
38
Possible ARP poisoning detection
arp.duplicate-address-detected
39
dhcp
dhcp or bootp help assign Ip address in network
40
dhcp request
dhcp.option.dhcp==3 contain information about hostname
41
dhcp ack
dhcp.option.dhcp==5 accepted requested to assign Ip address
42
dhcp nak
dhcp.option.dhcp==6 denied request to assign ip address
43
to find hostname in dhcp traffic
dhcp.option.hostname contains "host_name "
44
to find domain name in dhcp traffic
dhcp.option.domain_name contains "keyword"
45
ftp response code
tp.response.code ==xxx
46
Information request responses.
211: System status. 212: Directory status. 213: File status
47
x2x series: Connection messages.
220: Service ready. 227: Entering passive mode. 228: Long passive mode. 229: Extended passive mode
48
Authentication messages.
230: User login. 231: User logout. 331: Valid username. 430: Invalid username or password 530: No login, invalid password.
49
to find which use
byb using ftp.request.command== "user" we can use "USER","PASS","CWD",LIST"
50
List target username.
(ftp.response.code == 530) and (ftp.response.arg contains "username")
51
List targets for a static password.
(ftp.request.command == "PASS" ) and (ftp.request.arg == "password")
52
ftp arguments
53
to find user-agent
http.user_agent contains"chrome" chrome,namp and etc
54
how to find Hostname
http.host contains "name"
55
Connection status.
http.connection == "Keep-Alive"
56