Dark Academy - Kali Linux Information Gathering Tools WIRESHARK

Wireshark Package Description

Wireshark is the world’s foremost network protocol analyzer. It lets you see what’s happening on your network at a microscopic level. It is the de facto (and often de jure) standard across many industries and educational institutions. Wireshark development thrives thanks to the contributions of networking experts across the globe. It is the continuation of a project that started in 1998.


Wireshark has a rich feature set which includes the following:


Deep inspection of hundreds of protocols, with more being added all the time

Live capture and offline analysis

Standard three-pane packet browser

Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others

Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility

The most powerful display filters in the industry

Rich VoIP analysis

Capture files compressed with gzip can be decompressed on the fly

Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platform)

Coloring rules can be applied to the packet list for quick, intuitive analysis

Output can be exported to XML, PostScript®, CSV, or plain text

Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2

Read/write many different capture file formats: tcpdump (libpcap), Pcap NG, Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network Monitor, Network * General Sniffer® (compressed and uncompressed), Sniffer® Pro, and NetXray®, Network Instruments Observer, NetScreen snoop, Novell LANalyzer, RADCOM WAN/LAN Analyzer, Shomiti/Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, WildPackets EtherPeek/TokenPeek/AiroPeek, and many others

Source: http://www.wireshark.org/about.html

Wireshark Homepage | Kali Wireshark Repo


Author: Gerald Combs and contributors

License: GPLv2

Tools included in the wireshark package

wireshark – network traffic analyzer

root@kali:~# wireshark -h

Wireshark 2.6.4 (Git v2.6.4 packaged as 2.6.4-1)

Interactively dump and analyze network traffic.

See https://www.wireshark.org for more information.


Usage: wireshark [options] ... [ <infile> ]


Capture interface:

  -i <interface> name or idx of interface (def: first non-loopback)

  -f <capture filter> packet filter in libpcap filter syntax

  -s <snaplen> packet snapshot length (def: appropriate maximum)

  -p don't capture in promiscuous mode

  -k start capturing immediately (def: do nothing)

  -S update packet display when new packets are captured

  -l turn on automatic scrolling while -S is in use

  -I capture in monitor mode, if available

  -B <buffer size> size of kernel buffer (def: 2MB)

  -y <link type> link layer type (def: first appropriate)

  --time-stamp-type <type> timestamp method for interface

  -D print list of interfaces and exit

  -L print list of link-layer types of iface and exit

  --list-time-stamp-types print list of timestamp types for iface and exit


Capture stop conditions:

  -c <packet count> stop after n packets (def: infinite)

  -a <autostop cond.> ... duration:NUM - stop after NUM seconds

                           filesize:NUM - stop this file after NUM KB

                              files:NUM - stop after NUM files

Capture output:

  -b <ringbuffer opt.> ... duration:NUM - switch to next file after NUM secs

                           filesize:NUM - switch to next file after NUM KB

                              files:NUM - ringbuffer: replace after NUM files

Input file:

  -r <infile> set the filename to read from (no pipes or stdin!)


Processing:

  -R <read filter> packet filter in Wireshark display filter syntax

  -n disable all name resolutions (def: all enabled)

  -N <name resolve flags> enable specific name resolution(s): "mnNtdv"

  -d <layer_type>==<selector>,<decode_as_protocol> ...

                           "Decode As", see the man page for details

                           Example: tcp.port==8888,http

  --enable-protocol <proto_name>

                           enable dissection of proto_name

  --disable-protocol <proto_name>

                           disable dissection of proto_name

  --enable-heuristic <short_name>

                           enable dissection of heuristic protocol

  --disable-heuristic <short_name>

                           disable dissection of heuristic protocol


User interface:

  -C <config profile> start with specified configuration profile

  -Y <display filter> start with the given display filter

  -g <packet number> go to specified packet number after "-r"

  -J <jump filter> jump to the first packet matching the (display)

                           filter

  -j search backwards for a matching packet after "-J"

  -m <font> set the font name used for most text

  -t a|ad|d|dd|e|r|u|ud output format of time stamps (def: r: rel. to first)

  -u s|hms output format of seconds (def: s: seconds)

  -X <key>:<value> eXtension options, see man page for details

  -z <statistics> show various statistics, see man page for details


Output:

  -w <outfile|-> set the output filename (or '-' for stdout)


Miscellaneous:

  -h display this help and exit

  -v display version info and exit

  -P <key>:<path> persconf:path - personal configuration files

                           persdata:path - personal data files

  -o <name>:<value> ... override preference or recent setting

  -K <keytab> keytab file to use for kerberos decryption

  --display=DISPLAY X display to use

  --fullscreen start Wireshark in full screen

tshark – network traffic analyzer – console version

root@kali:~# tshark -h

Running as user "root" and group "root". This could be dangerous.

tshark: Lua: Error during loading:

 /usr/share/wireshark/init.lua:32: dofile has been disabled due to running Wireshark as superuser. See https://wiki.wireshark.org/CaptureSetup/CapturePrivileges for help in running Wireshark as an unprivileged user.

TShark (Wireshark) 2.6.4 (Git v2.6.4 packaged as 2.6.4-1)

Dump and analyze network traffic.

See https://www.wireshark.org for more information.


Usage: tshark [options] ...


Capture interface:

  -i <interface> name or idx of interface (def: first non-loopback)

  -f <capture filter> packet filter in libpcap filter syntax

  -s <snaplen> packet snapshot length (def: appropriate maximum)

  -p don't capture in promiscuous mode

  -I capture in monitor mode, if available

  -B <buffer size> size of kernel buffer (def: 2MB)

  -y <link type> link layer type (def: first appropriate)

  --time-stamp-type <type> timestamp method for interface

  -D print list of interfaces and exit

  -L print list of link-layer types of iface and exit

  --list-time-stamp-types print list of timestamp types for iface and exit


Capture stop conditions:

  -c <packet count> stop after n packets (def: infinite)

  -a <autostop cond.> ... duration:NUM - stop after NUM seconds

                           filesize:NUM - stop this file after NUM KB

                              files:NUM - stop after NUM files

Capture output:

  -b <ringbuffer opt.> ... duration:NUM - switch to next file after NUM secs

                           interval:NUM - create time intervals of NUM secs

                           filesize:NUM - switch to next file after NUM KB

                              files:NUM - ringbuffer: replace after NUM files

Input file:

  -r <infile> set the filename to read from (- to read from stdin)


Processing:

  -2 perform a two-pass analysis

  -M <packet count> perform session auto reset

  -R <read filter> packet Read filter in Wireshark display filter syntax

                           (requires -2)

  -Y <display filter> packet displaY filter in Wireshark display filter

                           syntax

  -n disable all name resolutions (def: all enabled)

  -N <name resolve flags> enable specific name resolution(s): "mnNtdv"

  -d <layer_type>==<selector>,<decode_as_protocol> ...

                           "Decode As", see the man page for details

                           Example: tcp.port==8888,http

  -H <hosts file> read a list of entries from a hosts file, which will

                           then be written to a capture file. (Implies -W n)

  --enable-protocol <proto_name>

                           enable dissection of proto_name

  --disable-protocol <proto_name>

                           disable dissection of proto_name

  --enable-heuristic <short_name>

                           enable dissection of heuristic protocol

  --disable-heuristic <short_name>

                           disable dissection of heuristic protocol

Output:

  -w <outfile|-> write packets to a pcap-format file named "outfile"

                           (or to the standard output for "-")

  -C <config profile> start with specified configuration profile

  -F <output file type> set the output file type, default is pcapng

                           an empty "-F" option will list the file types

  -V add output of packet tree (Packet Details)

  -O <protocols> Only show packet details of these protocols, comma

                           separated

  -P print packet summary even when writing to a file

  -S <separator> the line separator to print between packets

  -x add output of hex and ASCII dump (Packet Bytes)

  -T pdml|ps|psml|json|jsonraw|ek|tabs|text|fields|?

                           format of text output (def: text)

  -j <protocolfilter> protocols layers filter if -T ek|pdml|json selected

                           (e.g. "ip ip.flags text", filter does not expand child

                           nodes, unless child is specified also in the filter)

  -J <protocolfilter> top level protocol filter if -T ek|pdml|json selected

                           (e.g. "http tcp", filter which expands all child nodes)

  -e <field> field to print if -Tfields selected (e.g. tcp.port,

                           _ws.col.Info)

                           this option can be repeated to print multiple fields

  -E<fieldsoption>=<value> set options for output when -Tfields selected:

     bom=y|n print a UTF-8 BOM

     header=y|n switch headers on and off

     separator=/t|/s|<char> select tab, space, printable character as separator

     occurrence=f|l|a print first, last or all occurrences of each field

     aggregator=,|/s|<char> select comma, space, printable character as

                           aggregator

     quote=d|s|n select double, single, no quotes for values

  -t a|ad|d|dd|e|r|u|ud|? output format of time stamps (def: r: rel. to first)

  -u s|hms output format of seconds (def: s: seconds)

  -l flush standard output after each packet

  -q be more quiet on stdout (e.g. when using statistics)

  -Q only log true errors to stderr (quieter than -q)

  -g enable group read access on the output file(s)

  -W n Save extra information in the file, if supported.

                           n = write network address resolution information

  -X <key>:<value> eXtension options, see the man page for details

  -U tap_name PDUs export mode, see the man page for details

  -z <statistics> various statistics, see the man page for details

  --capture-comment <comment>

                           add a capture comment to the newly created

                           output file (only for pcapng)

  --export-objects <protocol>,<destdir> save exported objects for a protocol to

                           a directory named "destdir"

  --color color output text similarly to the Wireshark GUI,

                           requires a terminal with 24-bit color support

                           Also supplies color attributes to pdml and psml formats

                           (Note that attributes are nonstandard)

  --no-duplicate-keys If -T json is specified, merge duplicate keys in an object

                           into a single key with as value a json array containing all

                           values

Miscellaneous:

  -h display this help and exit

  -v display version info and exit

  -o <name>:<value> ... override preference setting

  -K <keytab> keytab file to use for kerberos decryption

  -G [report] dump one of several available reports and exit

                           default report="fields"

                           use "-G help" for more help


Dumpcap can benefit from an enabled BPF JIT compiler if available.

You might want to enable it by executing:

 "echo 1 > /proc/sys/net/core/bpf_jit_enable"

Note that this can make your system less secure!

tshark Usage Example

root@kali:~# tshark -f "tcp port 80" -i eth0

wireshark Usage Example

root@kali:~# wireshark

wireshark


ALL NEW FOR 2020

All new 2020 update for PWK!

Penetration Testing with Kali Linux (PWK)


2X THE CONTENT

33% MORE LAB MACHINES


Earn your OSCP

Tools Categories

Tools Categories

Select Category

Recent Additions

Unicornscan

WhatWeb

APT2

SecLists

Tkiptun-ng

Packetforge-ng

Besside-ng

Wesside-ng

Easside-ng

makeivs-ng

Comments

Popular posts from this blog

How to DDOS an IP using HOIC