SlideShare a Scribd company logo
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 1
Network analysis Using Wireshark
Lesson 5:
Display Filters
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 2
• By the end of this lesson, the participant will be able to:
▫ Understand basic display filters
▫ Perform basic packet filtering
Lesson Objectives
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 3
yoram@ndi-com.com
For More lectures, Courses & Keynote Speaking
Contact Me to:
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 4
Ways to configure display filters
Simple and structured filters
Focusing on protocol and text strings
Filter macros
Case studies
The dfilters file
Lesson Content
“Wine is constant proof that God loves
us and loves to see us happy.”
Benjamin Franklin
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 5
Configure Display Filters
To open display
filters menu click
here
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 6
Another way to Use Display Filters
4. Manage
saved filters
1. Add filter
expression
3. Select from
previously used
filters
2. Apply filter
string
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 7
Another way to Use Display Filters
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 8
• Apply a filter from the packet itself:
From the Packet Itself
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 9
Ways to configure display filters
Simple and structured filters
Focusing on protocol and text strings
Filter macros
Case studies
The dfilters file
Lesson Content
“Well done is better than well said”
Benjamin Franklin
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 10
• Display filters allow you to concentrate on the packets you
are interested in while hiding the currently uninteresting
ones. They allow you to select packets by:
▫ Protocol
▫ The presence of a field
▫ The values of fields
• When using a display filter, all packets remain in the capture
file. The display filter only changes the display of the capture
file but not its content!
Details
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 11
Filter Comparison Operators
Frame.len <= 0x20
Frame.len ge 0x100
Frame.len < 1518
Frame.len > 64
Ip.src != 10.1.1.5
Ip.src == 10.1.1.5
Example
Less then or equal to<=le
Greater then or equal to>=ge
Less Than<lt
Greater than>gt
Not equal!=ne
Equal==eq
DescriptionC-LikeShortcut
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 12
• There are several types of filter fields:
▫ Unsigned/asigned integer (8-bit, 16-bit, 24-bit, 32-bit)
▫ Boolean
▫ Ethernet address (6 bytes)
▫ IPv4 address
▫ IPv6 address
Display Filter Field Types
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 13
• You can express integers in decimal, octal, or hexadecimal. The
following display filters are equivalent:
▫ Decimal:
 ip.len le 1500
▫ Octal:
 ip.len le 02734
▫ Hexadecimal:
 ip.len le 0x5DC
Unsigned/Assigned integer
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 14
• A boolean field is present in the protocol decode only if its value is
true.
▫ For example, tcp.flags.syn is present, and thus true, only if the SYN flag is
present in a TCP segment header.
• Thus the filter expression tcp.flags.syn will select only those packets
for which this flag exists, that is, TCP segments where the segment
header contains the SYN flag.
Boolean
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 15
• Separators can be a colon (:), dot (.) or dash (-) and can have one
or two bytes between separators
• Examples:
▫ eth.dst == ff:ff:ff:ff:ff:ff
▫ eth.dst == ff-ff-ff-ff-ff-ff
▫ eth.dst == ffff.ffff.ffff
Ethernet address (6 bytes)
Byte
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 16
• The common filter will be:
▫ ip.addr == 192.168.0.1
• Classless InterDomain Routing (CIDR) notation can be used to
test if an IPv4 address is in a certain subnet.
• For example, this display filter will find all packets in the 129.111
Class-B network:
▫ ip.addr == 129.111.0.0/16
IPv4 address
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 17
• IPv6 filters examples:
▫ ipv6.addr == ::1
▫ ipv6.addr == 2041:0000:130F:0000:0000:09C0:876A:130B
▫ ipv6.addr == 2053:0:130f::9c2:876a:130b
▫ ipv6.addr == ::
IPv6 address
YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY
16bitY = 0 to F
• IPv6 address structure:
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 18
Combining Expressions
not arp and not dns
eth.dst[0:3] == 0.6.29 xor
eth.src[0:3] == 0.6.29
ip.src == 10.0.0.5 or ip.src ==
192.1.1.1
ip.src == 10.0.0.5 and tcp.flags.fin
Example
Logical NOT!not
Logical XOR^^xor
Logical OR||or
Logical AND&&and
DescriptionC-LikeShortcut
Syntax: Primitive and Primitive and not primitive
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 19
• Wireshark allows you to test a field for membership in a
set of values or fields.
• After the field name, use the in operator followed by the
set items surrounded by braces {}.
▫ tcp.port in {80 443 8080}
• This can be considered a shortcut operator, as the
previous expression could have been expressed as:
▫ tcp.port == 80 || tcp.port == 443 || tcp.port == 8080
Membership Operators
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 20
Ways to configure display filters
Simple and structured filters
Focusing on protocol and text strings
Filter macros
Case studies
The dfilters file
Lesson Content
“By failing to prepare, you are preparing
to fail.”
Benjamin Franklin
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 21
• Wireshark allows you to select subsequences of a sequence in rather
elaborate ways.
• This is written by writing a parameter to check and then place a pair of
brackets [] containing a (:) or (-) separated list of range specifiers.
• [n:m] or [n-m]  ] will display the m bytes in offset n
Substring Operators
00 8300 00 D8BC
00 8300 00 D8BC
00 8300 00 D8BC
20 8320 00 D8BC
eth.src[0:3] == 00:00:83
eth.src[1:2] == 00:83
eth.src[0:4] == 00:00:83:00
eth.src[4:2] == BC:D8
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 22
Ways to configure display filters
Simple and structured filters
Focusing on protocol and text strings
Filter macros
Case studies
The dfilters file
Lesson Content
“It takes many good deeds to build a good
reputation, and only one bad one to lose it.”
Benjamin Franklin
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 23
• Display filters macros are used to create shortcuts for complex
display filters that you can configure once and use later.
Filter Macros
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 24
• In order to configure a macro, you give it a name, and you fill in
the text box with the filter string.
• In order to activate the macro, you simply write:
▫ $(macro_name:parameter1;paramater2;parameter3 …)
• Let’s configure a simple filter name test01 that takes the following
parameters as values:
▫ ip.addr == <value> and
▫ tcp.port == <value>
Filter Macros
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 25
• This will be a filter that looks for packets from specific network that
goes to http port.
• A macro that takes these two parameters would be:
▫ ip.addr==$1 && tcp. port==$2
• Now, in order to get the filter results for parameters
▫ ip.addr == 10.0.0.4 and
▫ tcp.port == 80
• We should write in the display window bar the string:
▫ ${test01:10.0.0.4;80}
Filter Macros
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 26
Ways to configure display filters
Simple and structured filters
Focusing on protocol and text strings
Filter macros
Case studies
The dfilters file
Lesson Content
“Anyone who doesn't believe in miracles is
not a realist.”
David Ben-Gurion
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 27
• Port mirror to be configured from
the laptop, to
▫ The Server port or
▫ The PC port
Example #1:
Filter Traffic Between Hosts
SDSDSD
172.16.100.111
172.16.100.12
ip.addr==172.16.100.111 and ip.addr==172.16.100.12
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 28
• Port mirror to be configured from the laptop, to
the router port
Example #2:
Filter Traffic from Specific Network
To ISP
192.168.1.0/24
192.168.1..0/24
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 29
Example #3:
Filtering ICMP
icmp
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 30
Example #4 – Filtering Mail Traffic
tcp.port == 110
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 31
Example #5 - DCERPC
DCERPC
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 32
Example #6 - Retransmissions
tcp.analysis.retransmission
1
2
3
4
3
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 33
Example #7 – Zero Window
tcp.analysis.zero_window
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 34
Ways to configure display filters
Simple and structured filters
Focusing on protocol and text strings
Filter macros
Case studies
The dfilters file
Lesson Content
Education is what remains after one has
forgotten what one has learned in school.
Albert Einstein
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 35
The dfilters File
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 36
Summary
• In this lesson we talked about:
▫ Basic display filters configuration
▫ Complex display filters and display filters macro’s
Thanks for your time
Yoram Orzach
yoram@ndi-com.com
Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 yoram@ndi-com.com
Network analysis using Wireshark V2 yoram@ndi-com.comPage 37
yoram@ndi-com.com
For More lectures, Courses & Keynote Speaking
Contact Me to:

More Related Content

PDF
Network Analysis Using Wireshark Chapter 09 ethernet and lan switching
Yoram Orzach
 
PDF
Network Analysis Using Wireshark -Chapter 6- basic statistics tools
Yoram Orzach
 
PDF
Network analysis Using Wireshark 4: Capture Filters
Yoram Orzach
 
PDF
Ch 08 -- Ethernet & LAN Switching Troubleshooting
Yoram Orzach
 
PDF
Network analysis Using Wireshark Lesson 3: locating wireshark
Yoram Orzach
 
PDF
Network Analysis Using Wireshark Chapter 08 the expert system
Yoram Orzach
 
PDF
Network Analysis Using Wireshark -10- arp and ip analysis
Yoram Orzach
 
PDF
lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017
Yoram Orzach
 
Network Analysis Using Wireshark Chapter 09 ethernet and lan switching
Yoram Orzach
 
Network Analysis Using Wireshark -Chapter 6- basic statistics tools
Yoram Orzach
 
Network analysis Using Wireshark 4: Capture Filters
Yoram Orzach
 
Ch 08 -- Ethernet & LAN Switching Troubleshooting
Yoram Orzach
 
Network analysis Using Wireshark Lesson 3: locating wireshark
Yoram Orzach
 
Network Analysis Using Wireshark Chapter 08 the expert system
Yoram Orzach
 
Network Analysis Using Wireshark -10- arp and ip analysis
Yoram Orzach
 
lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017
Yoram Orzach
 

What's hot (20)

PDF
Network Analysis Using Wireshark Jan 18- seminar
Yoram Orzach
 
PDF
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Yoram Orzach
 
PDF
Network analysis Using Wireshark Lesson 12 - bandwidth and delay issues
Yoram Orzach
 
PDF
lesson 7- Network analysis Using Wireshark - advanced statistics tools
Yoram Orzach
 
PDF
Network analysis Using Wireshark Lesson 1- introduction to network troublesho...
Yoram Orzach
 
PDF
Network Analysis Using Wireshark 1
Yoram Orzach
 
PDF
Ch 06 -- Bandwidth Delay and Jitter Issues
Yoram Orzach
 
PDF
Ch 09 -- ARP & IP Analysis
Yoram Orzach
 
PDF
Ch 07 -- The Expert System
Yoram Orzach
 
PDF
Wireshark - Basics
Yoram Orzach
 
PPT
Wireshark Inroduction Li In
mhaviv
 
PDF
3.7.10 Lab Use Wireshark to View Network Traffic
Rio Ap
 
PPTX
Wireshark
Deepika Ojha
 
PPTX
Packet analyzing with wireshark-basic of packet analyzing - Episode_01
Dhananja Kariyawasam
 
PDF
Wireshark tutorial
Piyush Mittal
 
DOC
Ecet 375 Education Specialist-snaptutorial.com
robertlesew62
 
DOC
Ecet 375 Education Redefined - snaptutorial.com
DavisMurphyC86
 
PDF
Look at ipv6 security advantages over ipv4
Alexander Decker
 
DOC
ECET 375 Invent Yourself/newtonhelp.com
lechenau125
 
PPTX
Wireshark
lakshya dubey
 
Network Analysis Using Wireshark Jan 18- seminar
Yoram Orzach
 
Network analysis Using Wireshark Lesson 11: TCP and UDP Analysis
Yoram Orzach
 
Network analysis Using Wireshark Lesson 12 - bandwidth and delay issues
Yoram Orzach
 
lesson 7- Network analysis Using Wireshark - advanced statistics tools
Yoram Orzach
 
Network analysis Using Wireshark Lesson 1- introduction to network troublesho...
Yoram Orzach
 
Network Analysis Using Wireshark 1
Yoram Orzach
 
Ch 06 -- Bandwidth Delay and Jitter Issues
Yoram Orzach
 
Ch 09 -- ARP & IP Analysis
Yoram Orzach
 
Ch 07 -- The Expert System
Yoram Orzach
 
Wireshark - Basics
Yoram Orzach
 
Wireshark Inroduction Li In
mhaviv
 
3.7.10 Lab Use Wireshark to View Network Traffic
Rio Ap
 
Wireshark
Deepika Ojha
 
Packet analyzing with wireshark-basic of packet analyzing - Episode_01
Dhananja Kariyawasam
 
Wireshark tutorial
Piyush Mittal
 
Ecet 375 Education Specialist-snaptutorial.com
robertlesew62
 
Ecet 375 Education Redefined - snaptutorial.com
DavisMurphyC86
 
Look at ipv6 security advantages over ipv4
Alexander Decker
 
ECET 375 Invent Yourself/newtonhelp.com
lechenau125
 
Wireshark
lakshya dubey
 
Ad

Similar to Network Analysis using Wireshark 5: display filters (20)

DOCX
ECET 375 Success Begins/Newtonhelp.com
ledlang1
 
PDF
Ecet 375 Enhance teaching / snaptutorial.com
Davis117a
 
DOCX
ECET 375 Effective Communication/tutorialrank.com
jonhson203
 
PDF
W4 profinet frame analysis, peter thomas
PROFIBUS and PROFINET InternationaI - PI UK
 
DOCX
Ecet 375 Massive Success / snaptutorial.com
HarrisGeorgx
 
DOCX
20 questions , multiple choiceQuestion 11.Which of the fol.docx
vickeryr87
 
PDF
Unit 2.3 Introduction to Cyber Security Tools and Environment.pdf
ChatanBawankar
 
PDF
Wireshark Tool - Features & Benefits.pdf
DataSpace Academy
 
PDF
W4 profinet frame analysis handout, peter thomas
PROFIBUS and PROFINET InternationaI - PI UK
 
PPTX
ietf115-network-telemetry-data-mesh-challenges.pptx
ThomasGraf40
 
PPTX
Wireshark.pptx
SalmanKhan222894
 
PDF
wireshark.pdf
ssuserafc27c
 
PPTX
network engi بحث جميل للفائده القصوى ليت
ixi3gefixi
 
DOC
Ccna 3 chapter 1 v4.0 answers 2011
Dân Chơi
 
PPTX
Network Tools for Master Thesis
Phdtopiccom
 
DOCX
Question 1 Which of the following statements is true regarding Wir.docx
JUST36
 
DOCX
ECET 375 Entire Course NEW
shyamuopuop
 
PDF
26.1.7 lab snort and firewall rules
Freddy Buenaño
 
PDF
Research_Paper (3)
Naina Chaturvedi
 
DOCX
NTC 409 RANK Become Exceptional--ntc409rank.com
shanaabe69
 
ECET 375 Success Begins/Newtonhelp.com
ledlang1
 
Ecet 375 Enhance teaching / snaptutorial.com
Davis117a
 
ECET 375 Effective Communication/tutorialrank.com
jonhson203
 
W4 profinet frame analysis, peter thomas
PROFIBUS and PROFINET InternationaI - PI UK
 
Ecet 375 Massive Success / snaptutorial.com
HarrisGeorgx
 
20 questions , multiple choiceQuestion 11.Which of the fol.docx
vickeryr87
 
Unit 2.3 Introduction to Cyber Security Tools and Environment.pdf
ChatanBawankar
 
Wireshark Tool - Features & Benefits.pdf
DataSpace Academy
 
W4 profinet frame analysis handout, peter thomas
PROFIBUS and PROFINET InternationaI - PI UK
 
ietf115-network-telemetry-data-mesh-challenges.pptx
ThomasGraf40
 
Wireshark.pptx
SalmanKhan222894
 
wireshark.pdf
ssuserafc27c
 
network engi بحث جميل للفائده القصوى ليت
ixi3gefixi
 
Ccna 3 chapter 1 v4.0 answers 2011
Dân Chơi
 
Network Tools for Master Thesis
Phdtopiccom
 
Question 1 Which of the following statements is true regarding Wir.docx
JUST36
 
ECET 375 Entire Course NEW
shyamuopuop
 
26.1.7 lab snort and firewall rules
Freddy Buenaño
 
Research_Paper (3)
Naina Chaturvedi
 
NTC 409 RANK Become Exceptional--ntc409rank.com
shanaabe69
 
Ad

More from Yoram Orzach (11)

PDF
Ch 05 --- nfv basics
Yoram Orzach
 
PDF
Ch 04 --- sdn deployment models
Yoram Orzach
 
PDF
Ch 03 --- the OpenFlow protocols
Yoram Orzach
 
PDF
Ch 02 --- sdn and openflow architecture
Yoram Orzach
 
PDF
Ch 01 --- introduction to sdn-nfv
Yoram Orzach
 
PDF
Wireshark course, Ch 05: Advanced statistics tools
Yoram Orzach
 
PDF
Wireshark course, Ch 03: Capture and display filters
Yoram Orzach
 
PDF
Wireshark course, Ch 02: Introduction to wireshark
Yoram Orzach
 
PDF
Introduction To Cellular Networks
Yoram Orzach
 
PPTX
Introduction To Cellular And Wireless Networks
Yoram Orzach
 
PPT
Wireshark Basics
Yoram Orzach
 
Ch 05 --- nfv basics
Yoram Orzach
 
Ch 04 --- sdn deployment models
Yoram Orzach
 
Ch 03 --- the OpenFlow protocols
Yoram Orzach
 
Ch 02 --- sdn and openflow architecture
Yoram Orzach
 
Ch 01 --- introduction to sdn-nfv
Yoram Orzach
 
Wireshark course, Ch 05: Advanced statistics tools
Yoram Orzach
 
Wireshark course, Ch 03: Capture and display filters
Yoram Orzach
 
Wireshark course, Ch 02: Introduction to wireshark
Yoram Orzach
 
Introduction To Cellular Networks
Yoram Orzach
 
Introduction To Cellular And Wireless Networks
Yoram Orzach
 
Wireshark Basics
Yoram Orzach
 

Recently uploaded (20)

PPTX
Choosing the Right Fire System for Your Industry.pptx
Endfire Engineering
 
PDF
Best Homestay in Dehradun – Experience Comfort Like Never Before
himalayanretreat867
 
PDF
E- Commerence Website Development & Design.pdf
Zinavo Pvt Ltd
 
PDF
Dinner Conversations The Magic of Stranger Meetups Over a Meal.pdf
StepOut4
 
PDF
What Is Disorganized Attachment and Causes of it?
thepersonaldevelopme
 
PDF
AI Readiness in 2025 Are You Ahead or Falling Behind | RUBIXE
Rubixe AI-Company
 
PPTX
Certificate Attestation Process in India: A Complete Overview
Variath Legal Services
 
PDF
How Lead Generation Strategies Help NDIS Providers Grow-eZaango care partners
eZaango Care Partners
 
PDF
JPS Digital Solution Profile and Services Overview
JPS digital solution
 
PDF
Appliances Repairing Services Al maamoura (2).pdf
waleedtechnicalservi
 
PDF
Challenges of Accessing Clean Drinking Water
BikramKhutia
 
PDF
Building a Culture of Data Security in Your Organization
VRS Technologies
 
PPTX
Meals and Essentials Support by Parramatta Mission
parramattamission44
 
PPTX
Pichwai Painting A Timeless Art from Nathdwara.pptx
pichwaitraditionbeyo
 
PDF
JESSICA MAE JAGONOY MILAN PORTFOLIO 2025
jessicamaemilan1995
 
PDF
Fast Mail Transfer Between Any Two IMAP Servers
corepo6446
 
PDF
Hire Flutter App Developers – Latiyal Infotech India
Latiyalinfotech
 
PPTX
Expert digital marketing agency for online growth
webcooks Digital Academy
 
PPTX
Ensuring Pest-Free Homes Through Integrated Control Techniques.pptx
goodlifepestcontrols
 
PPTX
Use of Smart Card ,History,Types of cards and Advantages
vaghelatirth1612
 
Choosing the Right Fire System for Your Industry.pptx
Endfire Engineering
 
Best Homestay in Dehradun – Experience Comfort Like Never Before
himalayanretreat867
 
E- Commerence Website Development & Design.pdf
Zinavo Pvt Ltd
 
Dinner Conversations The Magic of Stranger Meetups Over a Meal.pdf
StepOut4
 
What Is Disorganized Attachment and Causes of it?
thepersonaldevelopme
 
AI Readiness in 2025 Are You Ahead or Falling Behind | RUBIXE
Rubixe AI-Company
 
Certificate Attestation Process in India: A Complete Overview
Variath Legal Services
 
How Lead Generation Strategies Help NDIS Providers Grow-eZaango care partners
eZaango Care Partners
 
JPS Digital Solution Profile and Services Overview
JPS digital solution
 
Appliances Repairing Services Al maamoura (2).pdf
waleedtechnicalservi
 
Challenges of Accessing Clean Drinking Water
BikramKhutia
 
Building a Culture of Data Security in Your Organization
VRS Technologies
 
Meals and Essentials Support by Parramatta Mission
parramattamission44
 
Pichwai Painting A Timeless Art from Nathdwara.pptx
pichwaitraditionbeyo
 
JESSICA MAE JAGONOY MILAN PORTFOLIO 2025
jessicamaemilan1995
 
Fast Mail Transfer Between Any Two IMAP Servers
corepo6446
 
Hire Flutter App Developers – Latiyal Infotech India
Latiyalinfotech
 
Expert digital marketing agency for online growth
webcooks Digital Academy
 
Ensuring Pest-Free Homes Through Integrated Control Techniques.pptx
goodlifepestcontrols
 
Use of Smart Card ,History,Types of cards and Advantages
vaghelatirth1612
 

Network Analysis using Wireshark 5: display filters

  • 1. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 1 Network analysis Using Wireshark Lesson 5: Display Filters
  • 2. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 2 • By the end of this lesson, the participant will be able to: ▫ Understand basic display filters ▫ Perform basic packet filtering Lesson Objectives
  • 3. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 3 [email protected] For More lectures, Courses & Keynote Speaking Contact Me to:
  • 4. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 4 Ways to configure display filters Simple and structured filters Focusing on protocol and text strings Filter macros Case studies The dfilters file Lesson Content “Wine is constant proof that God loves us and loves to see us happy.” Benjamin Franklin
  • 5. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 5 Configure Display Filters To open display filters menu click here
  • 6. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 6 Another way to Use Display Filters 4. Manage saved filters 1. Add filter expression 3. Select from previously used filters 2. Apply filter string
  • 7. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 7 Another way to Use Display Filters
  • 8. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 8 • Apply a filter from the packet itself: From the Packet Itself
  • 9. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 9 Ways to configure display filters Simple and structured filters Focusing on protocol and text strings Filter macros Case studies The dfilters file Lesson Content “Well done is better than well said” Benjamin Franklin
  • 10. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 10 • Display filters allow you to concentrate on the packets you are interested in while hiding the currently uninteresting ones. They allow you to select packets by: ▫ Protocol ▫ The presence of a field ▫ The values of fields • When using a display filter, all packets remain in the capture file. The display filter only changes the display of the capture file but not its content! Details
  • 11. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 11 Filter Comparison Operators Frame.len <= 0x20 Frame.len ge 0x100 Frame.len < 1518 Frame.len > 64 Ip.src != 10.1.1.5 Ip.src == 10.1.1.5 Example Less then or equal to<=le Greater then or equal to>=ge Less Than<lt Greater than>gt Not equal!=ne Equal==eq DescriptionC-LikeShortcut
  • 12. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 12 • There are several types of filter fields: ▫ Unsigned/asigned integer (8-bit, 16-bit, 24-bit, 32-bit) ▫ Boolean ▫ Ethernet address (6 bytes) ▫ IPv4 address ▫ IPv6 address Display Filter Field Types
  • 13. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 13 • You can express integers in decimal, octal, or hexadecimal. The following display filters are equivalent: ▫ Decimal:  ip.len le 1500 ▫ Octal:  ip.len le 02734 ▫ Hexadecimal:  ip.len le 0x5DC Unsigned/Assigned integer
  • 14. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 14 • A boolean field is present in the protocol decode only if its value is true. ▫ For example, tcp.flags.syn is present, and thus true, only if the SYN flag is present in a TCP segment header. • Thus the filter expression tcp.flags.syn will select only those packets for which this flag exists, that is, TCP segments where the segment header contains the SYN flag. Boolean
  • 15. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 15 • Separators can be a colon (:), dot (.) or dash (-) and can have one or two bytes between separators • Examples: ▫ eth.dst == ff:ff:ff:ff:ff:ff ▫ eth.dst == ff-ff-ff-ff-ff-ff ▫ eth.dst == ffff.ffff.ffff Ethernet address (6 bytes) Byte
  • 16. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 16 • The common filter will be: ▫ ip.addr == 192.168.0.1 • Classless InterDomain Routing (CIDR) notation can be used to test if an IPv4 address is in a certain subnet. • For example, this display filter will find all packets in the 129.111 Class-B network: ▫ ip.addr == 129.111.0.0/16 IPv4 address
  • 17. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 17 • IPv6 filters examples: ▫ ipv6.addr == ::1 ▫ ipv6.addr == 2041:0000:130F:0000:0000:09C0:876A:130B ▫ ipv6.addr == 2053:0:130f::9c2:876a:130b ▫ ipv6.addr == :: IPv6 address YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY:YYYY 16bitY = 0 to F • IPv6 address structure:
  • 18. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 18 Combining Expressions not arp and not dns eth.dst[0:3] == 0.6.29 xor eth.src[0:3] == 0.6.29 ip.src == 10.0.0.5 or ip.src == 192.1.1.1 ip.src == 10.0.0.5 and tcp.flags.fin Example Logical NOT!not Logical XOR^^xor Logical OR||or Logical AND&&and DescriptionC-LikeShortcut Syntax: Primitive and Primitive and not primitive
  • 19. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 19 • Wireshark allows you to test a field for membership in a set of values or fields. • After the field name, use the in operator followed by the set items surrounded by braces {}. ▫ tcp.port in {80 443 8080} • This can be considered a shortcut operator, as the previous expression could have been expressed as: ▫ tcp.port == 80 || tcp.port == 443 || tcp.port == 8080 Membership Operators
  • 20. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 20 Ways to configure display filters Simple and structured filters Focusing on protocol and text strings Filter macros Case studies The dfilters file Lesson Content “By failing to prepare, you are preparing to fail.” Benjamin Franklin
  • 21. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 21 • Wireshark allows you to select subsequences of a sequence in rather elaborate ways. • This is written by writing a parameter to check and then place a pair of brackets [] containing a (:) or (-) separated list of range specifiers. • [n:m] or [n-m]  ] will display the m bytes in offset n Substring Operators 00 8300 00 D8BC 00 8300 00 D8BC 00 8300 00 D8BC 20 8320 00 D8BC eth.src[0:3] == 00:00:83 eth.src[1:2] == 00:83 eth.src[0:4] == 00:00:83:00 eth.src[4:2] == BC:D8
  • 22. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 22 Ways to configure display filters Simple and structured filters Focusing on protocol and text strings Filter macros Case studies The dfilters file Lesson Content “It takes many good deeds to build a good reputation, and only one bad one to lose it.” Benjamin Franklin
  • 23. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 23 • Display filters macros are used to create shortcuts for complex display filters that you can configure once and use later. Filter Macros
  • 24. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 24 • In order to configure a macro, you give it a name, and you fill in the text box with the filter string. • In order to activate the macro, you simply write: ▫ $(macro_name:parameter1;paramater2;parameter3 …) • Let’s configure a simple filter name test01 that takes the following parameters as values: ▫ ip.addr == <value> and ▫ tcp.port == <value> Filter Macros
  • 25. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 25 • This will be a filter that looks for packets from specific network that goes to http port. • A macro that takes these two parameters would be: ▫ ip.addr==$1 && tcp. port==$2 • Now, in order to get the filter results for parameters ▫ ip.addr == 10.0.0.4 and ▫ tcp.port == 80 • We should write in the display window bar the string: ▫ ${test01:10.0.0.4;80} Filter Macros
  • 26. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 26 Ways to configure display filters Simple and structured filters Focusing on protocol and text strings Filter macros Case studies The dfilters file Lesson Content “Anyone who doesn't believe in miracles is not a realist.” David Ben-Gurion
  • 27. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 27 • Port mirror to be configured from the laptop, to ▫ The Server port or ▫ The PC port Example #1: Filter Traffic Between Hosts SDSDSD 172.16.100.111 172.16.100.12 ip.addr==172.16.100.111 and ip.addr==172.16.100.12
  • 28. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 28 • Port mirror to be configured from the laptop, to the router port Example #2: Filter Traffic from Specific Network To ISP 192.168.1.0/24 192.168.1..0/24
  • 29. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 29 Example #3: Filtering ICMP icmp
  • 30. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 30 Example #4 – Filtering Mail Traffic tcp.port == 110
  • 31. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 31 Example #5 - DCERPC DCERPC
  • 32. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 32 Example #6 - Retransmissions tcp.analysis.retransmission 1 2 3 4 3
  • 33. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 33 Example #7 – Zero Window tcp.analysis.zero_window
  • 34. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 34 Ways to configure display filters Simple and structured filters Focusing on protocol and text strings Filter macros Case studies The dfilters file Lesson Content Education is what remains after one has forgotten what one has learned in school. Albert Einstein
  • 35. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 35 The dfilters File
  • 36. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 36 Summary • In this lesson we talked about: ▫ Basic display filters configuration ▫ Complex display filters and display filters macro’s Thanks for your time Yoram Orzach [email protected]
  • 37. Network Analysis Using Wireshark Version 2Network Analysis using Wireshark V.2 [email protected] Network analysis using Wireshark V2 [email protected] 37 [email protected] For More lectures, Courses & Keynote Speaking Contact Me to: