mirror of
https://github.com/carlospolop/hacktricks
synced 2024-11-22 04:33:28 +00:00
GitBook: [master] 2 pages and 3 assets modified
This commit is contained in:
parent
ebe321964f
commit
db284cbd77
5 changed files with 40 additions and 7 deletions
BIN
.gitbook/assets/image (405).png
Normal file
BIN
.gitbook/assets/image (405).png
Normal file
Binary file not shown.
After Width: | Height: | Size: 370 KiB |
BIN
.gitbook/assets/image (406).png
Normal file
BIN
.gitbook/assets/image (406).png
Normal file
Binary file not shown.
After Width: | Height: | Size: 357 KiB |
BIN
.gitbook/assets/image (407).png
Normal file
BIN
.gitbook/assets/image (407).png
Normal file
Binary file not shown.
After Width: | Height: | Size: 357 KiB |
|
@ -20,13 +20,6 @@ capinfos capture.pcap
|
|||
|
||||
### Wireshark
|
||||
|
||||
Inside wireshark you can see different **statistics** that could be useful. Some interesting http filters: [https://www.wireshark.org/docs/dfref/h/http.html](https://www.wireshark.org/docs/dfref/h/http.html)
|
||||
|
||||
If you want to **search** for **content** inside the **packets** of the sessions press _CTRL+f_
|
||||
You can add new layers to the main information bar _\(No., Time, Source...\)_ pressing _right bottom_ and _Edit Column_
|
||||
|
||||
Practice: [https://www.malware-traffic-analysis.net/](https://www.malware-traffic-analysis.net/)
|
||||
|
||||
_**You can find more Wireshark trick in:**_
|
||||
|
||||
{% page-ref page="wireshark-tricks.md" %}
|
||||
|
|
|
@ -1,5 +1,45 @@
|
|||
# Wireshark tricks
|
||||
|
||||
## Improve your Wireshark skills
|
||||
|
||||
### Tutorials
|
||||
|
||||
The following tutorials are amazing to learn some cool basic tricks:
|
||||
|
||||
* [https://unit42.paloaltonetworks.com/unit42-customizing-wireshark-changing-column-display/](https://unit42.paloaltonetworks.com/unit42-customizing-wireshark-changing-column-display/)
|
||||
* [https://unit42.paloaltonetworks.com/using-wireshark-display-filter-expressions/](https://unit42.paloaltonetworks.com/using-wireshark-display-filter-expressions/)
|
||||
* [https://unit42.paloaltonetworks.com/using-wireshark-identifying-hosts-and-users/](https://unit42.paloaltonetworks.com/using-wireshark-identifying-hosts-and-users/)
|
||||
* [https://unit42.paloaltonetworks.com/using-wireshark-exporting-objects-from-a-pcap/](https://unit42.paloaltonetworks.com/using-wireshark-exporting-objects-from-a-pcap/)
|
||||
|
||||
### Filters
|
||||
|
||||
Here you can find wireshark filter depending on the protocol: [https://www.wireshark.org/docs/dfref/](https://www.wireshark.org/docs/dfref/)
|
||||
Other interesting filters:
|
||||
|
||||
* `(http.request or ssl.handshake.type == 1) and !(udp.port eq 1900)`
|
||||
* HTTP and initial HTTPS traffic
|
||||
* `(http.request or ssl.handshake.type == 1 or tcp.flags eq 0x0002) and !(udp.port eq 1900)`
|
||||
* HTTP and initial HTTPS traffic + TCP SYN
|
||||
* `(http.request or ssl.handshake.type == 1 or tcp.flags eq 0x0002 or dns) and !(udp.port eq 1900)`
|
||||
* HTTP and initial HTTPS traffic + TCP SYN + DNS requests
|
||||
|
||||
### Search
|
||||
|
||||
If you want to **search** for **content** inside the **packets** of the sessions press _CTRL+f_
|
||||
You can add new layers to the main information bar _\(No., Time, Source...\)_ pressing _right bottom_ and _Edit Column_
|
||||
|
||||
Practice: [https://www.malware-traffic-analysis.net/](https://www.malware-traffic-analysis.net/)
|
||||
|
||||
## Identifying Domains
|
||||
|
||||
You can add a column that show the Host HTTP header:
|
||||
|
||||
![](../../.gitbook/assets/image%20%28405%29.png)
|
||||
|
||||
And a column that add the Server name from an initiating HTTPS connection \(**ssl.handshake.type == 1**\):
|
||||
|
||||
![](../../.gitbook/assets/image%20%28406%29.png)
|
||||
|
||||
## Decrypting TLS
|
||||
|
||||
### Decrypting https traffic with server private key
|
||||
|
|
Loading…
Reference in a new issue