All language subtitles for 13. Wireshark - Sniffing & Analysing Data

af Afrikaans
ak Akan
sq Albanian
am Amharic
ar Arabic Download
hy Armenian
az Azerbaijani
eu Basque
be Belarusian
bem Bemba
bn Bengali
bh Bihari
bs Bosnian
br Breton
bg Bulgarian
km Cambodian
ca Catalan
ceb Cebuano
chr Cherokee
ny Chichewa
zh-CN Chinese (Simplified)
zh-TW Chinese (Traditional)
co Corsican
hr Croatian
cs Czech
da Danish
nl Dutch
en English
eo Esperanto
et Estonian
ee Ewe
fo Faroese
tl Filipino
fi Finnish
fr French
fy Frisian
gaa Ga
gl Galician
ka Georgian
de German
el Greek
gn Guarani
gu Gujarati
ht Haitian Creole
ha Hausa
haw Hawaiian
iw Hebrew
hi Hindi
hmn Hmong
hu Hungarian
is Icelandic
ig Igbo
id Indonesian
ia Interlingua
ga Irish
it Italian
ja Japanese
jw Javanese
kn Kannada
kk Kazakh
rw Kinyarwanda
rn Kirundi
kg Kongo
ko Korean
kri Krio (Sierra Leone)
ku Kurdish
ckb Kurdish (Soranî)
ky Kyrgyz
lo Laothian
la Latin
lv Latvian
ln Lingala
lt Lithuanian
loz Lozi
lg Luganda
ach Luo
lb Luxembourgish
mk Macedonian
mg Malagasy
ms Malay
ml Malayalam
mt Maltese
mi Maori
mr Marathi
mfe Mauritian Creole
mo Moldavian
mn Mongolian
my Myanmar (Burmese)
sr-ME Montenegrin
ne Nepali
pcm Nigerian Pidgin
nso Northern Sotho
no Norwegian
nn Norwegian (Nynorsk)
oc Occitan
or Oriya
om Oromo
ps Pashto
fa Persian
pl Polish
pt-BR Portuguese (Brazil)
pt Portuguese (Portugal)
pa Punjabi
qu Quechua
ro Romanian
rm Romansh
nyn Runyakitara
ru Russian
sm Samoan
gd Scots Gaelic
sr Serbian
sh Serbo-Croatian
st Sesotho
tn Setswana
crs Seychellois Creole
sn Shona
sd Sindhi
si Sinhalese
sk Slovak
sl Slovenian
so Somali
es Spanish
es-419 Spanish (Latin American)
su Sundanese
sw Swahili
sv Swedish
tg Tajik
ta Tamil
tt Tatar
te Telugu
th Thai
ti Tigrinya
to Tonga
lua Tshiluba
tum Tumbuka
tr Turkish
tk Turkmen
tw Twi
ug Uighur
uk Ukrainian
ur Urdu
uz Uzbek
vi Vietnamese
cy Welsh
wo Wolof
xh Xhosa
yi Yiddish
yo Yoruba
zu Zulu
Would you like to inspect the original subtitles? These are the user uploaded subtitles that are being translated: 1 1 00:00:00,803 --> 00:00:01,890 In the previous video 2 2 00:00:01,890 --> 00:00:04,270 we seen how we can launch Wireshark 3 3 00:00:04,270 --> 00:00:06,566 and we said that we can actually just open 4 4 00:00:06,566 --> 00:00:09,980 a file that contains packets that we already captured 5 5 00:00:09,980 --> 00:00:13,210 and we can start analyzing them using Wireshark. 6 6 00:00:13,210 --> 00:00:15,222 In this video I want to start sniffing packets 7 7 00:00:15,222 --> 00:00:16,960 and then generate some traffic 8 8 00:00:16,960 --> 00:00:18,130 in my Windows machine 9 9 00:00:18,130 --> 00:00:18,963 and then we'll see how 10 10 00:00:18,963 --> 00:00:22,040 we can analyze these packets using Wireshark. 11 11 00:00:22,040 --> 00:00:24,460 So I'm already the man in the middle 12 12 00:00:24,460 --> 00:00:25,760 as I've said you first have to be the 13 13 00:00:25,760 --> 00:00:27,690 man in the middle to use Wireshark 14 14 00:00:27,690 --> 00:00:30,430 and then the traffic that's generated 15 15 00:00:30,430 --> 00:00:31,930 in the Windows machine is actually 16 16 00:00:31,930 --> 00:00:35,320 filmed through eth0 as we seen in the previous video. 17 17 00:00:35,320 --> 00:00:37,970 So before I start capturing the packets, 18 18 00:00:37,970 --> 00:00:39,730 I wanna go to the options 19 19 00:00:39,730 --> 00:00:43,070 and I just wanna show you what options we can set. 20 20 00:00:43,070 --> 00:00:44,760 So first you can see all the interfaces 21 21 00:00:44,760 --> 00:00:47,770 that you have and you can see the traffic generated on them. 22 22 00:00:47,770 --> 00:00:50,680 And you can see eth0 is actually generating 23 23 00:00:50,680 --> 00:00:52,110 some traffic every now and then 24 24 00:00:52,110 --> 00:00:55,290 because it's actually coming from the Windows machine. 25 25 00:00:55,290 --> 00:00:56,990 So in here you can select the interfaces 26 26 00:00:56,990 --> 00:00:59,660 that you want to start capturing on 27 27 00:00:59,660 --> 00:01:01,908 and you can actually select more than one interface 28 28 00:01:01,908 --> 00:01:05,080 and all we have to do is just hold the control 29 29 00:01:05,080 --> 00:01:07,200 and then click other interfaces 30 30 00:01:07,200 --> 00:01:08,290 that you want to listen on. 31 31 00:01:08,290 --> 00:01:11,110 For example, we can just click them like this. 32 32 00:01:11,110 --> 00:01:14,533 But for now I actually only wanna sniff on eth0. 33 33 00:01:16,430 --> 00:01:18,680 Now if we go on the output 34 34 00:01:18,680 --> 00:01:21,190 you'll see that you have an option to store 35 35 00:01:21,190 --> 00:01:22,440 these packets somewhere 36 36 00:01:22,440 --> 00:01:24,970 so again if you only want to sniff 37 37 00:01:24,970 --> 00:01:26,670 and you don't want to analyze things 38 38 00:01:26,670 --> 00:01:28,670 then you can just go onto browse 39 39 00:01:28,670 --> 00:01:30,250 and you can store the packets 40 40 00:01:30,250 --> 00:01:31,770 that you're gonna sniff somewhere 41 41 00:01:31,770 --> 00:01:34,220 and then you can analyze them whenever you have the time. 42 42 00:01:34,220 --> 00:01:35,660 At a different time you can just open 43 43 00:01:35,660 --> 00:01:37,180 them with Wireshark like I showed you 44 44 00:01:37,180 --> 00:01:38,060 in the previous video, 45 45 00:01:38,060 --> 00:01:39,770 you can just go on file, open 46 46 00:01:39,770 --> 00:01:42,553 and then open the packets and start analyzing them. 47 47 00:01:44,490 --> 00:01:46,730 Now I have eth0 selected 48 48 00:01:46,730 --> 00:01:48,493 and I'm just gonna click on start. 49 49 00:01:50,220 --> 00:01:52,830 And that will start capturing packets. 50 50 00:01:52,830 --> 00:01:54,656 Anything that's gonna flow through eth0 51 51 00:01:54,656 --> 00:01:58,170 will be captured and it will be displayed in here, anything. 52 52 00:01:58,170 --> 00:02:02,110 I mean images, pictures, messages, cookies, 53 53 00:02:02,110 --> 00:02:04,800 anything that that computer does on the internet 54 54 00:02:04,800 --> 00:02:07,078 will flow through eth0 and therefore 55 55 00:02:07,078 --> 00:02:09,500 will be captured by Wireshark. 56 56 00:02:09,500 --> 00:02:11,220 So it's not like man in the middle life 57 57 00:02:11,220 --> 00:02:13,100 where it was only showing us the important 58 58 00:02:13,100 --> 00:02:15,990 information right here you'll see anything, 59 59 00:02:15,990 --> 00:02:17,713 all the traffic that's generated. 60 60 00:02:19,090 --> 00:02:21,270 Now, I wanna go and generate some traffic 61 61 00:02:21,270 --> 00:02:24,476 on the target computer so we can analyze it here 62 62 00:02:24,476 --> 00:02:25,910 but before I do that 63 63 00:02:25,910 --> 00:02:28,510 I'm gonna go back to buttercup 64 64 00:02:29,940 --> 00:02:32,840 and I wanna see my hsts caplet 65 65 00:02:32,840 --> 00:02:36,310 so I can downgrade https to http 66 66 00:02:36,310 --> 00:02:38,820 'cause if everything goes over http 67 67 00:02:38,820 --> 00:02:41,830 we won't be able to see or read anything 68 68 00:02:41,830 --> 00:02:42,840 because like I said, 69 69 00:02:42,840 --> 00:02:45,160 everything will be encrypted. 70 70 00:02:45,160 --> 00:02:46,510 So I'm gonna hit enter 71 71 00:02:46,510 --> 00:02:48,430 this will work as expected, 72 72 00:02:48,430 --> 00:02:50,170 we'll go back to Wireshark 73 73 00:02:50,170 --> 00:02:53,220 and let's go to the target computer. 74 74 00:02:53,220 --> 00:02:55,720 I'm gonna go to google.ie 75 75 00:02:57,280 --> 00:02:58,710 and let's search for something 76 76 00:02:58,710 --> 00:03:01,490 so for example let's search for zSecurity 77 77 00:03:04,068 --> 00:03:06,006 and keep in mind everything is loading 78 78 00:03:06,006 --> 00:03:09,798 over http in here so that's why we'll be able to read 79 79 00:03:09,798 --> 00:03:13,403 and analyze everything that we're loading right here. 80 80 00:03:14,360 --> 00:03:16,141 Now, let's go back to Wireshark 81 81 00:03:16,141 --> 00:03:19,550 and see how we can filter this information 82 82 00:03:19,550 --> 00:03:21,400 and discover the websites visit 83 83 00:03:21,400 --> 00:03:24,503 by the target, see the requests, and all that. 84 84 00:03:25,390 --> 00:03:28,043 So I'm gonna click on the stop button to stop this. 85 85 00:03:29,890 --> 00:03:32,920 Now this is the main interface of Wireshark 86 86 00:03:32,920 --> 00:03:35,080 and you can see that the first thing we have 87 87 00:03:35,080 --> 00:03:38,453 is each one record of this is a packet. 88 88 00:03:39,560 --> 00:03:41,410 Now you'll see here the columns, 89 89 00:03:41,410 --> 00:03:44,210 first of all here is the number of the packets 90 90 00:03:44,210 --> 00:03:46,100 so you have this one is number one, 91 91 00:03:46,100 --> 00:03:48,150 number two, number three and number four. 92 92 00:03:49,000 --> 00:03:50,140 And the time, 93 93 00:03:50,140 --> 00:03:53,070 you'll see the time when this packet was captured 94 94 00:03:53,070 --> 00:03:55,960 so zero is when we first started sniffing 95 95 00:03:55,960 --> 00:03:58,963 and then the time increases as we go down 96 96 00:03:58,963 --> 00:04:01,890 and it shows when these packets were captured, 97 97 00:04:01,890 --> 00:04:03,660 when they were sent basically. 98 98 00:04:03,660 --> 00:04:05,440 You can also see the source, 99 99 00:04:05,440 --> 00:04:08,840 so this is the device that the packet was sent from 100 100 00:04:08,840 --> 00:04:11,000 and you can see that this one is not sent 101 101 00:04:11,000 --> 00:04:13,630 from our target it's actually coming from the internet 102 102 00:04:13,630 --> 00:04:15,900 from a server that has this IP 103 103 00:04:15,900 --> 00:04:18,411 and it's going to our target computer 104 104 00:04:18,411 --> 00:04:21,640 which is 10.20.14.206. 105 105 00:04:21,640 --> 00:04:24,920 You can see the protocol so it's TCP for this one. 106 106 00:04:24,920 --> 00:04:27,590 You can see that it's ICMP in this one 107 107 00:04:27,590 --> 00:04:29,893 and you can see that it's ARP for this. 108 108 00:04:29,893 --> 00:04:32,051 You can see the length which is the size 109 109 00:04:32,051 --> 00:04:35,763 and you can also see info about this packet. 110 110 00:04:37,250 --> 00:04:38,480 Now we can also notice that 111 111 00:04:38,480 --> 00:04:40,590 these packets have different colors. 112 112 00:04:40,590 --> 00:04:43,380 Usually green is TCP packets, 113 113 00:04:43,380 --> 00:04:45,540 dark blue is DNS packets, 114 114 00:04:45,540 --> 00:04:48,880 and if we go down we should actually be able to find 115 115 00:04:48,880 --> 00:04:52,353 some of them and you can see all of these are DNF packets. 116 116 00:04:53,680 --> 00:04:55,377 Light blue usually is UDP 117 117 00:04:55,377 --> 00:04:58,690 but we don't have any UDP packets at the moment. 118 118 00:04:58,690 --> 00:05:01,550 And you can also see we have some black packets 119 119 00:05:01,550 --> 00:05:03,540 and these are TCP packets that 120 120 00:05:03,540 --> 00:05:05,263 had a problem, that had issues. 121 121 00:05:06,460 --> 00:05:07,970 Now I know what you're thinking, 122 122 00:05:07,970 --> 00:05:10,700 there are so many packets in here 123 123 00:05:10,700 --> 00:05:13,770 and a lot of them might not be useful to you 124 124 00:05:13,770 --> 00:05:16,520 depending on what you're trying to get. 125 125 00:05:16,520 --> 00:05:18,230 But don't worry about this, 126 126 00:05:18,230 --> 00:05:20,080 in the next lecture I'm gonna show you 127 127 00:05:20,080 --> 00:05:23,190 how to filter these packets to only display 128 128 00:05:23,190 --> 00:05:26,480 the relevant ones and then analyze them 129 129 00:05:26,480 --> 00:05:28,993 to extract the useful information. 10967

Can't find what you're looking for?
Get subtitles in any language from opensubtitles.com, and translate them here.