Network Analysis Using Wireshark 2 Cookbook - Second Edition
eBook - ePub

Network Analysis Using Wireshark 2 Cookbook - Second Edition

  1. 626 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Network Analysis Using Wireshark 2 Cookbook - Second Edition

Book details
Book preview
Table of contents
Citations

About This Book

Over 100 recipes to analyze and troubleshoot network problems using Wireshark 2About This Book• Place Wireshark 2 in your network and configure it for effective network analysis• Deep dive into the enhanced functionalities of Wireshark 2 and protect your network with ease• A practical guide with exciting recipes on a widely used network protocol analyzerWho This Book Is ForThis book is for security professionals, network administrators, R&D, engineering and technical support, and communications managers who are using Wireshark for network analysis and troubleshooting. It requires a basic understanding of networking concepts, but does not require specific and detailed technical knowledge of protocols or vendor implementations. What You Will Learn• Configure Wireshark 2 for effective network analysis and troubleshooting• Set up various display and capture filters• Understand networking layers, including IPv4 and IPv6 analysis• Explore performance issues in TCP/IP• Get to know about Wi-Fi testing and how to resolve problems related to wireless LANs• Get information about network phenomena, events, and errors• Locate faults in detecting security failures and breaches in networksIn DetailThis book contains practical recipes on troubleshooting a data communications network. This second version of the book focuses on Wireshark 2, which has already gained a lot of traction due to the enhanced features that it offers to users. The book expands on some of the subjects explored in the first version, including TCP performance, network security, Wireless LAN, and how to use Wireshark for cloud and virtual system monitoring. You will learn how to analyze end-to-end IPv4 and IPv6 connectivity failures for Unicast and Multicast traffic using Wireshark. It also includes Wireshark capture files so that you can practice what you've learned in the book. You will understand the normal operation of E-mail protocols and learn how to use Wireshark for basic analysis and troubleshooting. Using Wireshark, you will be able to resolve and troubleshoot common applications that are used in an enterprise network, like NetBIOS and SMB protocols. Finally, you will also be able to measure network parameters, check for network problems caused by them, and solve them effectively. By the end of this book, you'll know how to analyze traffic, find patterns of various offending traffic, and secure your network from them.Style and approachThis book consists of practical recipes on Wireshark 2 that target novices as well as intermediate Wireshark users. It goes deep into the technical issues, covers additional protocols, and many more real-live examples so that you are able to implement it in your daily life scenarios.

Frequently asked questions

Simply head over to the account section in settings and click on “Cancel Subscription” - it’s as simple as that. After you cancel, your membership will stay active for the remainder of the time you’ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlego’s features. The only differences are the price and subscription period: With the annual plan you’ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Network Analysis Using Wireshark 2 Cookbook - Second Edition by Nagendra Kumar Nainar, Yogesh Ramdoss, Yoram Orzach in PDF and/or ePUB format, as well as other popular books in Computer Science & Computer Networking. We have over one million books available in our catalogue for you to explore.

Information

Year
2018
ISBN
9781786463555
Edition
2

FTP, HTTP/1, and HTTP/2

In this chapter, we'll cover the following topics:
  • Analyzing FTP problems
  • Filtering HTTP traffic
  • Configuring HTTP preferences
  • Analyzing HTTP problems
  • Exporting HTTP objects
  • HTTP flow analysis
  • Analyzing HTTPS traffic – SSL/TLS basics

Introduction

FTP is a protocol created for transferring files over TCP/IP across a network. It is a protocol that runs over TCP ports 20 and 21 for the data and control connections respectively.
HTTP and HTTPS are both used for browsing the internet, or connecting to other software that are hosted inside your organization or in the cloud. HTTPS is used when we secure HTTP with SSL/TLS in order to protect the clear text data exchange from intrusion and hacking. It is used when connecting to your bank, mail account (for example, Gmail), or any other secured application.
Starting from 1991, HTTP has gone through different revisions, such as versions 0.9, 1.0, 1.1, and the latest, 2.0, published in 2015.
In this chapter, we will discuss these protocols, how they work, and how to use Wireshark to find common errors and problems in the network.

Analyzing FTP problems

FTP has two modes of operation:
  • Active mode (ACTV): In this mode, the client initiates a control connection to the server, and the server initiates a data connection to the client
  • Passive mode (PASV): In this mode, the client initiates both the control and data connections to the server
Both types of connections can be implemented, and they will be explained later in this recipe, in the How it works... section.

Getting ready

When working with FTP, if you suspect any connectivity or slow response problems, configure port mirror to one of the following:
  • The FTP server port
  • The client port
  • A link that the traffic crosses
If required, configure a capture or display filter.

How to do it...

To check FTP performance problems, follow these steps:
  1. First, check for any Ethernet, IP, or TCP problems as described in previous chapters. In many cases, slow responses happen due to networking problems and not necessarily due to application problems. Perform simple ICMP ping (with a larger packet size, say 1,500 bytes) between the client and server, as it helps to find if there is any delay or failures along the path.
  2. Check for TCP retransmissions and duplicate ACKs. Check whether they are on the entire traffic or only on the FTP connection:
    • If you get it on various connections, it is probably due to a slow network that influences the entire traffic
    • If you get it only on FTP connections to the same server or client, it can be due to a slow server or client
  1. When you are copying a single file in an FTP file transfer, you should get a straight line in the I/O graph and a straight gradient in the TCP stream graph (time sequence).
  2. In this screenshot, we can see what a bad FTP looks like in the TCP stream graph (time sequence):
Figure 12.1: Failing FTP—TCP stream graph
  1. In the following screenshot, we can see what it looks like in the I/O graph (configured with filters):
Figure 12.2: Failing FTP—I/O graphs
  1. In the capture file shown in the following screenshot, we can see TCP window problems. These are listed as follows:
    • The server 15.216.111.13 sends a TCP Window Full message to the client, indicating that the server send window is full (packet 5763).
    • The client 10.0.0.2 sends a TCP Zero Window message to the server, telling the server to stop sending data (packet 5778).
    • The server keeps sending TCP Zero Window Probe messages to the client, asking the client whether the condition is still zero window (this tells the server not to send any more data). The client answers these messages with TCP Zero Window Probe Ack, indicating that this is still the case (packets 5793 to 5931).
    • After a while, the client sends the message TCP Window Update to the server, telling it to start increasing the FTP throughput (packet 5939).
Figure 12.3: Failing FTP—slow client
  1. In the preceding case, it was simply a slow client. We solved the problem by working over it and deleting some unnecessary processes.
If you are facing connectivity problems, it could be due to a non-functioning server, a firewall that blocks the connection on the way, or software installed on the server or client that blocks it. In this case, go through the following steps:
  1. Was the TCP connection opened properly with the SYN/SYN-ACK/ACK packets? If not, it could be due to the following:
    • The firewall that blocks communications. Check with the system administrator.
    • The server that is not running. Check this on the server in the process table, FTP server management, and so on.
    • A software of the server blocks connectivity. It can be an antivirus that has an additional firewall that blocks con...

Table of contents

  1. Title Page
  2. Copyright and Credits
  3. Dedication
  4. Packt Upsell
  5. Contributors
  6. Preface
  7. Introduction to Wireshark Version 2
  8. Mastering Wireshark for Network Troubleshooting
  9. Using Capture Filters
  10. Using Display Filters
  11. Using Basic Statistics Tools
  12. Using Advanced Statistics Tools
  13. Using the Expert System
  14. Ethernet and LAN Switching
  15. Wireless LAN
  16. Network Layer Protocols and Operations
  17. Transport Layer Protocol Analysis
  18. FTP, HTTP/1, and HTTP/2
  19. DNS Protocol Analysis
  20. Analyzing Mail Protocols
  21. NetBIOS and SMB Protocol Analysis
  22. Analyzing Enterprise Applications' Behavior
  23. Troubleshooting SIP, Multimedia, and IP Telephony
  24. Troubleshooting Bandwidth and Delay Issues
  25. Security and Network Forensics