Skip to content

In this repo I explain how I observed different types of traffic between a Windows 10 Virtual Machine and a Linux Virtual Machine using Wireshark.

Notifications You must be signed in to change notification settings

Jeremiah-Bogard/observe-traffic-wireshark

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

25 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Observing Traffic Using Wireshark

In this repo I explain how to observed different types of traffic between a Windows 10 Virtual Machine and a Linux Virtual Machine using Wireshark.

Requirments

Getting Started

After you have set up both Virtual Machines and downloaded Wireshark on the Windows 10 VM, then remote desktop into the Windows VM.

For Mac Users

If you are on a Mac, you will need to download Microsoft Remote Desktop to connect to your Virtual Machines.

Now that you have logged in, open wireshark. Yours should look something like this:

image

As you can see there is a lot of messages spamming us in wireshark. You can think of Wireshark as a chat app. It connects us to the room and lets us see what the computer is saying along with who said it and other stuff. We can search for specific messages sent by a specific protocal by typing in the search bar. Go ahead and try it, type icmp in the search bar.

ICMP (Internet Control Message Protocol)

ICMP is a network level protocol. ICMP messages communicate information about network connectivity issues back to the source of the compromised transmission. It sends control messages such as destination network unreachable, source route failed, and source quench. It uses a data packet structure with an 8-byte header and variable-size data section1.

It should stop spamming us with messages. If there are still some you can hit the reload button that is right above the search bar. The ICMP protocol is what the ping command uses. So if we were to ping our Linux VM in wireshark we would see the message log appear in wireshark. Go ahead and try it. Get the Linux VM's private IP address and open the Command Prompt in your Windows VM. Then type ping 10.0.0.5 where 10.0.0.5 is your Linux VM's private IP address.

image

Other Traffic Examples

Here are some more examples of watching traffic through wireshark.

  1. SSH
  2. DNS
  3. DHCP

SSH

image

DNS

image

DHCP

image

Footnotes

  1. https://www.extrahop.com/resources/protocols/icmp/

About

In this repo I explain how I observed different types of traffic between a Windows 10 Virtual Machine and a Linux Virtual Machine using Wireshark.

Resources

Stars

Watchers

Forks