Wireshark Tutorial Identifying Hosts
Wireshark Tutorial Identifying Hosts
This tutorial offers tips on how to gather that pcap data using Wireshark,
the widely used network protocol analysis tool. It assumes you understand
network traffic fundamentals and will use these pcaps of IPv4 traffic to
cover retrieval of four types of data:
Note: With Wireshark 3.0, you must use the search term dhcp instead
of bootp.
Figure 1: Filtering on DHCP traffic in Wireshark
Select one of the frames that shows DHCP Request in the info column. Go
to the frame details section and expand the line for Bootstrap Protocol
(Request) as shown in Figure 2. Expand the lines for Client
Identifier and Host Name as indicated in Figure 3. Client Identifier details
should reveal the MAC address assigned to 172.16.1[.]207, and Host
Name details should reveal a hostname.
We can easily correlate the MAC address and IP address for any frame
with 172.16.1[.]207 as shown in Figure 4.
Figure 4: Correlating the MAC address with the IP address from any frame
Figure 7: Following the TCP stream for an HTTP request in the third pcap
This TCP stream has HTTP request headers as shown in Figure 8. The
User-Agent line represents Google Chrome web browser version
72.0.3626[.]81 running on Microsoft's Windows 7 x64 operating system.
Figure 8: The User-Agent line for a Windows 7 x64 host using Google Chrome
Windows NT 5.1: Windows XP
Windows NT 6.0: Windows Vista
Windows NT 6.1: Windows 7
Windows NT 6.2: Windows 8
Windows NT 6.3: Windows 8.1
Windows NT 10.0: Windows 10
With HTTP-based web browsing traffic from a Windows host, you can
determine the operating system and browser. The same type of traffic from
Android devices can reveal the brand name and model of the device.
Figure 9: Following the TCP stream for an HTTP request in the fourth pcap
Figure 10: The User-Agent line for an Android host using Google Chrome
The User-Agent line for HTTP traffic from an iPhone or other Apple mobile
device will give you the operating system, and it will give you the type of
device. However, it will not give you a model. We can only determine if the
Apple device is an iPhone, iPad, or iPod. We cannot determine the model.
A final note about HTTP traffic and User-Agent strings: not all HTTP activity
is web browsing traffic. Some HTTP requests will not reveal a browser or
operating system. When you search through traffic to identify a host, you
might have to try several different HTTP requests before finding web
browser traffic.
Since more websites are using HTTPS, this method of host identification
can be difficult. HTTP headers and content are not visible in HTTPS traffic.
However, for those lucky enough to find HTTP web-browsing traffic during
their investigation, this method can provide more information about a host.
Domain: happycraft[.]org
o Network segment: 172.16.8.0/24 (172.16.8[.]0 - 172.16.8[.]255)
Domain controller IP: 172.16.8[.]8
Domain controller hostname: Happycraft-DC
Segment gateway: 172.16.8[.]1
Broadcast address: 172.16.8[.]255
Windows client: 172.16.8[.]201
CNameString values for hostnames always end with a $ (dollar sign), while
user account names do not. To filter on user account names, use the
following Wireshark expression to eliminate CNameString results with a
dollar sign:
Summary
Proper identification of hosts and users from network traffic is essential
when reporting malicious activity in your network. Using the methods from
this tutorial, we can better utilize Wireshark to help us identify affected
hosts and users.