Exploring Wireshark
Wireshark is an extremely popular tool in the world of IT, especially within networking and cybersecurity. Simply put, Wireshark is a network protocol analyzer that highlights its features, such as deep inspection for live capture and offline analysis, multi-platform compatibility, and support for various packet file formats like Tcpdump, PCAP, and Cisco Secure IDS iplog. Originally developed in 1998 by Gerald Combs, Wireshark has since been supported by many network experts, with a long list of contributors available on the Wireshark website.
Wireshark is an immensely powerful tool and can certainly be used for extensive reconnaissance practices within hacking, as we will see shortly. Fortunately, most of its utilization is only available within a certain subnet it is scanning, and the host system is authorized to be on. This highlights the importance of very secure NAC (Network Access Controls) practices. Now, let's get into using Wireshark on my home network!
There are many different functionalities found in Wireshark. So much so that Wireshark offers courses on how to use its product in the most efficient way, but the real bread and butter comes from the line-by-line packet analysis. Here, Wireshark captures segments of traffic it finds within a certain interval of time. We can see all the different protocols and broadcasts going over at any given moment. Within this line-by-line terminal, Wireshark will highlight certain packet captures of particular interest, such as ARP requests and session initialization, as we will see shortly.
First and foremost, let's discuss ARP requests.
ARP is essentially a table of MAC addresses your computer keeps of all the devices within your subnet. If your computer is going to use lower levels of the OSI model for communication, it will generally use MAC addresses instead of IP addresses. This makes for a more seamless communication method. Instead of always having to go through routers (which forward traffic based on IP), communication can go through switches (which forward traffic based on MAC addresses) or hubs if you are feeling old school. One device will send out a broadcast asking “Who is this IP?”, and that device with that IP address will respond “I am, here is my MAC address”. The original device will then store that MAC address under what is known as the ARP table, which can be easily found within Windows using the command "arp -a"
.
Now, within my packet capture using Wireshark, I have found an ARP request noted here.

This may not make a whole lot of sense, so to get a better idea of what is going on, I decided to run the ipconfig command within CMD in Windows to discover my own IP address and the address of my default gateway (in this case, an Xfinity one). Here are the results:

To make things a little simpler, I will generally only be referring to IPv4 addresses. Here we see my IP address as 10.0.0.227 and my default gateway address as 10.0.0.1. From the packet capture above, we see my computer made an ARP request to my default gateway, asking for its MAC address. The gateway said “tell 10.0.0.227 that I am 10.0.0.1 and here is my MAC address”. There my computer stores that MAC address in its ARP table. ARP is very interesting and is the sole attack vector for a common hacking tactic, ARP poisoning. In ARP poisoning, a mischievous device will wrongfully identify itself as the IP address the inquiring device is looking for. That device will then store the incorrect MAC address for that IP. Since MAC to MAC communication or data link layer (in terms of OSI) is a lower communication method, it is generally not encrypted by nature. This poses a very big security concern. Luckily, this type of attack is extremely well known, and we have had quite some time to implement protocols to mitigate ARP poisoning, such as ARP spoofing detection tools, secure network configurations, or forcing encrypted traffic.
Continuing on with our packet analysis, I found this!

I see two IP addresses are connecting to Spotify, a popular music streaming platform! Let's find out more about one of them.
For this practice, I used the IP 10.0.0.5. From my previous ipconfig command, I can tell this is not my device, but from the IP address, I can tell it is on my local area network. I wonder if my device has ever made any ARP request to 10.0.0.5? I will again run the command arp -a to find out! We have the MAC address of 10.0.0.5.

Of course, curiosity got the best of me, and I want to know more about the device that has an active session with Spotify. Unfortunately, there really isn’t much more information the CMD line can give us about said MAC address, like the owner or the manufacturer, but there are many websites that can! MAC addresses are often licensed by a specific manufacturer. The manufacturer can be easily identified using the first three columns of the MAC address. This is what I found using the MAC address of IP 10.0.0.5 using one of these MAC address inquiry tools.

I don’t remember anyone on my local area network purchasing a device from Hui Zhou Goashengda Technology CO. Let's do more research about this manufacturer! I found this on the home screen of their website.

As we see, Hui Zhou Goashengda manufactures network interface cards (NICs), the device inside every internet-based device that gives it access to internet communication. It seems they provide these for all sorts of devices, such as smart TVs, gaming consoles, and smartphones. Within technology manufacturing, many different companies are involved in the finished product even though you only see one logo on the box. If Microsoft had to build every little component that goes into making an Xbox from scratch, development time would be an eternity. Instead, they will outsource different companies to make different components. Whoever manufactured this device, outsourced their NICs to be provided by Huizhou.
Let's put on our red hats. I don’t know the exact device that is being used, but I do know the NIC manufacturer. If I found a vulnerability for this NIC, I can still do some damage even if I didn’t know what device I am attacking! This shows just how powerful Wireshark is! I used the packet capture, some basic commands, and web searching to find out all sorts of things about this device. And I especially know the owner likes to frequent Spotify.
Why don’t we move on to an even more interesting packet!

This one looks odd. It is highlighted in a different color. I also have no idea who IP address 142.250.72.3 is. It does not follow my LAN's IP schema, so it is certainly an external device. It has sent a packet to my computer 10.0.0.27. Let's find out more about this external IP address. To do so, I used the nslookup command to see if this IP is associated with a website.

Well, it doesn’t seem to be a full-on web application, but it certainly is a server of some sort. Luckily, we have some very powerful search engines that might be able to shed some light on this mysterious IP address. It turns out .le100.net is owned by Google, and this server is possibly located in Longmont, Colorado, but definitely somewhere in the US. Google seems to have a lot of these servers lying around with IPv4 addresses ranging from 142.250.72.0 to 142.250.72.255.
Why is 142.250.72.0 sending me a packet?
Looking at the contents of the packet, we see SYN-ACK. We see that my system is trying to establish a session with this Google server. This is crucial for the web browser “Google Chrome” to function properly.
All in all, Wireshark is an amazing tool to use. It shows how the wired/wireless traffic in your LAN is working, but Wireshark and other packet sniffers can also be used to cause harm. Using adequate encryption methods is imperative. When the need to connect to public Wi-Fi networks is needed, a VPN is a must as you cannot rely on Wi-Fi protocols such as WPA2 or 3 to encrypt your information.