Capture Traffic with Wireshark
Start Capturing
- Upon bootup, it will grab all interfaces and preview them
- Click the blue shark fin at the top left, and it will begin capturing
- Wireshark will only stop capturing when you manually stop capturing or system failure (loss of power, full storage, etc.)
Capture Options
- Capture>Options
- Input tab
- Promiscuous mode enables you to capture packets that are not destined for your machine
- Snaplength
- Normally set default, and you can set how much you capture
- Helpful if you are working in a secure environment, where you should not have access to the data in transit
- Also reduces pcap size
Modify Output
- Capture>Options>Output
- Capture to a permanent file
- Name the file
- Create a new file automatically... to choose when a new file is created (recommended)
- Chris recommends doing it with 500 megabytes (about 50Gb), but you can choose increments based on packet count, size, and time
- Ring Buffer
- When creating a new PCAP file, it will delete the oldest PCAP in the series beyond the buffer
Notes on Captured Traffic
- Traffic captured on devices might not be segmented
- e.g., a packet might look too big, because it hasn't been broken up yet for transport.