

In this demo, let's try capturing and analyzing ARP traffic.įirst things first, know the target machine IP. The most traffic-intensive endpoint, as seen in the picture below, is 192.168.10.4.Īddress resolution protocol (ARP) generally uses to find the MAC address of the target machine. > Click Statistics menu -> Select Endpoints. To analyze the endpoints between two communication devices, do the following:Ĭapture traffic and select the packet whose endpoint you wish to check. This feature comes in handy to determine the endpoint generating the highest volume or abnormal traffic in the network. Some instances are in the following table:įigure 2 Source: Use this technique to analyze traffic efficiently.įollowing the above syntax, it is easy to create a dynamic capture filter, where:įigure 1 Source:

But a user can create display filters using protocol header values as well.

Wireshark comes with several capture and display filters. Capture filters with protocol header values This article covers the traffic analysis of the most common network protocols, for example, ICMP, ARP, HTTPS, TCP, etc. otherwise, it is available to download from the official website. Wireshark plays a vital role during the traffic analysis it comes pre-installed in many Linux OS’s, for instance, Kali. Network traffic analysis is the routine task of various job roles, such as network administrator, network defenders, incident responders and others. This blog was written by an independent guest blogger.
