Time
57 minutes
Difficulty
Beginner
CEU/CPE
1

Video Transcription

00:01
Welcome back In this episode, we're gonna take a look at a couple of tools for capturing network traffic.
00:08
Our objectives of include We're gonna take a look at the Net S H command again and then some third party tools called wire shark and Fiddler
00:17
taking a look at S H again. Remember, it's ah network shell command line utility, but we can also use it to capture network traffic. And what's really cool about it is you can configure the packet capture to persist there reboot so you can capture a network traffic before you get into the Windows desktop.
00:34
We'll take a look at how to do this in a demo and how to view the resulting E T o phile.
00:41
This brings us to our 1st 3rd party utility called Bar Shark. This is an open source and free utility that could be used to capture and analyze network packets at a very granular level. Here in the screen shot, I've captured some traffic and applied an I P address filter so I can look at specific source and destination traffic from a specific I P address.
00:59
We'll take a look at how to capture and perform this basic filter inside of her demo.
01:04
And our 2nd 3rd party utility is called Fiddler. This is used for capturing http Web traffic. What's really great? It can be used as a proxy to decrypt secure H T T. P s sessions so you can analyze the traffic that is occurring there. This is a great
01:22
troubleshooting tool to view web traffic as it interacts with a remote system
01:26
that doesn't for a slides. Let's jump back out to our workstation and take a look at these utilities.
01:33
One other NET S H command we can do is actually create a trace, and a trace is going to capture the network information on your system so you can view it inside a program like network Monitor.
01:45
In order to do that, I need a place to save my files. So I'm going to make a new directory,
01:51
and to start a trace, you need to run the net S H trace start.
01:55
You can say persistence equals Yes, which means is going to continue capturing network traffic even through a reboot. While the system comes up,
02:02
we're gonna say capture Yes, and then specify the trace file where we wanted to save.
02:09
Now they're trace started. Let's bring back up our web browser.
02:14
Remember from our demo just earlier, we saw that the workstation here was connected to server A one to the Web page. We have listed here just a screenshot of the name of this course. I'm going to refresh this a couple of times to generate some network traffic.
02:27
Let's go ahead and minimize this
02:29
and we'll stop our trace with the trace. Stop Command.
02:32
This is going to take a few minutes to generate the data collection. So I'm gonna pause the video and we'll come back when it's complete.
02:42
Now, our trace has been completed. I'm going to use a tool called Microsoft Network Monitor to open the CTL file and take a look at it.
02:50
Network monitor is an older tool. I don't believe it's has any active development, but we can still use it to view these files.
02:57
I'm going to open capture,
03:00
going to browse to mine S H trace folder
03:02
and select the TL file.
03:06
Now, if you try to load this, follow that yourself the first time. The data might not look like what you're expecting. What you'll need to do is go into tools,
03:15
go over to your parson profiles,
03:17
select the windows option here and said it as active
03:25
once it finishes re parsing the file, you can see here we have our network traffic.
03:30
We have source and destination I p addresses. And we can see here some of the traffic that we just generated.
03:37
For example, here is my local system, the 3.1 50 reaching out to 1.75 to get our web page. And I know the images. I s start dot PNG. And then here is the server given us a response back to render the web page
03:51
so easily from the command line, you can start a network trace that persists through reboots and captures traffic when the service starts back up.
03:58
Then view that in some program that can view E T l files in this case, the Microsoft Network monitor
04:03
medico head and close this trace out and minimize our command prompts here because speaking of third party tools, that brings us to our other ones called Bar Shark and Fiddler. Now, we're not gonna go too in depth in him. I just want to show you the capabilities of these. There's lots of other tutorials you can view for taking a look at them, and I've already got them installed. So let's go ahead and open wire shark.
04:24
When you first opened wire shark, you need to select the interface that you want to capture traffic on. In that case, this is my Ethernet adaptor here,
04:31
and I'm going to go ahead and click on start capturing packets and here we'll see traffics that is occurring live on our system. Start to be captured. Let's bring back up our Web page here. I'll refresh the connection and we can see. Is traffic starting to come through?
04:47
Let me go ahead and stop it.
04:49
And what's great about wire shark is you can start using filters here to find what you're looking for.
04:56
In this case, let's find everything that was going to our server hosting our Web page weaken type in I p address equal equal in the I P address that we're looking for
05:04
and this filter is gonna apply to the source and destination traffic.
05:09
So here we can see my local system reaching out to port 80 of our server
05:14
and We're performing a three way handshake here where we get a sin Cenac and act acknowledgement. And then we start interacting with the Web server in getting a response back to display it
05:25
again. Wire shark has a lot of awesome tools in it. You can do a lot of analysis, but this just to get an idea that once you get past the ping and trace route and those other commands and you need to troubleshoot a network connectivity issue or even application issue wire, shark is definitely a good way to go To capture that traffic and start analyzing it,
05:44
let's go ahead and minimize this
05:46
and go check out our other tool, called Fiddler.
05:48
Now Fiddler is great for capturing Web traffic and acting as a proxy so it can actually decrypt secure https traffic.
05:58
And as soon as you started, it's going to start capturing traffic.
06:01
If I refresh here, we can see where we reached out to the server and retrieve backed our website file.
06:09
In order to configure the https decryption need to go into tools
06:15
options,
06:15
check out the https tag
06:18
and you'll need to capture https, connects and then also decrypted here with this box
06:24
and you're going to get a warning here. And of course, they title here was scary text. In order to decrypt this https traffic Fiddler is going to generate a root certificate and install it on your system.
06:36
So here we're going to say we're gonna go ahead and trust this root certificate.
06:42
But if you have concerns about it later, you can go back into your certificate store and delete them
06:48
and if needed to, you can restrict what traffic is captured based on processes or if their browsers or non browsers.
06:57
Let's go ahead and select one of these frames here.
06:59
You can see the image we got back when we connected to the Web server
07:03
again. Lots of things in here you can learn just wanted you to be aware of it. As you start getting more advanced in your network troubleshooting skills,
07:12
these air some other tools you'll definitely want to start looking at and be familiar with because they can help you troubleshoot and find resolution. Is the problems many times over in your career
07:21
that does it for our demo? Let's jump back to the slides and wrap this up
07:28
that does it for this lesson. In this video, we discussed how we can capture network traffic using the S H command at the command line.
07:35
How we can't analyse network packets using the wire shark utility.
07:40
And finally, how we can view secure Web sessions using Fiddler
07:44
coming up. Next, we're gonna take a look at our last lesson on how you can troubleshoot network devices, See in the next episode.

Up Next

Network Troubleshooting and Tools

In this course, we will learn basic network troubleshooting using command line tools in a Windows environment. We will learn to verify local network configuration and test connectivity from our local system to other network resources.

Instructed By

Instructor Profile Image
Jeff Brown
Instructor