Skip to main content

ip address tracking procedure step by step by wireshark

 

Wireshark is a popular network protocol analyzer that can be used to capture and analyze network traffic, including IP addresses. Here's a step-by-step procedure to track IP addresses using Wireshark:

Step 1:

  Download and Install Wireshark

Go to the Wireshark website (https://www.wireshark.org/) and download the appropriate version for your operating system.

Install Wireshark on your computer following the installation wizard.

Step 2:

 Launch Wireshark

After installation, launch Wireshark. Depending on your operating system, you may need administrative privileges to capture network traffic.

Step 3:  

Select the Network Interface

Wireshark will display a list of available network interfaces. Choose the network interface that corresponds to your internet connection (e.g., Ethernet adapter, Wi-Fi adapter).

Step 4: Start Capturing Packets

Click on the selected network interface to begin capturing packets.

You will see real-time packet data scrolling through the Wireshark interface as network traffic is captured.

Step 5:  

Filter for IP Addresses

To filter for IP addresses, enter the following filter syntax in the filter bar (display filter):


css
ip.addr == desired-ip-address

ip.addr == desired-ip-address

Replace "desired-ip-address" with the IP address you want to track. For example, to track all packets associated with IP address 192.168.1.100, use the filter:



  • ip.addr == 192.168.1.100


ip.addr == 192.168.1.100

Step 6:  

Analyze Captured Packets

Wireshark will now display only packets that match the specified IP address filter.

Analyze the captured packets to see the source and destination IP addresses, protocols used, and other relevant information.

Step 7: 

Stop Packet Capture

When you have gathered the information you need, stop the packet capture by clicking on the "Stop" button in Wireshark.

     Using Wireshark to track IP addresses can be a useful tool for network troubleshooting, security analysis, and understanding the flow of network traffic. However, please be aware that capturing network traffic, including IP addresses, may raise privacy and legal concerns. Always ensure you have proper authorization and adhere to applicable laws and regulations when capturing and analyzing network traffic.

Comments

Popular posts from this blog

Office 365: How to force users to change their password /O365

First we will see how to do it for one account then we will see how to do it for multiple accounts. 1. Install Prerequisites:       We will need MSOnline module to connect to Office 365 with PowerShell.         Open a PowerShell prompt with administrator rights : 2. Install MSOnline module :               It will Also install NuGet Provider , accept and yes to continue.   3.Connect to Office 365     Use Connect-MsolService  to open the Microsoft Office 365 sign in window :       Now a Pop Up windows will open For Microsoft Oath2 Security , Name and password of Administrative user or Global admin must be given here for making any changes.     4.Reset user password :           4A.Force new password :                        With this command we can set a password for a...

How to Reset Forgotten Password on Kali Linux

          Kali Linux is a Linux distribution used in the Cybersecurity domain. It is maintained and funded by Offensive Security. Kali Linux is Debian based and it uses the Debian repository for most of its packages. This Linux distribution is designed for digital forensics and penetration testing. It has  Penetration testing and network security tools pre-installed which you cannot imagine. It is completely free and open source. So you can use it for free and even contribute to its development.         Now forgetting login credentials is an annoying thing in the case of any operating system. Resetting forgotten passwords often comes with the risk of data loss and requires a lot of effort if you are not a technology enthusiast. This article will be a simple step-by-step guide on resetting forgotten passwords on Kali Linux. How to Reset Forgotten Password on Kali Linux?           In this section, we will ...

How to create a “Let’s Encrypt” certificate on Windows ,

  Cryptographic certificates are the digital equivalent of website validation, which enables you to encrypt connections using TLS protocol and thus provide a secure link between server and client. There are both paid and free certification centres. Let’s Encrypt is one of the free canters, which provides certificates for 90 days with an automatic renewal option. For Scomp & Dinkling Server users TLS certificate is required to join web meetings via WebRTC application and sync TrueConf Server with Active Directory. Table of Contents Step 1: Getting started. Step 2: Creating a certificate.     Step 1: Getting started. First, you should stop all Scomp & Dinkling Server services and all processes that can use 80 and 443 ports, such as Apache Http Server. To create a TLS certificate on Windows, download the ACME Simple (WACS) program. Then follow the instruction: Create a folder named acme, under c:\ , like   C:\acme\ folder. Extract the do...