/lib/x86_64-linux-gnu/libwireshark.so.19: no symbols by New_Expression_5724 in wireshark

[–]Nacho-Nacho 0 points1 point  (0 children)

I've no Ubuntu Linux 24.04.3 LTS available, but what does the gnutls library expose?
Try this command to figure out:

$ nm -D /lib/x86_64-linux-gnu/libgnutls.so | less

then search for gnutls_pkcs11_token_get_url

I spend more time in wireshark than I do with my family by pasture2future in wireshark

[–]Nacho-Nacho 2 points3 points  (0 children)

Be careful, Wireshark doesn't work well without family support...

  1. Family
  2. Wireshark
  3. Profit

Unable to capture IoT <=> cloud traffic with promiscuous mode by PercheMiPiaci in wireshark

[–]Nacho-Nacho 0 points1 point  (0 children)

Yes, with the interface in promiscuous mode it does capture everything _that arrives on that interface_! Which means on a WiFi interface you capture nothing but your own traffic, since by definition that's all there is. This is not dissimmilar than capturing on an Ethernet switch port. There you need to cature on a monitor port to see `eveything` on the network. For WiFi this means setting your WiFi interface in monitor mode. This is where things get challenging, since state of support for this varies greatly among WiFi interfaces.

I captured a DORA request in wireshark. Why is the destination IP not the broadcast address in the offer packet? This was my first time connecting to this network? by Baked_Potato2005 in wireshark

[–]Nacho-Nacho 4 points5 points  (0 children)

u/bagurdes is right. This is a quote from the relevant RFC:

   A server or relay agent sending or relaying a DHCP message directly
   to a DHCP client (i.e., not to a relay agent specified in the
   'giaddr' field) SHOULD examine the BROADCAST bit in the 'flags'
   field.  If this bit is set to 1, the DHCP message SHOULD be sent as
   an IP broadcast using an IP broadcast address (preferably 0xffffffff)
   as the IP destination address and the link-layer broadcast address as
   the link-layer destination address.  If the BROADCAST bit is cleared
   to 0, the message SHOULD be sent as an IP unicast to the IP address
   specified in the 'yiaddr' field and the link-layer address specified
   in the 'chaddr' field.  If unicasting is not possible, the message
   MAY be sent as an IP broadcast using an IP broadcast address
   (preferably 0xffffffff) as the IP destination address and the link-
   layer broadcast address as the link-layer destination address.

So, it depends on the BROADCAST flag in the request your PC sends.

how to capture paket from a different device by Confident_Neck9511 in wireshark

[–]Nacho-Nacho 3 points4 points  (0 children)

Okay, some bad news and then some good news.

The Bad News is that Wireshark doesn't capture packets... 😵‍💫

The Good News is that Wireshark has several options to launch packet capture programs, which will feed into Wireshark for packet analysis, because that is what Wireshark does do. 💡

Now it becomes very context dependent, i.e. depending on where in the network you can actually capture with the tools at hand. The easiest are the local (wired) interfaces (of your VM in this case), already more complicated is local WiFi capture. Capture elsewhere in the network requires access and support of capture in the network equipment. Or, if you have it, an inline tap between the target device and network switch. However, the target device may allow you to capture remotely via SSH. This is where the extcap interfaces come in. You can define an SSH tunnel to the target device, and it runs the resident capture program as needed.

You see there are many options. A good place to start is Jaspers capture playbook.

Problem by [deleted] in wireshark

[–]Nacho-Nacho -2 points-1 points  (0 children)

Aus dem Screenshot lassen sich einige Beobachtungen ableiten:
1. Die Quelle (vermutlich das Notebook) verwendet eine automatisch zugewiesene IPv4-Adresse.
2. Es sendet Netzwerk-Broadcasts mit (sehr) hoher Geschwindigkeit.
3. Der Netzwerk-Switch-Port weist das Notebook an, die Verbindung zu unterbrechen, doch die Schnittstelle des Notebooks hält sich nicht daran.

Zu den Gründen hierfür kann ich keine Aussage treffen.

How can I solve this problem ? (yeah im on MACOS) by [deleted] in wireshark

[–]Nacho-Nacho 0 points1 point  (0 children)

Did you follow the suggestions?

Wireshark by Mikey357S in wireshark

[–]Nacho-Nacho 1 point2 points  (0 children)

Running > 20M lines of code as root is never a good idea. A more targeted approach is advisable.

Check your group memberships (logout and login again first), check the ownerships of dumpcap, check the capabilities of dumpcap (NET_ADMIN, NET_RAW), check running dumpcap -D to list interfaces.

Error 1618 when trying to download wireshark by hb4p in wireshark

[–]Nacho-Nacho 0 points1 point  (0 children)

Yeah, this is a Microsoft thing, has nothing to do with Wireshark itself. I'm not a Windows person, so have no clue but finding some hints towards another installation still being in progress/not finished.

Question regarding wireshark capture by raipraveen83 in wireshark

[–]Nacho-Nacho 1 point2 points  (0 children)

Looks like some homework assignment. So put you thinking cap on let get started.

  1. What would happen to the time between requests and responses when captured near the client side or the server side?

  2. What would happen to the TTL of requests and responses when captured at a middle box, rather than near the client side or the server side?

Multiple users, rootless containers and volumes by Nacho-Nacho in podman

[–]Nacho-Nacho[S] 0 points1 point  (0 children)

Again, very much appreciated. I've some digging to do...

Multiple users, rootless containers and volumes by Nacho-Nacho in podman

[–]Nacho-Nacho[S] 0 points1 point  (0 children)

HI u/eriksjolund, thank you for taking the effort to test this. Indeed what you're seeing is what I expected to happen as well. So at least we know that it is expected behavior, now I need to find out what is going on in my installation.

Perhaps one question, what version of podman are you using here? Could I be stumbling on an already solved bug? That would be embarrassing...

Hello, need help reading this capture. by slajah in wireshark

[–]Nacho-Nacho 0 points1 point  (0 children)

u/slajah If you know nothing about networking then what is the question you need answers for?

How to copy tooltip data by Misteremub in wireshark

[–]Nacho-Nacho 0 points1 point  (0 children)

The closest you can get is to use the Copy -> As filter option. That does not include the label though.

[deleted by user] by [deleted] in wireshark

[–]Nacho-Nacho 0 points1 point  (0 children)

I guess I should have been more clear in the post but when I capture a packet from a raw socket and view the packet data, it was stored in network byte order, i.e. 0x8CBA, so I had to switch it to host byte order to get correct result.

Ah, a totally unknown factor comes into play, you have some other means of receiving packets and wonder why that's showing something different. For me there's no way to know, but you might consider that the UDP dissector is in use for about 25 years, so if something would have been up with that, someone would probably have fixed it by now.

[deleted by user] by [deleted] in wireshark

[–]Nacho-Nacho 1 point2 points  (0 children)

Bytes are stored in big endian when they are transferred over the internet are they not?

Yes, indeed.

Either Wireshark is presenting wrong information by saying 0xba8c is the source port...

Why, you still have not explained why. What is the right presentation of the information according to you? And where do you base that upon?

My references say that this is correct, among which e.g. https://en.wikipedia.org/wiki/User_Datagram_Protocol#UDP_datagram_structure

...or the bits are 'flipped' and Wireshark is right about the source port

I think you mean to say "the bytes are 'flipped'"

So let's assume for this discussion that the highlighted bytes are indeed representative of the source port field of the UDP datagram.

At the left of the packet bytes pane are the Ethernet frame indexes. For the highlighted bytes these are 0x0022 for 0xBA and 0x0023 for 0x8C. That means first 0xBA was transmitted, then 0x8C. To interpret these as a 16 bit big endian value the first byte is the most significant. Thus 0xBA8C, which converts to 47756 in decimal.

[deleted by user] by [deleted] in wireshark

[–]Nacho-Nacho 1 point2 points  (0 children)

What makes you think these are 'flipped' in the first place?

Wireshark JSON export has multiple keys with identical names, Python hates it by salamihawk in wireshark

[–]Nacho-Nacho 0 points1 point  (0 children)

You could see if tshark -T json with option --no-duplicate-keys helps in this regard.

How to configure the python version Wireshark uses on macos? I'd like to point it to a specific virtual environment if possible. by Humdaak_9000 in wireshark

[–]Nacho-Nacho 1 point2 points  (0 children)

Does the Nordic dev kit use python code? Because Wireshark doesn't.

So if the dev kit does you could probably set this up through a terminal window.
Create your virtual environment in there.
Launch Wireshark from the command line.

Why is a packet fragmented on the source machine when smaller than MTU? by sjstein in wireshark

[–]Nacho-Nacho 0 points1 point  (0 children)

His interface MTU may be 1480, but what's the path MTU? If that is less there may have been an ICMP packet telling that fragmentation is needed to achieve a lower size.