
This filter should reveal the DHCP traffic. Open the pcap in Wireshark and filter on bootp as shown in Figure 1. This pcap is for an internal IP address at 1. The first pcap for this tutorial, host-and-user-ID-pcap-01.pcap, is available here. NBNS traffic is generated primarily by computers running Microsoft Windows or Apple hosts running MacOS. DHCP traffic can help identify hosts for almost any type of computer connected to your network. How do we find such host information using Wireshark? We filter on two types of activity: DHCP or NBNS.

If you have access to full packet capture of your network traffic, a pcap retrieved on an internal IP address should reveal an associated MAC address and hostname. In most cases, alerts for suspicious activity are based on IP addresses.

Device models and operating systems from HTTP traffic.Host information from NetBIOS Name Service (NBNS) traffic.It assumes you understand network traffic fundamentals and will use these pcaps of IPv4 traffic to cover retrieval of four types of data:
#Wireshark filter source ip how to#
This tutorial offers tips on how to gather that pcap data using Wireshark, the widely used network protocol analysis tool.

When a host is infected or otherwise compromised, security professionals need to quickly review packet captures (pcaps) of suspicious network traffic to identify affected hosts and users.
