Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-users: Re: [Wireshark-users] Wireshark-users Digest, Vol 12, Issue 46

From: "William Grayson" <wgrayson@xxxxxxxxxx>
Date: Wed, 23 May 2007 14:36:10 -0400
Wireshark-

These will be point-to-point voip just carrying carrier class 4 traffic.
We will be testing SIP.




-----Original Message-----
From: wireshark-users-bounces@xxxxxxxxxxxxx
[mailto:wireshark-users-bounces@xxxxxxxxxxxxx] On Behalf Of
wireshark-users-request@xxxxxxxxxxxxx
Sent: Wednesday, May 23, 2007 2:32 PM
To: wireshark-users@xxxxxxxxxxxxx
Subject: Wireshark-users Digest, Vol 12, Issue 46

Send Wireshark-users mailing list submissions to
	wireshark-users@xxxxxxxxxxxxx

To subscribe or unsubscribe via the World Wide Web, visit
	http://www.wireshark.org/mailman/listinfo/wireshark-users
or, via email, send a message with subject or body 'help' to
	wireshark-users-request@xxxxxxxxxxxxx

You can reach the person managing the list at
	wireshark-users-owner@xxxxxxxxxxxxx

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Wireshark-users digest..."


Today's Topics:

   1. Monitoring VoIP Traffic (William Grayson)
   2. Re: Monitoring VoIP Traffic (Irakli Natshvlishvili)
   3. Re: Help about 'decode as' (Stephen Fisher)
   4. Re: Help.. (Stephen Fisher)
   5. Re: Conflict with Cisco VPN? (Mark McWhinney)


----------------------------------------------------------------------

Message: 1
Date: Wed, 23 May 2007 13:52:50 -0400
From: "William Grayson" <wgrayson@xxxxxxxxxx>
Subject: [Wireshark-users] Monitoring VoIP Traffic
To: <wireshark-users@xxxxxxxxxxxxx>
Message-ID:
	<5B65B838AF47B046A5CFB4963BECC3DA84630A@xxxxxxxxxxxxxxxxxxx>
Content-Type: text/plain;	charset="us-ascii"

Dear Wireshark-

I am in the process of deploying a VoIP carrier network where I am
installing Juniper M7i routers in 10 cities.  What tools can I use out
there to monitor voip traffic and do some vulnerability testing?

I would like to pretend I am a DoS person out there attacking the
network.

wg

-----Original Message-----
From: wireshark-users-bounces@xxxxxxxxxxxxx
[mailto:wireshark-users-bounces@xxxxxxxxxxxxx] On Behalf Of
wireshark-users-request@xxxxxxxxxxxxx
Sent: Wednesday, May 23, 2007 1:17 PM
To: wireshark-users@xxxxxxxxxxxxx
Subject: Wireshark-users Digest, Vol 12, Issue 45

Send Wireshark-users mailing list submissions to
	wireshark-users@xxxxxxxxxxxxx

To subscribe or unsubscribe via the World Wide Web, visit
	http://www.wireshark.org/mailman/listinfo/wireshark-users
or, via email, send a message with subject or body 'help' to
	wireshark-users-request@xxxxxxxxxxxxx

You can reach the person managing the list at
	wireshark-users-owner@xxxxxxxxxxxxx

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Wireshark-users digest..."


Today's Topics:

   1. Sniffing AIM traffic (Mike W)
   2. Help needed on interpretation of dump (Wolfgang Heidrich)


----------------------------------------------------------------------

Message: 1
Date: Wed, 23 May 2007 11:22:52 -0400
From: "Mike W" <mike.wilhide@xxxxxxxxx>
Subject: [Wireshark-users] Sniffing AIM traffic
To: wireshark <wireshark-users@xxxxxxxxxxxxx>
Message-ID:
	<b3c95b150705230822i4d932122i864eaf17776044f6@xxxxxxxxxxxxxx>
Content-Type: text/plain; charset="iso-8859-1"

I've been playing around with Wireshark recently, attempting to get
familiar
with the app and with traffic analyzing.  I wanted to see what would
happen
if I tried sniffing AIM traffic from one of the PCs on my LAN.

When AIM is connecting to the oscar server directly, I'll see no AIM
traffic
at all.  I sign on/off (I see the HTTP traffic generated by this
process,
but nothing else), send messages, get buddy info, etc.  but Wireshark
isn't
picking up any AIM packets.  I have the filter set to only view traffic
from
the host running AIM.  When I route AIM through my Squid proxy, I can
see
everything as HTTP requests.  I've gone through all my settings, which I
haven't changed since installation, and can't see anything wrong with
them.

Is there something that I'm missing here?  Am I looking at the wrong
traffic?  I've tried with no filters, as well as filtering by port and
host.

At first I thought that my NIC wasn't dropping into promiscuous mode
properly or something, but I can still seea lot of traffic from other
hosts
on my network.  I also tried sniffing from my windows machine using
Wireshark, but with the same results.

Any help would be very appreciated.

Thank you.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
http://www.wireshark.org/lists/wireshark-users/attachments/20070523/aebb
c887/attachment.htm 

------------------------------

Message: 2
Date: Wed, 23 May 2007 16:54:31 +0200
From: "Wolfgang Heidrich" <Wolfgang.Heidrich@xxxxxxxxxxx>
Subject: [Wireshark-users] Help needed on interpretation of dump
To: <wireshark-users@xxxxxxxxxxxxx>
Message-ID:
	<BNEAICJDIBNIHPODBJMGEECDCNAA.Wolfgang.Heidrich@xxxxxxxxxxx>
Content-Type: text/plain; charset="iso-8859-1"

Hello,
although I have disabled all which look like "windows is phoning home" I
found an irritating entry in last nights dump - starting from line 426
onwards. As there is something mentioned like redirect, do I have
malware on
my PC? Who can help me? The dump-file is attached.
If someone finds other irregularites, please inform me as I am a starter
with wireshark.
rgds
akelus

-------------- next part --------------
A non-text attachment was scrubbed...
Name: dump9.cap
Type: application/octet-stream
Size: 558539 bytes
Desc: not available
Url :
http://www.wireshark.org/lists/wireshark-users/attachments/20070523/f412
2417/attachment.obj 

------------------------------

_______________________________________________
Wireshark-users mailing list
Wireshark-users@xxxxxxxxxxxxx
http://www.wireshark.org/mailman/listinfo/wireshark-users


End of Wireshark-users Digest, Vol 12, Issue 45
***********************************************


------------------------------

Message: 2
Date: Wed, 23 May 2007 10:03:49 -0800
From: "Irakli Natshvlishvili" <iraklin@xxxxxxxxx>
Subject: Re: [Wireshark-users] Monitoring VoIP Traffic
To: "Community support list for Wireshark"
	<wireshark-users@xxxxxxxxxxxxx>
Message-ID:
	<7716730f0705231103q7cc6a40ew321466a60b6f6c7d@xxxxxxxxxxxxxx>
Content-Type: text/plain; charset="iso-8859-1"

Well, you have not mentioned what type of VoIP network are you deploying
-
SIP/MGCP/H323/Skinny?

Secondly, 'vulnerability testing' requires definitiondepending on the
network and infrastructure. What exactly are you going to test - how
your
firewalls pass/block voip traffic? How your application servers and
endpoints react on malformed messages? Is it possible to do
Man-in-the-middle attack or password sniffing/decrypting?


--i.n.

On 5/23/07, William Grayson <wgrayson@xxxxxxxxxx> wrote:
>
> Dear Wireshark-
>
> I am in the process of deploying a VoIP carrier network where I am
> installing Juniper M7i routers in 10 cities.  What tools can I use out
> there to monitor voip traffic and do some vulnerability testing?
>
> I would like to pretend I am a DoS person out there attacking the
> network.
>
> wg
>
> -----Original Message-----
> From: wireshark-users-bounces@xxxxxxxxxxxxx
> [mailto:wireshark-users-bounces@xxxxxxxxxxxxx] On Behalf Of
> wireshark-users-request@xxxxxxxxxxxxx
> Sent: Wednesday, May 23, 2007 1:17 PM
> To: wireshark-users@xxxxxxxxxxxxx
> Subject: Wireshark-users Digest, Vol 12, Issue 45
>
> Send Wireshark-users mailing list submissions to
>         wireshark-users@xxxxxxxxxxxxx
>
> To subscribe or unsubscribe via the World Wide Web, visit
>         http://www.wireshark.org/mailman/listinfo/wireshark-users
> or, via email, send a message with subject or body 'help' to
>         wireshark-users-request@xxxxxxxxxxxxx
>
> You can reach the person managing the list at
>         wireshark-users-owner@xxxxxxxxxxxxx
>
> When replying, please edit your Subject line so it is more specific
> than "Re: Contents of Wireshark-users digest..."
>
>
> Today's Topics:
>
>    1. Sniffing AIM traffic (Mike W)
>    2. Help needed on interpretation of dump (Wolfgang Heidrich)
>
>
> ----------------------------------------------------------------------
>
> Message: 1
> Date: Wed, 23 May 2007 11:22:52 -0400
> From: "Mike W" <mike.wilhide@xxxxxxxxx>
> Subject: [Wireshark-users] Sniffing AIM traffic
> To: wireshark <wireshark-users@xxxxxxxxxxxxx>
> Message-ID:
>         <b3c95b150705230822i4d932122i864eaf17776044f6@xxxxxxxxxxxxxx>
> Content-Type: text/plain; charset="iso-8859-1"
>
> I've been playing around with Wireshark recently, attempting to get
> familiar
> with the app and with traffic analyzing.  I wanted to see what would
> happen
> if I tried sniffing AIM traffic from one of the PCs on my LAN.
>
> When AIM is connecting to the oscar server directly, I'll see no AIM
> traffic
> at all.  I sign on/off (I see the HTTP traffic generated by this
> process,
> but nothing else), send messages, get buddy info, etc.  but Wireshark
> isn't
> picking up any AIM packets.  I have the filter set to only view
traffic
> from
> the host running AIM.  When I route AIM through my Squid proxy, I can
> see
> everything as HTTP requests.  I've gone through all my settings, which
I
> haven't changed since installation, and can't see anything wrong with
> them.
>
> Is there something that I'm missing here?  Am I looking at the wrong
> traffic?  I've tried with no filters, as well as filtering by port and
> host.
>
> At first I thought that my NIC wasn't dropping into promiscuous mode
> properly or something, but I can still seea lot of traffic from other
> hosts
> on my network.  I also tried sniffing from my windows machine using
> Wireshark, but with the same results.
>
> Any help would be very appreciated.
>
> Thank you.
> -------------- next part --------------
> An HTML attachment was scrubbed...
> URL:
>
http://www.wireshark.org/lists/wireshark-users/attachments/20070523/aebb
> c887/attachment.htm
>
> ------------------------------
>
> Message: 2
> Date: Wed, 23 May 2007 16:54:31 +0200
> From: "Wolfgang Heidrich" <Wolfgang.Heidrich@xxxxxxxxxxx>
> Subject: [Wireshark-users] Help needed on interpretation of dump
> To: <wireshark-users@xxxxxxxxxxxxx>
> Message-ID:
>         <BNEAICJDIBNIHPODBJMGEECDCNAA.Wolfgang.Heidrich@xxxxxxxxxxx>
> Content-Type: text/plain; charset="iso-8859-1"
>
> Hello,
> although I have disabled all which look like "windows is phoning home"
I
> found an irritating entry in last nights dump - starting from line 426
> onwards. As there is something mentioned like redirect, do I have
> malware on
> my PC? Who can help me? The dump-file is attached.
> If someone finds other irregularites, please inform me as I am a
starter
> with wireshark.
> rgds
> akelus
>
> -------------- next part --------------
> A non-text attachment was scrubbed...
> Name: dump9.cap
> Type: application/octet-stream
> Size: 558539 bytes
> Desc: not available
> Url :
>
http://www.wireshark.org/lists/wireshark-users/attachments/20070523/f412
> 2417/attachment.obj
>
> ------------------------------
>
> _______________________________________________
> Wireshark-users mailing list
> Wireshark-users@xxxxxxxxxxxxx
> http://www.wireshark.org/mailman/listinfo/wireshark-users
>
>
> End of Wireshark-users Digest, Vol 12, Issue 45
> ***********************************************
> _______________________________________________
> Wireshark-users mailing list
> Wireshark-users@xxxxxxxxxxxxx
> http://www.wireshark.org/mailman/listinfo/wireshark-users
>



-- 
I.N.
-------------- next part --------------
An HTML attachment was scrubbed...
URL:
http://www.wireshark.org/lists/wireshark-users/attachments/20070523/86d8
5d1d/attachment.htm 

------------------------------

Message: 3
Date: Wed, 23 May 2007 11:20:59 -0700
From: Stephen Fisher <stephentfisher@xxxxxxxxx>
Subject: Re: [Wireshark-users] Help about 'decode as'
To: Community support list for Wireshark
	<wireshark-users@xxxxxxxxxxxxx>
Message-ID: <20070523182059.GA82079@xxxxxxxxxxxxxxxxxxx>
Content-Type: text/plain; charset=us-ascii

On Wed, May 23, 2007 at 04:41:05PM +0800, majun wrote:

> 	I found that we can input protocols type like 'rtp' on a 
> RedHat(Wireshark 0.99.5 GTK2+) PC when we use 'decode as', but I can't

> do this on a Windows XP SP2 laptop, that's quite annoying, and XP 
> could not remember the 'decode as' window's size after resizing.
> 	Any ideas? 
> 	BTW: I have test both 0.99.5 and 
> wireshark-setup-0.99.6-SVN-21890.exe on my laptop. No one works.

Wireshark code is usually identical between the Unix and Windows 
versions.  I'm not quite sure what problem you are reporting - you can't

do Decode As->RTP on Windows, but you can on Redhat?  Or something else?


Steve



------------------------------

Message: 4
Date: Wed, 23 May 2007 11:23:17 -0700
From: Stephen Fisher <stephentfisher@xxxxxxxxx>
Subject: Re: [Wireshark-users] Help..
To: Community support list for Wireshark
	<wireshark-users@xxxxxxxxxxxxx>
Message-ID: <20070523182317.GB82079@xxxxxxxxxxxxxxxxxxx>
Content-Type: text/plain; charset=us-ascii

On Wed, May 23, 2007 at 04:33:43PM +0530, Babu A wrote:

> I have recently started using Wireshark and I need to understand and 
> analyze the error messages better... Can any one point me to a 
> location where I can get information... the current type errors that I

> would like to interpret are:
> 
> 1.	Out-of-Order
> 2.	Previous Segment Lost
> 3.	Dup ack
> 4.	TCP Windows Update
> 5.	TCP Retransmission

Check out http://wiki.wireshark.org/TCP and 
http://wiki.wireshark.org/TCP_Analyze_Sequence_Numbers and let us know 
what other questions you have.  Any good book that covers TCP should 
also cover these topics in detail.


Steve



------------------------------

Message: 5
Date: Wed, 23 May 2007 11:31:49 -0700
From: "Mark McWhinney" <msm@xxxxxxxxxxx>
Subject: Re: [Wireshark-users] Conflict with Cisco VPN?
To: "'Community support list for Wireshark'"
	<wireshark-users@xxxxxxxxxxxxx>
Message-ID:
	<20070523183150.239E475808C@xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx>
Content-Type: text/plain;	charset="us-ascii"

Oddly, while the VPN was broken, the Ethereal/WinPcap worked fine.

I finally fixed the problem today by reinstalling the network card's
drivers.  For future reference, it was a Realtek TRL8139/810x NIC.



-----Original Message-----
From: wireshark-users-bounces@xxxxxxxxxxxxx
[mailto:wireshark-users-bounces@xxxxxxxxxxxxx] On Behalf Of Ulf Lamping
Sent: Wednesday, May 23, 2007 12:53 AM
To: Community support list for Wireshark
Subject: Re: [Wireshark-users] Conflict with Cisco VPN?

Mark McWhinney wrote:
> Hello,
>
> Recently I installed Ethereal 0.99 / WinPcap 3 then upgraded to the
current
> Wireshark 0.99.5 / WinPcap 4 on my Windows XP Pro laptop.
>
> I have been using Cisco VPN for a while without any trouble.  Now, the
VPN
> does not work on my network card but does work with my Wireless
connection.
>
> Is it possible that Ethereal/Wireshark/WinPcap damaged a driver or
something
> else that would muck up my TCP packets?
>   
 From several years of experience: In the world of computers, everything

is possible ;-)
> I uninstalled Ethereal/Wireshark/WinPcap and re-installed the Cisco
VPN
> client but am still getting the same results.
>
> Any tips or pointers?
>
>   
See: http://wiki.wireshark.org/CaptureSetup/InterferingSoftware

You may better ask the WinPcap team about this. Wireshark is very 
certainly *not* the cause of your problems, but WinPcap probably is.

Regards, ULFL
_______________________________________________
Wireshark-users mailing list
Wireshark-users@xxxxxxxxxxxxx
http://www.wireshark.org/mailman/listinfo/wireshark-users



------------------------------

_______________________________________________
Wireshark-users mailing list
Wireshark-users@xxxxxxxxxxxxx
http://www.wireshark.org/mailman/listinfo/wireshark-users


End of Wireshark-users Digest, Vol 12, Issue 46
***********************************************