11/21/2023 0 Comments Wireshark filter dns query contains![]() Due to anonymization and spoofing, we should never base host identification solely on a MAC address. However, mobile devices often anonymize MAC addresses and users can easily change these to spoof different vendors. This pcap also contains traffic to various Apple domains, further indicating this is an Apple host. That and the hostname ending with MBP indicate this might be an Apple MacBook Pro. In Figure 5, the vendor identification of the MAC address shows Apple_. ![]() Correlating the MAC address, IP address and hostname from DHCP traffic.īy default, Wireshark attempts to resolve the first 3 bytes of a MAC address to a vendor identification. This reveals the client’s MAC address at f8:ff:c2:04:a5:7b with hostname jeremiahs-MBP and a requested IP address of 172.16.138. Scroll down the frame details section, then expand the lines for Option: (50) Requested IP Address and Option: (12) Host Name as indicated below in Figure 5. Expanding the Dynamic Host Configuration Protocol line from a DHCP request. Then go to the frame details section and expand the line for Dynamic Host Configuration Protocol (Request), as shown below in Figure 4. ![]() Select the first frame in the results, the one that displays DHCP Request in the Info column. First, type dhcp in the Wireshark filter bar to filter for DHCP traffic, as shown below in Figure 3. Correlating an IP address with a MAC address.ĭHCP traffic might reveal the hostname using this IP address. Using our basic web filter, we can correlate the IP address at 172.16.138 with its associated MAC address at f8:ff:c2:04:a5:7b, as shown below in Figure 2. This pcap is based on traffic to and from an Ethernet address at f8:ff:c2:04:a5:7b. Our first pcap for this tutorial is Wireshark-tutorial-identifying-hosts-and-users-1-of-5.pcap.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |