1 00:00:01,320 --> 00:00:02,890 All right, welcome back, everyone. 2 00:00:03,060 --> 00:00:08,880 This is the situation where we'll be understanding about why or why shark interfaces. 3 00:00:09,270 --> 00:00:10,790 All right, so let's get started 4 00:00:13,800 --> 00:00:14,220 again. 5 00:00:14,460 --> 00:00:17,640 Come to the search site was shock. 6 00:00:18,600 --> 00:00:22,560 And what's really happened in the very first glance? 7 00:00:22,560 --> 00:00:23,520 You get an option. 8 00:00:24,060 --> 00:00:31,680 Of course, the wash welcomes you, but you also need you also need to select interfaces. 9 00:00:31,680 --> 00:00:40,140 There are a list of interfaces mentioned from local connections from the land to Bluetooth network to 10 00:00:40,140 --> 00:00:40,680 VMware. 11 00:00:40,680 --> 00:00:46,880 And after we have one and Wi-Fi, then there's there are a couple of more as well. 12 00:00:47,310 --> 00:00:53,760 So you see that this is really interesting because a shock doesn't matter as it is, it only Dilan or 13 00:00:53,760 --> 00:00:57,270 Indurain circuits for Wireshark. 14 00:00:57,270 --> 00:00:58,860 It could be any any connection. 15 00:00:58,860 --> 00:00:59,880 It could be any network. 16 00:00:59,880 --> 00:01:01,440 It could be a Bluetooth network. 17 00:01:01,440 --> 00:01:06,340 It could be USB, it could be lan, it could be wi fi, anything. 18 00:01:06,390 --> 00:01:12,210 So so what we can actually do is we can select any one of them that we are interested off and we can 19 00:01:12,210 --> 00:01:12,750 get started. 20 00:01:13,200 --> 00:01:18,690 So let's say we are interested about Wi-Fi and we select the Wi-Fi circuit here. 21 00:01:19,080 --> 00:01:22,830 And the moment we do that, this dog getting on the back. 22 00:01:23,730 --> 00:01:31,350 Coming up, you see that the live streaming of all the packets on the IP packets through and it has 23 00:01:31,350 --> 00:01:32,310 been started now. 24 00:01:32,890 --> 00:01:37,140 And what you can do is you can stop it at any moment you want to. 25 00:01:37,170 --> 00:01:41,520 OK, so let's say at this moment I decided to stop the stream. 26 00:01:41,910 --> 00:01:46,590 So my sharp symbol is highlighted. 27 00:01:47,070 --> 00:01:54,300 The moment you started again, it would say if you want to save your packet, capture the earlier capture 28 00:01:54,300 --> 00:01:59,490 or not, if you can continue without saving, it will get started as well. 29 00:01:59,760 --> 00:02:01,640 Now you can again stop it. 30 00:02:02,010 --> 00:02:02,820 It's that simple. 31 00:02:02,820 --> 00:02:03,620 It is OK. 32 00:02:04,110 --> 00:02:10,870 Now, on the right hand side, you get a capture the options that you will find input and output options 33 00:02:10,870 --> 00:02:11,150 to. 34 00:02:11,430 --> 00:02:16,090 And that's where you can modify your interface settings as to ASBA. 35 00:02:16,440 --> 00:02:20,130 So this is where, again, you see the list of all the interfaces. 36 00:02:20,430 --> 00:02:30,480 If you and if you did select any of the any of the interfaces from here, you won't see them in the 37 00:02:30,480 --> 00:02:31,120 in the beginning. 38 00:02:31,140 --> 00:02:39,540 OK, so let's say if you are only interested to wi fi network, every time you log into your wireshark, 39 00:02:39,540 --> 00:02:42,640 you can select those and select the rest of them. 40 00:02:42,710 --> 00:02:49,880 OK, and you can manage them as well by making sure which interfaces you are really interested about. 41 00:02:50,190 --> 00:02:55,860 And again, the same stuff you can get to know about which, Nikitas, they're there for any name as 42 00:02:55,860 --> 00:02:56,070 well. 43 00:02:56,070 --> 00:03:01,710 You can modify their name as well and you can apply some default capture before further. 44 00:03:01,710 --> 00:03:09,540 I mean, by applying any of the finger, maybe, let's say whenever I log in to wherever I want to see 45 00:03:09,540 --> 00:03:11,710 only the traffic related to this one. 46 00:03:12,240 --> 00:03:12,620 OK. 47 00:03:12,700 --> 00:03:19,440 So if I start this, all the traffic, all the capture to start happening for this interfaces and I 48 00:03:19,440 --> 00:03:24,540 get to see the captured traffic for all this interfaces but this specific figure. 49 00:03:24,720 --> 00:03:29,680 OK, so this is what this this would Wireshark capture. 50 00:03:29,690 --> 00:03:32,250 It interfaces basically gives you an idea. 51 00:03:32,730 --> 00:03:39,900 One more very important thing, and you might come across a situation where you want to capture the 52 00:03:39,900 --> 00:03:41,790 lookback interface traffic. 53 00:03:41,790 --> 00:03:46,700 What is that Lubeck interface, especially especially in the Windows. 54 00:03:46,920 --> 00:03:53,580 It's basically software interface, just like with the routers and switches and other devices we have 55 00:03:53,580 --> 00:03:55,230 to invoke in the firewall as well. 56 00:03:55,230 --> 00:04:00,450 We have to create a new back interface, which is nothing but a software interface with the IS because 57 00:04:00,450 --> 00:04:03,690 it never goes down like any physical interface. 58 00:04:04,260 --> 00:04:12,480 You can rely on it and loop back interfaces is the it's something which where the all the internal communication 59 00:04:12,480 --> 00:04:13,360 basically happens. 60 00:04:13,360 --> 00:04:20,460 So whenever you want to monitor those traffic in case of windows, you have to add the Windows interface. 61 00:04:20,460 --> 00:04:24,780 For that, you have to go to the hardware section and device manager as well. 62 00:04:24,780 --> 00:04:25,310 You can do that. 63 00:04:25,560 --> 00:04:31,500 And from there you can add the hardware and you can select windows there that and you can get to see 64 00:04:31,500 --> 00:04:31,890 the. 65 00:04:32,880 --> 00:04:34,110 Oh, no, not really. 66 00:04:34,110 --> 00:04:38,700 You have to start with the network adapter and from there you have to select windows and then you will 67 00:04:38,700 --> 00:04:40,680 get an option to add the loop back. 68 00:04:40,830 --> 00:04:45,120 Once you do that, your loop back interface will be life and ready to use. 69 00:04:45,510 --> 00:04:47,880 So this is about the Wireshark interfaces. 70 00:04:48,150 --> 00:04:50,490 I, I hope you got the idea. 71 00:04:51,060 --> 00:04:57,990 Now, in order to go out further, it is very, very important to understand how the how the networking 72 00:04:57,990 --> 00:04:59,580 really works, including the. 73 00:05:00,110 --> 00:05:08,390 Protocol stack from beginning to the end, from the physical layer to the application layer, you have 74 00:05:08,390 --> 00:05:09,970 to understand every piece of it. 75 00:05:10,280 --> 00:05:12,680 So we'll get it sorted from there. 76 00:05:12,770 --> 00:05:14,580 And we'll catch you in the next lecture then. 77 00:05:14,840 --> 00:05:15,340 Thank you.