

Go to the frame details section and expand the line for Bootstrap Protocol (Request) as shown in Figure 2. Select one of the frames that shows DHCP Request in the info column. Note: With Wireshark 3.0, you must use the search term dhcp instead of bootp.įigure 1: Filtering on DHCP traffic in Wireshark This filter should reveal the DHCP traffic. Open the pcap in Wireshark and filter on bootp as shown in Figure 1. This pcap is for an internal IP address at 1. The first pcap for this tutorial, host-and-user-ID-pcap-01.pcap, is available here. NBNS traffic is generated primarily by computers running Microsoft Windows or Apple hosts running MacOS. DHCP traffic can help identify hosts for almost any type of computer connected to your network. How do we find such host information using Wireshark? We filter on two types of activity: DHCP or NBNS.

If you have access to full packet capture of your network traffic, a pcap retrieved on an internal IP address should reveal an associated MAC address and hostname. In most cases, alerts for suspicious activity are based on IP addresses. Windows user account from Kerberos trafficĪny host generating traffic within your network should have three identifiers: a MAC address, an IP address, and a hostname.Device models and operating systems from HTTP traffic.

