π― Project Goal
This project teaches how the network really works, which is essential for DevOps.
By the end of this project, you will understand:
- What Wireshark is
- How to capture traffic
- Difference between MAC address and IP address
- What TLS Client Hello is
- Why DevOps engineers use Wireshark (sometimes)
π§© Project Structure
- Install Wireshark
- Fix permissions
- Capture live traffic
- Identify HTTPS traffic
- Inspect TLS Client Hello
- Explain MAC vs IP behavior
- Answer DevOps questions
STEP 1 β Download Wireshark
Official website (IMPORTANT)
https://www.wireshark.org/download.html
Installation
-
macOS: Download
.dmg -
During install:
- β Install ChmodBPF
- β Allow permissions
π‘ Explain:
ChmodBPF allows Wireshark to capture packets safely without root.
STEP 2 β Start Wireshark
- Open Wireshark
- Choose interface:
-
Wi-Fi (en0) (most students)
- Click Start
STEP 3 β Generate Network Traffic
Ask students to:
- Open browser
- Visit:
https://google.com
Tell them:
Wireshark only shows traffic that actually happens.
STEP 4 β Filter TLS Traffic
In the Display Filter bar, enter:
tls
What students should see
- TLS packets
- βApplication Dataβ
- Encrypted communication
Explain:
HTTPS traffic is encrypted. Wireshark shows metadata, not passwords.
STEP 5 β Find TLS Client Hello
Apply this filter:
tls.handshake.type == 1
STEP 6 β Inspect MAC and IP Addresses
Click one packet and expand:
- Ethernet II
- Internet Protocol
Explain:
- Source MAC = router
- Destination MAC = laptop
- IP addresses stay end-to-end
- MAC addresses change at every router
MAC is local, IP is global.
STEP 7 β Stop Capture
Click the red square to stop capture.
β Project Success Criteria
- Capture packets
- Filter TLS traffic
- Identify Client Hello
- Explain MAC vs IP
- Explain why TLS hides data
π DevOps Mapping (Explain to Students)
| Concept | DevOps Use |
|---|---|
| TLS | Secure APIs |
| IP routing | Cloud networking |
| MAC | VPC / ENI internals |
| Wireshark | Deep debugging |
βWireshark helps us understand how applications communicate over the network, even when data is encrypted.β
Top comments (0)