Ask Your Question
0

Why does Wireshark detect activity from my Win11 laptop connected to a Sharktap network tap's Wired Tap port?

asked 2025-09-23 18:03:32 +0000

Kerry is me gravatar image

updated 2025-09-25 19:02:22 +0000

Guy Harris gravatar image

I read that the ethernet port would be automatically disabled to traffic and put into promiscuous mode for listening purposes in the instructions.

Somehow I got back that my Wireshark machine did a host announcement and sent standard query responses directed at hosts outside my network.

Did I read the theory of operation wrong or were the instructions on the Sharktap lying too?

Really seems odd to me!

edit retag flag offensive close merge delete

Comments

So the quick start guide is for the Sharktap USB. Presumably you used the two Network ports to insert the Sharktap into some existing wired network; did you connect the USB TAP port into a USB port on the machine running Wireshark or did you use the Wired Tap Ethernet port and connect that to an Ethernet port on that machine?

Guy Harris gravatar imageGuy Harris ( 2025-09-23 22:43:42 +0000 )edit

I connected the ethernet port on the laptop running wiretap to the tap port on the shark tap just like all of the instructions said. That port is on the side. The through ports are on the end. all connected correctly.

All of that is neither here nor there if Wireshark can't shut up the ethernet port so that it mixes the laptop's ethernet to cry out for dchp while I'm doing a capture!

Never mind - nobody here has a clue either. Bunch of self proclaimed experts.

Kerry is me gravatar imageKerry is me ( 2025-09-23 23:03:14 +0000 )edit

3 Answers

Sort by » oldest newest most voted
0

answered 2025-09-24 22:16:15 +0000

Guy Harris gravatar image

I read that the ethernet port would be automatically disabled to traffic and put into promiscuous mode for listening purposes in the instructions.

If by that you're referring to

Ethernet Adapter mode: The SharkTap can also be used as a network adapter. Both NETWORK ports must be left unconnected in this mode. Functionally, the only difference in this mode is that the SharkTap will route packets from the USB Host. In TAP mode, the SharkTap will only send packets to the USB Host.

that appears to refer to plugging a Sharktap USB into a USB port on the host, rather than into an Ethernet port as you said you did. For plugging the tap into a Ethernet port on the host running Wireshark (or any other sniffer), the Sharktap instructions say:

Wired TAP mode: If you plug a cable into the ‘Wired TAP’ port (and the SharkTap establishes a link), the Wired TAP port will become the mirroring port. In this mode a USB host is not needed – the USB port only requires power.

which says nothing about whether packets sent to the Sharktap over that Ethernet cable will get sent out on either of the network ports.

For connecting the tap to a sniffing host over USB rather than Ethernet, the Sharktap instructions refer the reader to "The midbittech.com/usb website"; that site says, in the first paragraph:

One of the advantages of the USB SharkTap is that you can have virtual Ethernet port dedicated to network sniffing, rather than reconfiguring a port sometimes used for other purposes. The following two setting are not absolutely necessary, but are recommended. The first setting minimizes the number of packets your PC will attempt to transmit over the virtual port. The SharkTap will not route any packets sent from your PC to the Network ports, but Wireshark will still show these packets, which can clutter up a capture. The second setting enables jumbo packets, which is necessary if you are sniffing a link with jumbo packets. The 3rd setting shows how to avoid having VLAN tags stripped, so you can see them in Wireshark.

and then gives configuring instructions for the USB Ethernet adapter that should show up when you plug the Sharktap USB into the host over USB. Those instructions arrange to make sure that the USB Ethernet adapter in question doesn't do networking but is available as a capture device.

if Wireshark can't shut up the ethernet port

Wireshark currently does not include any code to disable network traffic on network ports on which it captures. I suspect many users would be very upset if Wireshark automatically shut off networking on any port on which it's capturing, especially if the user's trying to capture actively - i.e., capturing the traffic on the machine running Wireshark - rather than passively.

Note, by the way, that Wireshark itself may use various networking protocols; for example, it may use DNS to determine the host names corresponding to IP ... (more)

edit flag offensive delete link more
0

answered 2025-09-24 07:30:37 +0000

hugo.vanderkooij gravatar image

Had a quick look at https://www.amazon.nl/Kosiy-SharkTap-... and it seems it is meant to tap traffic without inserting any traffic from a machine running wireshark.

But if your laptop sends out traffic on this link then it will show up on wireshark. That is a design issue with your laptop not with the tap.

edit flag offensive delete link more
0

answered 2025-09-23 19:28:00 +0000

SYN-bit gravatar image

I can not comment on the Sharktap instructions, as those are third-party (do you have a link to the instructions?). As for the interface of the capturing system, promiscuous mode only means packets that would normally be dropped at the NIC (unicast packet not for it's own mac-address and multicast packets for groups that the nic was not subscribed to) will now be forwarded to the OS. There is no mechanism in the capturing host that prevents outgoing packets. Unless you remove the networking stacks from the interface of course.

edit flag offensive delete link more

Comments

https://midbittech.com/usb/USB%20Star...

There's the link. You read it.

Kerry is me gravatar imageKerry is me ( 2025-09-23 21:33:20 +0000 )edit

It reads (Note: Any packets generated by your PC will not actually be routed to the NETWORK ports)., which means that packets arriving on the TAP port of the SharkTap will not be forwarded to the NETWORK ports of the SharkTap. It says nothing about disabling packets being generated on the capturing host.

As I said, if you want the capture interface (that is connected to the TAP port of the SharkTap) to be silent, you need to remove/disable IPv4 and IPv6 (and possibly other networking protocols) from that interface.

SYN-bit gravatar imageSYN-bit ( 2025-09-24 19:43:11 +0000 )edit

Your Answer

Please start posting anonymously - your entry will be published after you log in or create a new account.

Add Answer

Question Tools

1 follower

Stats

Asked: 2025-09-23 18:03:32 +0000

Seen: 1,379 times

Last updated: yesterday