Press ESC to close

The Ultimate Wireshark Cheat Sheet: Master Network Analysis Like a Pro

Wireshark is the go-to tool for anyone diving into the world of network analysis, cybersecurity, or even Capture The Flag (CTF) challenges. Whether you’re troubleshooting, learning the ropes, or preparing for a red team engagement, this Wireshark cheat sheet is your one-stop guide to getting things done efficiently.


What is Wireshark?

Wireshark is a free and open-source packet analyzer. It captures and inspects data traveling across a network in real-time. Think of it as a microscope for network traffic—it reveals what’s happening under the hood, packet by packet.

Key Use Cases:

  • Debugging network issues.
  • Identifying malicious traffic or attacks.
  • Analyzing performance bottlenecks.
  • Reverse engineering protocols.


Getting Started

ActionShortcut/StepsDescription
Start CaptureCtrl + E or click the shark fin iconBegin capturing network traffic in real-time.
Stop CaptureCtrl + EStop capturing traffic.
Open Saved CaptureCtrl + OLoad .pcap or .pcapng files for analysis.
Save CaptureCtrl + SSave current session for later.

Filters Syntax

Filters are your most powerful tool in Wireshark, letting you isolate exactly what you need from the noise.

Filter TypeSyntax ExampleDescription
Protocolhttp, dns, tcp, udpShow packets for a specific protocol.
IP Addressip.addr == 192.168.1.1Match packets involving a specific IP.
Source IPip.src == 192.168.1.1Show packets from a specific IP.
Destination IPip.dst == 192.168.1.1Show packets to a specific IP.
Porttcp.port == 80Filter packets on a specific port (e.g., HTTP).
Text in Packetsframe contains "password"Find packets with specific text or keywords.
Logical Operators(ip.src == 192.168.1.1) && (tcp.port == 80)Combine filters with &&, `

Common Filters

Use CaseFilter SyntaxDescription
Find Slow Connectionstcp.analysis.retransmissionIdentify retransmitted packets.
Track HTTPS Handshakestls.handshake.type == 1Spot ClientHello packets in SSL/TLS.
Search for HTTP POSTshttp.request.method == "POST"Analyze login forms and data submissions.
Spot Malicious Domainsdns.qry.name contains "suspicious.com"Find DNS queries to malicious sites.
Analyze ICMP TrafficicmpDisplay all ping and ICMP traffic.

Wireshark Features

FeatureHow to AccessDescription
Follow StreamsRight-click a packet > Follow > TCP StreamView a full conversation for analysis.
Protocol HierarchyStatistics > Protocol HierarchyBreakdown of protocols in your capture.
Export PacketsFile > Export Specified PacketsSave specific packets for sharing or debugging.
IO GraphStatistics > IO GraphVisualize traffic over time.

Wireshark Shortcuts

ActionShortcutDescription
Start/Stop CaptureCtrl + EToggle live packet capture.
Search PacketsCtrl + FFind specific packets by content or fields.
Clear FilterCtrl + /Reset your filter bar to show all traffic.
Jump to PacketCtrl + GGo to a specific packet number.
Save ProfileEdit > Configuration ProfilesSave layouts, filters, and settings.

Pro Tips for Wireshark Power Users

  1. Customize Coloring Rules:
    • Go to View > Coloring Rules to highlight traffic patterns. For example, make TCP resets stand out in red.
  2. Use Profiles:
    • Save your favorite filters and layouts under Edit > Configuration Profiles. Switch profiles for different tasks.
  3. Leverage Capture Filters:
    • Capture only what you need to save space and improve performance. Example: port 80 to capture only HTTP traffic.

Wireshark Cheat Sheet Recap

Wireshark is an incredibly powerful tool for network professionals, ethical hackers, and CTF enthusiasts. By mastering filters, using statistics tools, and leveraging shortcuts, you can quickly analyze even the most complex captures.

Make Wireshark a part of your daily toolkit, and you’ll soon uncover insights hiding in plain sight. Happy packet hunting! 🦈

Leave a Reply

Your email address will not be published. Required fields are marked *