Wireshark Quick Reference
Hackers Manifest - hackersmanifest.com
Comprehensive quick reference for Wireshark - the world's most popular network protocol analyzer for traffic capture and analysis.
🔍 Basic Display Filters
| Filter by IP address | ip.addr == 192.168.1.1 |
| Source IP only | ip.src == 192.168.1.1 |
| Destination IP only | ip.dst == 192.168.1.1 |
| Filter by port | tcp.port == 80 |
| Source port only | tcp.srcport == 443 |
| Destination port only | tcp.dstport == 22 |
| Filter by protocol | http or dns or tcp |
| Exclude protocol | !arp or not arp |
| IP subnet | ip.addr == 192.168.1.0/24 |
📡 Protocol Filters
| HTTP traffic | http |
| HTTPS/TLS traffic | tls or ssl |
| DNS queries | dns |
| DHCP traffic | dhcp or bootp |
| ARP traffic | arp |
| ICMP (ping) | icmp |
| SMB traffic | smb or smb2 |
| FTP traffic | ftp or ftp-data |
| SSH traffic | ssh |
| Telnet traffic | telnet |
🌐 HTTP Analysis
| HTTP requests | http.request |
| HTTP responses | http.response |
| GET requests | http.request.method == "GET" |
| POST requests | http.request.method == "POST" |
| Specific URI | http.request.uri contains "login" |
| Response code 200 | http.response.code == 200 |
| Response code 404 | http.response.code == 404 |
| Server errors (5xx) | http.response.code >= 500 |
| Specific host | http.host == "example.com" |
| User-Agent filter | http.user_agent contains "Mozilla" |
🔗 TCP Analysis
| TCP SYN packets | tcp.flags.syn == 1 |
| TCP SYN-ACK | tcp.flags.syn == 1 and tcp.flags.ack == 1 |
| TCP RST packets | tcp.flags.reset == 1 |
| TCP FIN packets | tcp.flags.fin == 1 |
| TCP retransmissions | tcp.analysis.retransmission |
| TCP duplicate ACKs | tcp.analysis.duplicate_ack |
| TCP window zero | tcp.window_size == 0 |
| TCP stream | tcp.stream == 5 |
| TCP problems | tcp.analysis.flags |
🔤 DNS Analysis
| DNS queries | dns.flags.response == 0 |
| DNS responses | dns.flags.response == 1 |
| Specific domain | dns.qry.name contains "example" |
| A record queries | dns.qry.type == 1 |
| AAAA record queries | dns.qry.type == 28 |
| MX record queries | dns.qry.type == 15 |
| TXT record queries | dns.qry.type == 16 |
| NXDOMAIN responses | dns.flags.rcode == 3 |
| DNS over TCP | dns and tcp |
🔀 Logical Operators
| AND operator | ip.src == 10.0.0.1 and tcp.port == 80 |
| OR operator | tcp.port == 80 or tcp.port == 443 |
| NOT operator | not arp or !arp |
| Parentheses grouping | (ip.src == 10.0.0.1) and (tcp or udp) |
| Contains string | http.host contains "google" |
| Matches regex | http.host matches ".*\.google\.com" |
| In range | tcp.port in {80 443 8080} |
| Greater than | frame.len > 1000 |
| Less than | tcp.window_size < 1000 |
📶 Wireless (802.11)
| All 802.11 traffic | wlan |
| Beacon frames | wlan.fc.type_subtype == 0x08 |
| Probe requests | wlan.fc.type_subtype == 0x04 |
| Probe responses | wlan.fc.type_subtype == 0x05 |
| Authentication | wlan.fc.type_subtype == 0x0b |
| Deauthentication | wlan.fc.type_subtype == 0x0c |
| Specific BSSID | wlan.bssid == aa:bb:cc:dd:ee:ff |
| Specific SSID | wlan.ssid == "NetworkName" |
| EAPOL (4-way handshake) | eapol |
⚠️ Security Analysis
| Cleartext passwords (FTP) | ftp.request.command == "PASS" |
| Cleartext passwords (HTTP) | http.request.method == "POST" |
| Telnet traffic | telnet |
| Possible port scan | tcp.flags.syn == 1 and tcp.flags.ack == 0 |
| ARP spoofing | arp.duplicate-address-detected |
| ICMP redirect | icmp.type == 5 |
| Suspicious DNS (long names) | dns.qry.name.len > 50 |
| SMB null sessions | smb.uid == 0 |
| TLS handshake | tls.handshake |
⌨️ Essential Keyboard Shortcuts
Capture
| Start capture | Ctrl+E |
| Stop capture | Ctrl+E |
| Restart capture | Ctrl+R |
| Capture options | Ctrl+K |
File Operations
| Open file | Ctrl+O |
| Save as | Ctrl+Shift+S |
| Close file | Ctrl+W |
Ctrl+P |
Navigation
| Go to packet | Ctrl+G |
| Find packet | Ctrl+F |
| Next packet | Ctrl+Down |
| Previous packet | Ctrl+Up |
Analysis
| Follow TCP stream | Ctrl+Alt+Shift+T |
| Follow HTTP stream | Ctrl+Alt+Shift+H |
| Apply display filter | Enter |
| Clear display filter | Ctrl+/ |
Marking
| Mark/Unmark packet | Ctrl+M |
| Next marked | Shift+Ctrl+N |
| Previous marked | Shift+Ctrl+B |
| Ignore packet | Ctrl+D |
View
| Zoom in | Ctrl++ |
| Zoom out | Ctrl+- |
| Reset zoom | Ctrl+0 |
| Time display toggle | Ctrl+T |
💻 tshark CLI Commands
List Interfaces
tshark -D Show all available capture interfaces
Capture on Interface
tshark -i eth0 -w capture.pcap Capture traffic on eth0 and save to file
Read Capture File
tshark -r capture.pcap Read and display packets from file
Apply Display Filter
tshark -r capture.pcap -Y "http.request" Filter packets using display filter
Extract Specific Fields
tshark -r capture.pcap -T fields -e ip.src -e ip.dst Extract source and destination IPs
Capture with BPF Filter
tshark -i eth0 -f "port 80" -w http.pcap Capture only port 80 traffic
Statistics - Conversations
tshark -r capture.pcap -q -z conv,tcp Show TCP conversation statistics
Protocol Hierarchy
tshark -r capture.pcap -q -z io,phs Show protocol hierarchy statistics
🎯 Capture Filters (BPF Syntax)
Capture filters use Berkeley Packet Filter (BPF) syntax and are applied during capture to reduce file size.
host 192.168.1.1 Traffic to/from specific host net 192.168.1.0/24 Traffic to/from subnet port 80 Traffic on port 80 tcp port 443 TCP traffic on port 443 src host 10.0.0.1 Traffic from specific source dst port 22 Traffic to destination port 22 not arp Exclude ARP traffic tcp and port 80 or port 443 TCP web traffic only ether host aa:bb:cc:dd:ee:ff Traffic by MAC address icmp ICMP traffic only 🔬 Common Analysis Tasks
Follow TCP Stream
Right-click packet → Follow → TCP Stream
Reconstructs entire TCP conversation
Export HTTP Objects
File → Export Objects → HTTP
Extract files transferred over HTTP
View Endpoints
Statistics → Endpoints
List all IPs and their traffic volume
View Conversations
Statistics → Conversations
Show all communication pairs
Protocol Hierarchy
Statistics → Protocol Hierarchy
View protocol distribution in capture
I/O Graph
Statistics → I/O Graph
Visualize traffic over time
Expert Information
Analyze → Expert Information
Find anomalies and errors in capture
Decrypt TLS
Edit → Preferences → Protocols → TLS → RSA keys list
Decrypt HTTPS with private key or SSLKEYLOGFILE
Generated from Hackers Manifest | For authorized security testing only | hackersmanifest.com