Wireshark Tutorial
Overview
This guide will attempt to walk you through some of the basics of using Wireshark to capture and analyze network packets. By the end you should have some familiarity with how to navigate the user interface of Wireshark.
Goals:
- Capture packets
- Use Wireshark filters
- Follow streams of data
Estimated Time: 45 Minutes
Instructions
Wireshark Profile
The screenshots in this walkthrough show a slightly modified version of Wireshark based on the setup from Part 2 of Unit42’s Wireshark Workshop. If you aren’t using the class VMs and want the same Wireshark profile, you can download and set it up like so:
Wireshark ProfileHow to Import Profile to Wireshark




Take your first capture
Start a packet capture by clicking the blue shark fin icon in the upper left part of the window. Alternatively, you can double click on the interface you want to capture from in the main window.

Let this go for a little bit until you see some packets, then stop the capture.

Fix missing headers
If missing Src and Src Port in the table headers of the default view,
right-click one of the column names and use the context menu to add them back.

Review packet hierarchy
To get a sense of the different types of packets in this pcap, use the statistics menu to open the packet hierarchy.


Capture a PING command
Start a new capture by pressing the shark fin and choose:
Continue without Saving

Then run ping 1.1.1.1 in a terminal.

After it finishes, don’t forget to stop the capture.

Filter traffic for ICMP packets
Use the filter bar at the top of the window to only show packets that match the
filter you type. It will turn green once you have entered a valid filter. Use
the filter icmp to only show our ping packets.

Capture some browsing data for httpforever.com
Next start a new capture and then use a browser to navigate to http://httpforever.com/.

Don’t forget to stop your capture after you open the webpage.

Review DNS requests
To start with analyzing this traffic, your browser needs to translate the website name into an IP address. The DNS protocol is used for that so use the filter bar to only show those types of packets.

Once you’ve found the DNS request for httpforever.com, you’ll want to find the
corresponding response packet. You can use the src and dst port to find it
manually. Wireshark has a really nice color coding feature to help you match up
conversations.


Follow the stream to see HTTP traffic
To see the actual content of your browsing session, filter for HTTP traffic.

Find one of the tcp packets associated with browsing to httpforever.com by
looking for the URL in the packet descriptions. Then right click on this packet
and choose Follow > TCP Stream.

Note the HTTP headers, Request type, Response code and Content.

Walkthrough complete
Great work! You now know the basics of how to use Wireshark!