


Filtersīut the main issue when you are looking for something specific on Wireshark, is to filter the packets list (the first table). So, I won’t give you more details here, but you can check the official documentation to learn more about it.
#CAPTURE PACKETS WIRESHARK COMMAND LINE FULL#
Packet analysis with Wireshark could be a dedicated article, or even a full book on its own.
#CAPTURE PACKETS WIRESHARK COMMAND LINE HOW TO#
I’ll show you how to filter this list in the next section. For example, if you are looking for suspect HTTP activity from a specific IP address, you can skip everything unrelated (like DNS requests and other IP addresses). It will help you to select the ones you are interested in. On the first part, you’ll see the macro information, like source, destination and protocol. Packet bytes: the exact packet content, with bytes and hexadecimal format (less useful for us ^^).Packet details: when you select one packet, you can see its content, in a more or less readable text format.Where you can see all captured packets, and use the display filters to only show those that interest you. Packets analysisĪfter doing a capture of the network traffic, you can then analyze its content. It will keep capturing the network traffic until you press the stop button (the red one in the top bar). If everything is working properly, the window will start to be filled with a table refreshing constantly:Įach line is a packet detected by Wireshark.You can also double-click on the interface name on the home page, use the capture menu, or just press CTRL+E. Click on the first icon in the top bar.In general, it will be “eth0” if your computer is plugged via Ethernet, or “wlan0” if you are using a Wi-Fi connection. Select the interface you want to capture in the list.This will be pretty useful for the analysis part I’ll introduce later (and it’s also used by hackers and pen-testers).Īnyway, here is how to start a capture with Wireshark: If your computer is just one element of your network, it will mostly be your own network usage, and a few talks between your device and the other ones.īut when your device is an important node of this network (DNS server, gateway, etc.), it will record almost anything happening on the network. Basically, the idea is to listen what’s happening on one of your network interfaces. The main feature that you’ll use frequently with Wireshark is the capture.

I won’t explain everything in this article, but I absolutely want to explain how to capture the network traffic and analyzer the results, so let’s get right to it. And you have the full menu for all the ninja features included in this tool. You also need to pick a network interface to listen to (in general, it will be eth0). You’ll find the main actions in the shortcut bar at the top of the screen. When you start Wireshark for the first time, the interface looks like this: Let’s browse the most important features together.

If you haven’t used this tool, the difficulty is probably starting now to understand exactly what it does and how to use it. Installing Wireshark is pretty straightforward. More details How To Use Wireshark on Kali Linux Become an ethical hacker that can hack computer systems like black hat hackers and secure them like security experts.
