
Wireshark 2 Quick Start Guide
Secure your network through protocol analysis
- 164 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
Protect your network as you move from the basics of the Wireshark scenarios to detecting and resolving network anomalies.
Key Features
- Learn protocol analysis, optimization and troubleshooting using Wireshark, an open source tool
- Learn the usage of filtering and statistical tools to ease your troubleshooting job
- Quickly perform root-cause analysis over your network in an event of network failure or a security breach
Book Description
Wireshark is an open source protocol analyser, commonly used among the network and security professionals. Currently being developed and maintained by volunteer contributions of networking experts from all over the globe. Wireshark is mainly used to analyze network traffic, analyse network issues, analyse protocol behaviour, etc. - it lets you see what's going on in your network at a granular level. This book takes you from the basics of the Wireshark environment to detecting and resolving network anomalies.
This book will start from the basics of setting up your Wireshark environment and will walk you through the fundamentals of networking and packet analysis. As you make your way through the chapters, you will discover different ways to analyse network traffic through creation and usage of filters and statistical features. You will look at network security packet analysis, command-line utilities, and other advanced tools that will come in handy when working with day-to-day network operations.
By the end of this book, you have enough skill with Wireshark 2 to overcome real-world network challenges.
What you will learn
- Learn how TCP/IP works
- Install Wireshark and understand its GUI
- Creation and Usage of Filters to ease analysis process
- Understand the usual and unusual behaviour of Protocols
- Troubleshoot network anomalies quickly with help of Wireshark
- Use Wireshark as a diagnostic tool for network security analysis to identify source of malware
- Decrypting wireless traffic
- Resolve latencies and bottleneck issues in the network
Who this book is for
If you are a security professional or a network enthusiast who is interested in understanding the internal working of networks and packets, then this book is for you. No prior knowledge of Wireshark is needed.
Tools to learn more effectively

Saving Books

Keyword Search

Annotating Text

Listen to it instead
Information
Filtering Our Way in Wireshark
- Introducing capture filters
- Why and how to use capture filters
- Introducing display filters
- Why and how to use display filters
- Colorizing traffic
Introducing filters
Capture filters

- Capture (under input tab): Its purpose is to choose which interface you wish to listen on; multiple interfaces can also be selected to run in parallel. The details for every interface are listed under separate columns, such as Capture, Interface, the name of the interface, whether the promiscuous mode is enabled or not, and so on. Under the Capture dialog, you will see a checkbox to toggle the promiscuous mode, which enables you to listen to traffic that is not generated from or headed to your machine.
- Manage Interfaces: Facilitates addition or removal of a new interface for listening purposes. You can add even remote machine interfaces to listen remotely.
- Capture Filter: Lists capture filters and also facilitates the addition of new user-defined filters:


- Open the Capture Options dialog.
- Click on Capture Filter.
- Click on New.
- Write Filtering Host inside the Filter name textbox.
- Write host 10.10.10.157 inside the Filter String textbox:

- Once done, click on OK; if you've entered everything correctly (mostly the filter expression), the textbox followed by the Capture Filter button will be displayed with a green background.
- Capture Files (under output tab): Use this option to append stream of packets to an existing trace file. The captured packets will be added to the file of your choice. If you haven't chosen any, a temporary file will be created. For more advanced way of saving packets to single/multiple files, try the following:
- Create a new file automatically after: After capturing a certain amount of data (KB, MB or GB), Wireshark will create a new file to save a stream of packets. For instance, I want to create a new file after Wireshark captures 2 MBs of data.
- Next File Every (time): After a certain amount of time (seconds, minutes, or hours), Wireshark will create a new file to save a stream of packets. For instance, I want to create a new file every five minutes.
- Ring buffer: Use this option to set a limit for creation of new files based on the pr...
Table of contents
- Title Page
- Copyright and Credits
- Packt Upsell
- Contributors
- Preface
- Installing Wireshark
- Introduction to Wireshark and Packet Analysis
- Filtering Our Way in Wireshark
- Analyzing Application Layer Protocols
- Analyzing the Transport Layer Protocols TCP/UDP
- Network Security Packet Analysis
- Analyzing Traffic in Thin Air
- Mastering the Advanced Features of Wireshark
- Other Books You May Enjoy
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app