Wireshark Basics Cheat Sheet

Wireshark packet analysis: capture and display filters, interface selection, following streams, coloring rules, and common protocol analysis workflows.

Last Updated: May 1, 2025

Capture Filters (BPF Syntax)

ItemDescription
host 192.168.1.100Only traffic to/from this IP
net 192.168.1.0/24Traffic to/from entire subnet
port 80Only HTTP traffic (port 80)
tcp port 443Only HTTPS (TCP port 443)
not port 22Exclude SSH traffic
src host 10.0.0.1Only traffic FROM this host
dst port 53Only DNS responses (destination port 53)
icmpOnly ICMP (ping, traceroute)
tcp[tcpflags] & (tcp-syn) != 0Only TCP SYN packets (connection starts)

Display Filters

ItemDescription
ip.addr == 192.168.1.1Show packets with this IP (src or dst)
ip.src == 10.0.0.1Only packets FROM this IP
tcp.port == 443Traffic on TCP port 443
http.request.method == 'GET'Only HTTP GET requests
http.response.code == 404Only HTTP 404 responses
dns.qry.name contains 'google'DNS queries containing 'google'
tls.handshake.type == 1TLS ClientHello packets only
frame contains 'password'Search packet bytes for string (slow)
!(arp or dns or icmp)Exclude common noise protocols

Analysis Workflows

Follow TCP Stream
Right-click packet → Follow → TCP Stream (reassembles entire conversation)
Follow TLS Stream
Reassembles decrypted TLS conversation (needs session keys)
Statistics → Protocol Hierarchy
See packet distribution by protocol (percentage)
Statistics → Conversations
See which endpoints are talking (by IP, by port)
Statistics → IO Graph
Visualize throughput over time (troubleshoot bursts)
Analyze → Expert Info
Auto-detected warnings, errors, notes in capture

Decrypting TLS Traffic

SSLKEYLOGFILE
Set env var: export SSLKEYLOGFILE=~/sslkeys.log (Firefox/Chrome)
Wireshark → Preferences → TLS
Load key log file for real-time decryption
Private key method
Load RSA private key for RSA key exchange (pre-TLS 1.3 only)
Limitation
TLS 1.3 with forward secrecy requires key log — can't decrypt with cert alone
Pro Tip: Capture filters use BPF syntax (classic). Display filters use Wireshark's own syntax (more powerful). Start with a capture filter to limit data, then use display filters to analyze.