Wireshark Cheat Sheet

Wireshark is arguably the most popular and powerful tool you can use to capture, analyze and troubleshoot network traffic. The only downside you will face when using a tool as verbose as Wireshark is memorizing all of the commands, flags, filters, and syntax. That’s where we come in.

Whether you are a network administrator, a security professional, or just someone curious about how networks work, learning to use Wireshark is a valuable skill. This Wireshark cheat sheet will provide a solid foundation and reference for using Wireshark to monitor and analyze your network traffic.

Wireshark Cheat Sheet

Default Columns In a Packet Capture Output

NameDescription
No.Frame number from the beginning of the packet capture
TimeSeconds from the first frame
Source (src)Source address, commonly an IPv4, IPv6 or Ethernet address
Destination (dst)Destination address
ProtocolProtocol used in the Ethernet frame, IP packet, or TC segment
LengthLength of the frame in bytes

Logical Operators

OperatorDescriptionExample
and or &&Logical ANDAll the conditions should match 
or or ||Logical OREither all or one of the conditions should match
xor or ^^Logical XORExclusive alterations - only one of the two conditions should match not both 
not or !Not (Negation)Not equal to 
[ n ] [ … ]Substring operatorFilter a specific word or text 

Display Filter Logical Operations

EnglishC-likeDescriptionExample

and

&&

Logical AND

ip.src==10.0.0.5 and tcp.flags.fin

or

||

Logical OR

ip.src==10.0.0.5 or ip.src==192.1.1.1

xor

^^

Logical XOR

tr.dst[0:3] == 0.6.29 xor tr.src[0:3] == 0.6.29

not

!

Logical NOT

not llc

[…]


Subsequence

See “Slice Operator” below.

in


Set Membership

http.request.method in {"HEAD", "GET"}. See “Membership Operator” below.

Filtering Packets (Display Filters)

OperatorDescriptionExample
eq or ==Equalip.dest  ==  192.168.1.1
ne or !=Not equalip.dest  !=   192.168.1.1
gt or >Greater thanframe.len   >   10
it or <less thanframe.len  <   10
ge or >=Greater than or equalframe.len  >=   10
le or <=Less than or equalframe.len  <=   10

Display Filter comparison operators

EnglishAliasC-likeDescriptionExample

eq

any_eq

==

Equal (any if more than one)

ip.src == 10.0.0.5

ne

all_ne

!=

Not equal (all if more than one)

ip.src != 10.0.0.5


all_eq

===

Equal (all if more than one)

ip.src === 10.0.0.5


any_ne

!==

Not equal (any if more than one)

ip.src !== 10.0.0.5

gt


>

Greater than

frame.len > 10

lt


<

Less than

frame.len < 128

ge


>=

Greater than or equal to

frame.len ge 0x100

le


<=

Less than or equal to

frame.len <= 0x20

contains



Protocol, field or slice contains a value

sip.To contains "a1762"

matches


~

Protocol or text field matches a Perl-compatible regular expression

http.host matches "acme\\.(org|com|net)"

Display Filter Arithmetic Operations

NameSyntaxAlternativeDescription

Unary minus

-A


Negation of A

Addition

A + B


Add B to A

Subtraction

A - B


Subtract B from A

Multiplication

A * B


Multiply A times B

Division

A / B


Divide A by B

Modulo

A % B


Remainder of A divided by B

Bitwise AND

A & B

A bitand B

Bitwise AND of A and B

An unfortunate quirk in the filter syntax is that the subtraction operator must be preceded by a space character, so "A-B" must be written as "A -B" or "A - B".

Arithmetic expressions can be grouped using curly braces.

For example, frames where capture length resulted in truncated TCP options:

frame.cap_len < { 14 +  ip.hdr_len + tcp.hdr_len }

Display Filter Functions

FunctionDescription

upper

Converts a string field to uppercase.

lower

Converts a string field to lowercase.

len

Returns the byte length of a string or bytes field.

count

Returns the number of field occurrences in a frame.

string

Converts a non-string field to a string.

vals

Converts a field value to its value string, if it has one.

dec

Converts an unsigned integer field to a decimal string.

hex

Converts an unsigned integer field to a hexadecimal string.

float

Converts a field to single precision floating point.

double

Converts a field to double precision floating point.

max

Return the maximum value for the arguments.

min

Return the minimum value for the arguments.

abs

Return the absolute value for the argument.

The upper and lower functions can used to force case-insensitive matches: lower(http.server) contains "apache".

To find HTTP requests with long request URIs: len(http.request.uri) > 100. Note that the len function yields the string length in bytes rather than (multi-byte) characters.

Usually an IP frame has only two addresses (source and destination), but in case of ICMP errors or tunneling, a single packet might contain even more addresses. These packets can be found with count(ip.addr) > 2.

The string function converts a field value to a string, suitable for use with operators like "matches" or "contains". Integer fields are converted to their decimal representation. It can be used with IP/Ethernet addresses (as well as others), but not with string or byte fields.

For example, to match odd frame numbers:

string(frame.number) matches "[13579]$"

To match IP addresses ending in 255 in a block of subnets (172.16 to 172.31):

string(ip.dst) matches r"^172\.(1[6-9]|2[0-9]|3[0-1])\.[0-9]{1,3}\.255"

The vals function converts an integer or boolean field value to a string using the field’s associated value string, if it has one.

The double function converts certain field types to doubles, including floats, doubles (a no-op), integers, booleans, times (absolute times are converted to seconds since the UN*X epoch), and the special IEEE 11073 Personal Health Devices floating point formats. The results can be used with further arithmetic operations and, like other filters, placed in a custom column.

The functions max() and min() take any number of arguments of the same type and returns the largest/smallest respectively of the set.

max(tcp.srcport, tcp.dstport) <= 1024

Filter Types

Name Description
Capture filterFilter packets during capture
Display filterHide packets from a capture display

Wireshark Capturing Modes

NameDescription
Promiscuous modeSets interface to capture all packets on a network segment to which it is associated to
Monitor modeSetup the wireless interface to capture all traffic it can receive (Unix/ Linux only)

Miscellaneous

NameDescription
Slice Operator[ … ] - Range of values
Membership Operator{} - In
CTRL+EStart/Stop Capturing

Capture Filter Syntax

SyntaxProtocolDirectionHostsValueLogical OperatorExpressions
Exampletcpsrc192.168.1.180andtcp dst 202.164.30.1

Display Filter Syntax

SyntaxProtocolString 1String 2Comparison OperatorValueLogical OperatorExpressions
Examplehttpdestip==192.168.1.1andtcp port

Keyboard Shortcuts - Main Display Window

AcceleratorDescriptionAcceleratorDescription
Tab or Shift+TabMove between screen elements, e.g. from the toolbars to the packet list to the packet detail.Alt+→ or Option→Move to the next packet in the selection history.
Move to the next packet or detail item.In the packet detail, opens the selected tree item.
 Move to the previous packet or detail item.Shift+→In the packet detail, opens the selected tree items and all of its subtrees.
Ctrl+ ↓ or F8 Move to the next packet, even if the packet list isn't focused.Ctrl+→In the packet detail, opens all tree items.
Ctrl+ ↑ Or F7Move to the previous packet, even if the packet list isn't focusedCtrl+←In the packet detail, closes all the tree
Ctrl+.Move to the next packet of the conversation (TCP, UDP or IP).BackspaceIn the packet detail, jumps to the parent node.
Ctrl+,Move to the previous packet of the conversation (TCP, UDP or IP).Return or EnterIn the packet detail, toggles the selected tree item.

Protocols - Values

ether,  fddi,  ip,  arp,  rarp,  decnet,  lat, sca,  moprc,  mopdl,  tcp  and  udp

Common Filtering Commands

UsageFilter Syntax
Wireshark Filter by IPip.add == 10.10.50.1
Filter by Destination IPip.dest == 10.10.50.1
Filter by Source IPip.src == 10.10.50.1
Filter by IP rangeip.addr >= 10.10.50.1 and ip.addr <=10.10.50.100
Filter by Multiple Ipsip.addr == 10.10.50.1 and ip.addr == 10.10.50.100
Filter out IP adress! (ip.addr == 10.10.50.1)
Filter subnetip.addr == 10.10.50.1/24
Filter by porttcp.port == 25
Filter by destination porttcp.dstport == 23
Filter by ip adress and portip.addr == 10.10.50.1 and Tcp.port == 25
Filter by URLhttp.host == "host name"
Filter by time stampframe.time >= "June 02, 2019 18:04:00"
Filter SYN flagTcp.flags.syn == 1 and tcp.flags.ack ==0
Wireshark Beacon Filterwlan.fc.type_subtype = 0x08
Wireshark broadcast filtereth.dst == ff:ff:ff:ff:ff:ff
Wireshark multicast filter(eth.dst[0] & 1)
Host name filterip.host = hostname
MAC address filtereth.addr == 00:70:f4:23:18:c4
RST flag filtertcp.flag.reset == 1

Main Toolbar Items

Wireshark Cheat Sheet

Toolbar IconToolbar ItemMenu ItemDescription 

Wireshark Cheat Sheet

StartCapture → StartUses the same packet capturing options as the previous session, or uses defaults if no options were set

Wireshark Cheat Sheet

StopCapture → StopStops currently active capture

Wireshark Cheat Sheet

RestartCapture → RestartRestart active capture session

Wireshark Cheat Sheet

Options...Capture → Options…Opens "Capture Options" dialog box

Wireshark Cheat Sheet

Open...File →open…Opens "File open" dialog box to load a capture for viewing

Wireshark Cheat Sheet

Save As...File → Save As…Save current capture file

Wireshark Cheat Sheet

CloseFile →CloseClose current capture file

Wireshark Cheat Sheet

ReloadView → ReloadReload current capture file

Wireshark Cheat Sheet

Find Packet...Edit →Find Packet…Find packet based on different criteria

Wireshark Cheat Sheet

Go BackGo → Go backJump back in the packet history

Wireshark Cheat Sheet

Go ForwardGo → Go ForwardJump forward in the packet history

Wireshark Cheat Sheet

Go to Packet... Go → Go to Packet…Go to specific packet

Wireshark Cheat Sheet

Go to First PacketGo → Go to First PacketJump to first packet of the capture file

Wireshark Cheat Sheet

Go to last PacketGo → Go to last PacketJump to last packet of the capture file

Wireshark Cheat Sheet

Auto Scroll in Live CaptureView → Auto Scroll in Live CaptureAuto scroll packet list during live capture

Wireshark Cheat Sheet

ColorizeView → ColorizeColorize the packet list (or not)

Wireshark Cheat Sheet

Zoom InView → Zoom InZoom into the packet data (increase the font size)

Wireshark Cheat Sheet

Zoom OutView → Zoom OutZoom out of the packet data (decrease the font size)

Wireshark Cheat Sheet

Normal SizeView → Normal SizeSet zoom level back to 100%

Wireshark Cheat Sheet

Resize ColumnsView → Resize ColumnsResize columns, so the content fits the width


参考:

anzhihe 安志合个人博客,版权所有 丨 如未注明,均为原创 丨 转载请注明转自:https://chegva.com/6334.html | ☆★★每天进步一点点,加油!★★☆ | 

您可能还感兴趣的文章!

发表评论

电子邮件地址不会被公开。 必填项已用*标注