Wireshark Cheat Sheet – Quick Network Analysis Guide

Wireshark Cheat Sheet

The Ultimate Guide for Network Protocol Analysis

Introduction to Wireshark

Wireshark is the world’s foremost network protocol analyzer. It lets you capture and interactively browse the traffic running on a computer network.

Key Features

  • Deep inspection of hundreds of protocols
  • Live capture and offline analysis
  • Multi-platform: Windows, Linux, macOS
  • Rich VoIP analysis
  • Powerful display filters

Interface Components

  • Packet List Pane (top)
  • Packet Details Pane (middle)
  • Packet Bytes Pane (bottom)
  • Display Filter Bar
  • Status Bar

Pro Tip

Use the official Wireshark Sample Captures for practice: wiki.wireshark.org/SampleCaptures

Capture Filters (BPF Syntax)

Capture filters limit what traffic is captured, reducing file size and resource usage. Set these before starting the capture.

FilterDescription
host 192.168.1.1Capture traffic to/from IP 192.168.1.1
net 192.168.0.0/24Capture traffic on subnet 192.168.0.0/24
port 80Capture traffic on port 80 (HTTP)
port 80 or port 443Capture HTTP or HTTPS traffic
not port 53Capture everything except DNS traffic
tcpCapture only TCP traffic
udpCapture only UDP traffic
ether host 00:11:22:33:44:55Capture by MAC address
ipCapture only IPv4 traffic
ip6Capture only IPv6 traffic
vlanCapture only VLAN traffic
tcp port 80 and host 192.168.1.1HTTP traffic to/from specific host

Display Filters

Display filters show only relevant traffic after capture. These use Wireshark-specific syntax.

Syntax Operators

OperatorMeaningExample
== or eqEqualip.addr == 192.168.1.1
!= or neNot Equalip.addr != 192.168.1.1
> or gtGreater thanframe.len > 1500
< or ltLess thantcp.window_size < 1000
&& or andLogical ANDtcp.port == 80 and ip.src == 10.0.0.1
|| or orLogical ORhttp or dns
! or notLogical NOT!arp
containsSearch payloadframe contains “password”

Common Display Filters

FilterDescription
ip.addr == 192.168.1.1IP address (source or destination)
ip.src == 192.168.1.1Source IP address
ip.dst == 192.168.1.1Destination IP address
tcp.port == 80TCP port (source or destination)
httpShow all HTTP traffic
http.requestShow only HTTP requests
http.response.code == 404Show HTTP 404 Not Found errors
tcp.flags.syn == 1Show TCP SYN packets
tcp.flags.reset == 1Show TCP Reset (RST) packets
icmpShow ICMP (Ping) traffic
dnsShow DNS traffic
dns.qry.name contains “google”Find DNS queries for “google”
tcp.analysis.retransmissionShow retransmitted packets (Network issues)
_ws.col.Info contains “GET”Filter Info column text

Coloring Rules

Wireshark helps you identify traffic types visually using default coloring rules.

ColorTraffic TypeDescription
Light BlueTCPStandard TCP traffic
Light GreenUDPStandard UDP traffic
Light PurpleTCP SYN/FINConnection establishment/termination
Light RedErrorsTCP Resets, Retransmissions, Checksum errors
Light YellowRoutingSMB, OSPF, Routing protocols
Light OrangeApplicationHTTP, DNS (Application layer)

Protocol-Specific Analysis

HTTP Analysis +
http.request.method == “GET”HTTP GET requests
http.request.method == “POST”HTTP POST requests
http.response.code == 200HTTP 200 OK responses
http.response.code == 404HTTP 404 Not Found
http.host == “example.com”Traffic to specific host
http.user_agent contains “Mozilla”Filter by User Agent
http.request.uri contains “login”Find login pages
DNS Analysis +
dns.qry.name == “example.com”Query for specific domain
dns.qry.type == 1A Record (IPv4) queries
dns.qry.type == 28AAAA Record (IPv6) queries
dns.flags.rcode != 0DNS Errors (e.g., NXDOMAIN)
dns.resp.ttl < 60Short TTL responses
TCP Analysis +
tcp.analysis.retransmissionRetransmissions (Packet loss)
tcp.analysis.duplicate_ackDuplicate ACKs
tcp.analysis.zero_windowZero Window (Client/Server overwhelmed)
tcp.flags.syn==1 && tcp.flags.ack==0SYN packet (Handshake start)
tcp.flags.reset==1RST packet (Connection kill)
TLS/SSL Analysis +
tlsAll TLS/SSL traffic
tls.handshakeTLS Handshake packets
tls.handshake.type == 1Client Hello
tls.handshake.type == 2Server Hello
tls.alert.descriptionTLS Alert (Errors)
ICMP Analysis +
icmpAll ICMP traffic
icmp.type == 8Echo Request (Ping)
icmp.type == 0Echo Reply (Pong)
icmp.type == 3Destination Unreachable
ARP Analysis +
arpAll ARP traffic
arp.opcode == 1ARP Request (Who has?)
arp.opcode == 2ARP Reply (I have)
arp.duplicate-address-detectedDuplicate IP detection

Keyboard Shortcuts

ShortcutAction
Ctrl + EStart/Stop capture
Ctrl + KCapture Options
Ctrl + FFind Packet
Ctrl + GGo to Packet Number
Ctrl + RReload Capture File
Ctrl + WClose Capture File
Ctrl + MMark/Unmark Packet
Ctrl + NNext Packet
Ctrl + PPrevious Packet
Ctrl + Shift + OFollow TCP Stream

Statistics & Analysis Tools

Tool LocationDescription
Statistics → Protocol HierarchyTraffic breakdown by protocol %
Statistics → ConversationsTraffic between specific hosts (IP to IP)
Statistics → EndpointsTop talkers (Sources/Destinations)
Statistics → I/O GraphsVisualize traffic spikes over time
Statistics → HTTP → RequestsSummary of HTTP calls
Analyze → Follow → TCP StreamReconstruct the data stream of a connection

Common Troubleshooting Scenarios

IssueFilterDescription
High Latencytcp.analysis.ack_rtt > 0.1TCP ACKs taking > 100ms
Packet Losstcp.analysis.retransmissionPackets being resent
Connection Dropstcp.flags.reset == 1Connections being forcibly closed
Slow Servertcp.analysis.zero_windowServer buffer full, asking client to wait
DNS Failuresdns.flags.rcode != 0Server returning DNS errors
HTTP Errorshttp.response.code >= 400Client (4xx) or Server (5xx) errors

TShark (Command Line)

TShark is the terminal version of Wireshark, great for remote servers.

CommandDescription
tshark -DList interfaces
tshark -i eth0Capture on interface eth0
tshark -r file.pcapRead a pcap file
tshark -Y “http”Apply display filter (view only)
tshark -f “port 80”Apply capture filter (record only port 80)
tshark -z io,phsPrint protocol hierarchy statistics

Best Practices

  • Always use Capture Filters on high-traffic networks to keep file sizes manageable.
  • Save captures frequently. Wireshark runs in memory and can crash on massive files.
  • Use Coloring Rules to visually spot errors (usually Red/Black).
  • Right-click a packet field and use “Apply as Filter” to quickly isolate traffic.
  • Use “Follow TCP Stream” to see the human-readable conversation (like viewing the whole email or HTML page).

Leave a Reply

Your email address will not be published. Required fields are marked *