2
Most read
15
Most read
17
Most read
BASICS OF WIRESHARK
BASICS OF WIRESHARK
Wireshark is a network packet analyzer. A network packet analyzer will try to
capture network packets and tries to display that packet data as detailed as
possible.
You could think of a network packet analyzer as a measuring device used to
examine what’s going on inside a network cable.
IP ADDRESS & MAC ADDRESS
An Internet Protocol address (IP address) is a numerical label assigned to each
device (e.g., computer, printer or device) participating in a computer network that
uses the Internet Protocol for communication. An IP address serves two principal
functions: host or network interface identification and location addressing.
A media access control address (MAC address) is a unique identifier assigned to
network interfaces for communications on the physical network segment. MAC
addresses are used as a network address for most IEEE 802 network technologies,
including Ethernet and WiFi.
PORTS
In programming, a port (noun) is a "logical connection place" and specifically, using
the Internet's protocol, TCP/IP, the way a client program specifies a particular server
program on a computer in a network.
TABS IN WIRESHARK
 No. shows the number of captured packet or index number.
 Time shows the time of capture
 Source shows the source ip of the packet or the packet is originally generated from which
source ip.
 Destination shows the destination ip where the packet is going.
 Protocol shows the which kind of protocol communication is held between the source and
destination.
 Info shows the data payload in the packet.
Wireshark Tutorial
WIRESHARK HOMESCREEN
Wireshark Tutorial
Wireshark Tutorial
Wireshark Tutorial
Wireshark Tutorial
Wireshark Tutorial
Wireshark Tutorial
Wireshark Tutorial
Wireshark Tutorial
Wireshark Tutorial
Wireshark Tutorial
Wireshark Tutorial
SOME EXAMPLES ON WIRESHARK COMMAND LINE
INTERFACE (CLI)
Select the interface and start capturing the packets:
>tshark –i <enter the number of interface listed in the previous command>
>tshark –i 1
Hit enter. It will start capturing the packets from the specified interface.
SOME EXAMPLES ON WIRESHARK COMMAND LINE
INTERFACE (CLI)
Select the interface and start capturing the packets for 10sec and save the captured
packet in the 10sec.pcap file format:
>tshark –i <enter the number of interface><space> -a duration:<sec> -w
<filename>.pcap
>tshark –i 1 –a duration:10 –w 10sec.pcap
Hit enter. It will start capturing the packets from the specified interface for 10sec and
save it in a file 10sec.pcap file.
To see the captured packet enter the filename in the command prompt.
>10sec.pcap
TSHARK OUTPUT FORMATTING
For output format of Tshark, tshark uses the format of .pcap in which it saves the
captured packets.

More Related Content

PPTX
Wireshark Basic Presentation
PPTX
Wireshark
PPT
Wireshark
PPT
Wireshark Basics
PPTX
Packet analysis using wireshark
PPT
Wireshark - presentation
PPTX
Wireshark
PPTX
Wireshark network analysing software
Wireshark Basic Presentation
Wireshark
Wireshark
Wireshark Basics
Packet analysis using wireshark
Wireshark - presentation
Wireshark
Wireshark network analysing software

What's hot (20)

PPTX
Wireshark
PPTX
Wireshark
PPT
Wireshark Inroduction Li In
PDF
Wireshark tutorial
PDF
Ch 5: Port Scanning
PPTX
Firewall &amp; packet filter new
PDF
Wireshark tutorial
PPTX
PPTX
Firewall presentation
PPTX
WEP/WPA attacks
PDF
Wireshark Traffic Analysis
PPT
Network security and protocols
PPTX
PPTX
PPT
Internet control message protocol
PPTX
Ipv4 and Ipv6
PPT
Port Scanning
PPT
PPT
Firewall & its configurations
PPTX
Packet sniffing
Wireshark
Wireshark
Wireshark Inroduction Li In
Wireshark tutorial
Ch 5: Port Scanning
Firewall &amp; packet filter new
Wireshark tutorial
Firewall presentation
WEP/WPA attacks
Wireshark Traffic Analysis
Network security and protocols
Internet control message protocol
Ipv4 and Ipv6
Port Scanning
Firewall & its configurations
Packet sniffing
Ad

Viewers also liked (7)

PPT
Wireshark
PPTX
Wireshark
PDF
Wireshark ppt
PPT
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
PDF
Network Forensics: Packet Analysis Using Wireshark
PPTX
Practical Packet Analysis: Wireshark
PDF
Network Analysis Using Wireshark 1
Wireshark
Wireshark
Wireshark ppt
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
Network Forensics: Packet Analysis Using Wireshark
Practical Packet Analysis: Wireshark
Network Analysis Using Wireshark 1
Ad

Similar to Wireshark Tutorial (20)

PPT
Unit 8 Java
PPTX
Wireshark
PPT
Networking
PDF
CCNA Interview.pdf
PPTX
Socket Programming w/ C# - IK
DOC
Tcp Udp Notes
PPT
Internetbasics
PPT
Md13 networking
PPT
Network programming in Java
PPT
Network programming in Java
PDF
PPTX
Wireshark
PPTX
Networking in Java
PDF
Ajp notes-chapter-04
PDF
Tshark pen testing, very good insight of the pent test
PDF
Unit-4 networking basics in java
PPT
Network Programming in Java
PPT
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
PPT
Wireshark.ethereal
PPTX
Tcp/ip server sockets
Unit 8 Java
Wireshark
Networking
CCNA Interview.pdf
Socket Programming w/ C# - IK
Tcp Udp Notes
Internetbasics
Md13 networking
Network programming in Java
Network programming in Java
Wireshark
Networking in Java
Ajp notes-chapter-04
Tshark pen testing, very good insight of the pent test
Unit-4 networking basics in java
Network Programming in Java
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Wireshark.ethereal
Tcp/ip server sockets

Recently uploaded (20)

PDF
IT Consulting Services to Secure Future Growth
PDF
Cloud Native Aachen Meetup - Aug 21, 2025
PDF
Multiverse AI Review 2025_ The Ultimate All-in-One AI Platform.pdf
PDF
WhatsApp Chatbots The Key to Scalable Customer Support.pdf
PDF
Crypto Loss And Recovery Guide By Expert Recovery Agency.
PDF
Mobile App for Guard Tour and Reporting.pdf
PPTX
Folder Lock 10.1.9 Crack With Serial Key
PPTX
StacksandQueuesCLASS 12 COMPUTER SCIENCE.pptx
PPTX
SAP Business AI_L1 Overview_EXTERNAL.pptx
PPTX
UNIT II: Software design, software .pptx
PPTX
Foundations of Marketo Engage: Nurturing
PPTX
Human-Computer Interaction for Lecture 2
PPTX
AI Tools Revolutionizing Software Development Workflows
PPTX
Why 2025 Is the Best Year to Hire Software Developers in India
PDF
Module 1 - Introduction to Generative AI.pdf
PDF
Mobile App Backend Development with WordPress REST API: The Complete eBook
PDF
Streamlining Project Management in Microsoft Project, Planner, and Teams with...
PDF
Odoo Construction Management System by CandidRoot
PPTX
Lesson-3-Operation-System-Support.pptx-I
PPTX
HackYourBrain__UtrechtJUG__11092025.pptx
IT Consulting Services to Secure Future Growth
Cloud Native Aachen Meetup - Aug 21, 2025
Multiverse AI Review 2025_ The Ultimate All-in-One AI Platform.pdf
WhatsApp Chatbots The Key to Scalable Customer Support.pdf
Crypto Loss And Recovery Guide By Expert Recovery Agency.
Mobile App for Guard Tour and Reporting.pdf
Folder Lock 10.1.9 Crack With Serial Key
StacksandQueuesCLASS 12 COMPUTER SCIENCE.pptx
SAP Business AI_L1 Overview_EXTERNAL.pptx
UNIT II: Software design, software .pptx
Foundations of Marketo Engage: Nurturing
Human-Computer Interaction for Lecture 2
AI Tools Revolutionizing Software Development Workflows
Why 2025 Is the Best Year to Hire Software Developers in India
Module 1 - Introduction to Generative AI.pdf
Mobile App Backend Development with WordPress REST API: The Complete eBook
Streamlining Project Management in Microsoft Project, Planner, and Teams with...
Odoo Construction Management System by CandidRoot
Lesson-3-Operation-System-Support.pptx-I
HackYourBrain__UtrechtJUG__11092025.pptx

Wireshark Tutorial

  • 2. BASICS OF WIRESHARK Wireshark is a network packet analyzer. A network packet analyzer will try to capture network packets and tries to display that packet data as detailed as possible. You could think of a network packet analyzer as a measuring device used to examine what’s going on inside a network cable.
  • 3. IP ADDRESS & MAC ADDRESS An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g., computer, printer or device) participating in a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. A media access control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used as a network address for most IEEE 802 network technologies, including Ethernet and WiFi.
  • 4. PORTS In programming, a port (noun) is a "logical connection place" and specifically, using the Internet's protocol, TCP/IP, the way a client program specifies a particular server program on a computer in a network.
  • 5. TABS IN WIRESHARK  No. shows the number of captured packet or index number.  Time shows the time of capture  Source shows the source ip of the packet or the packet is originally generated from which source ip.  Destination shows the destination ip where the packet is going.  Protocol shows the which kind of protocol communication is held between the source and destination.  Info shows the data payload in the packet.
  • 19. SOME EXAMPLES ON WIRESHARK COMMAND LINE INTERFACE (CLI) Select the interface and start capturing the packets: >tshark –i <enter the number of interface listed in the previous command> >tshark –i 1 Hit enter. It will start capturing the packets from the specified interface.
  • 20. SOME EXAMPLES ON WIRESHARK COMMAND LINE INTERFACE (CLI) Select the interface and start capturing the packets for 10sec and save the captured packet in the 10sec.pcap file format: >tshark –i <enter the number of interface><space> -a duration:<sec> -w <filename>.pcap >tshark –i 1 –a duration:10 –w 10sec.pcap Hit enter. It will start capturing the packets from the specified interface for 10sec and save it in a file 10sec.pcap file. To see the captured packet enter the filename in the command prompt. >10sec.pcap
  • 21. TSHARK OUTPUT FORMATTING For output format of Tshark, tshark uses the format of .pcap in which it saves the captured packets.