
The following table shows some of the capture filters that you can use within your network: FiltersĪll traffic originating from 192.168.1.1 and associated with port 21Īll traffic associated with host 192.168.1.1Īll traffic destined to 192.168.1.1 or destined to host 192.168.1.2Ĭapture filters with protocol header values For instance, we can use the concatenation operator (&/and), alteration operator (|/or) and negation operator (!/not). We can also use a combination of operators to refine and complicate our filters. For us to capture http traffic from host 192.168.1.1, we would use the expression src host 192.168.1.1 and tcp port 80 Proto: This qualifier allows us to specify the protocol that we are interested in capturing.On the other hand, dst host 192.168.1.1 allows us to capture packets destined to the host 192.168.1.1 For instance, src host 192.168.1.1 allows us to capture packets from a specific host. Direction: We can specify direction qualifiers when identifying packets from a particular destination or source.In the example above - host 192.168.1.1, host is the type qualifier Type: Type qualifiers refer to the name or number that your identifier refers to.Qualifiers: There are three types of qualifiers:.In this case the value 192.168.1.1 is an identifier For instance, filtering a packet for an IP address, you will end up with a filter that is similar to host 192.168.1.1.

#Wireshark sum iograph how to#
We need to know how to use the filters that come with Wireshark in order to ensure we are capturing the right packets for analysis. The traffic you are interested in capturing is entirely dependent on the devices within the network.Different devices on the network respond differently and transmit different data packets.Promiscuous mode allows your machine to collect data packets that are not intended for your machine.Does your network card support promiscuous mode?.We’ll first need to answer the following questions: We should first understand the type of traffic we are interested in collecting before we begin packet sniffing. Wireshark allows us to capture raw data which is then presented in a human-readable format, making it possible for you to understand the flow of traffic within the network.īefore we can begin capturing packets for analysis, we need to take into account the types of devices available on the network and the traffic they emit. How to use Wireshark for packet analysis and filtering

Determine systems within the network that are heavy on bandwidth consumption.Determine network statistics by filtering network packets based on your requirements.Determine which machines and resources to isolate from the network due to the traffic coming from them.Detect malicious traffic from malware or network intrusions from unauthorized or malicious individuals/parties.Analyze problems within the network by assessing the packets as traffic runs through the network.In order for us to understand what we are dealing with and to troubleshoot the problem, we make use of packet analyzers such as Wireshark in order to perform network analysis. There are many things that can go wrong within a network.
