11---
2-
2+ type : resource-note
3+ status : done
4+ created : 2026-01-31
5+ updated : 2026-03-11
6+ tags : [security-writeup, tryhackme, wireshark, networking]
7+ source : " TryHackMe - Wireshark: The Basics"
38platform : tryhackme
49room : " Wireshark: The Basics"
510slug : wireshark-the-basics
6- path : notes/ TryHackMe/40-networking/wireshark-the-basics.md
11+ path : TryHackMe/40-networking/wireshark-the-basics.md
712topic : 40-networking
8- domain : DFIR, Networking
9- skills : wireshark, pcap-analysis, display-filters
10- artifacts : concept-notes, cookbook
11- status : done
12- date : 2026-01-31
13+ domain : [forensics, networking]
14+ skills : [wireshark, pcap, display-filters]
15+ artifacts : [concept-notes, cookbook]
16+ sanitized : true
1317---
1418
15- 0 . Summary
19+ # Wireshark: The Basics
20+
21+ ## Summary
1622
1723* Wireshark is a packet analyzer (network traffic analyser / 网络流量分析器) for live capture and offline PCAP inspection.
1824* The UI is organized to support fast triage: Packet List → Packet Details → Packet Bytes (hex/ASCII).
1925* Your basic analysis loop is: load PCAP → navigate packets → dissect layers → filter down → reconstruct streams → extract artifacts.
2026* Two filter planes exist: capture filters (what you collect) vs display filters (what you view). This room focuses on display filters.
2127
22- 1 . Key Concepts
28+ ## Key Concepts
2329
24- 1.1 What Wireshark is / is not
30+ ### 1.1 What Wireshark is / is not
2531
2632* Wireshark is not an IDS (Intrusion Detection System / 入侵检测系统). It does not block or modify traffic; it helps you interpret it.
2733* Its output quality depends on analyst hypotheses + protocol knowledge.
2834
29- 1.2 Primary use cases
35+ ### 1.2 Primary use cases
3036
3137* Troubleshooting: congestion, retransmissions, failure points.
3238* Security hunting: rogue hosts, abnormal ports, suspicious protocols.
3339* Protocol learning: response codes, headers, payloads.
3440
35- 1.3 GUI mental model (5 prominent sections)
41+ ### 1.3 GUI mental model (5 prominent sections)
3642
3743* Toolbar: capture, filtering, sorting, export/merge, statistics.
3844* Display Filter Bar: the main query input for display filters.
@@ -57,7 +63,7 @@ ASCII layout sketch (conceptual)
5763+--------------------------------------------------------------+
5864```
5965
60- 1.4 Packet dissection (protocol dissection / 协议剖析)
66+ ### 1.4 Packet dissection (protocol dissection / 协议剖析)
6167
6268* Click a packet → Packet Details shows the protocol stack as a tree.
6369* Clicking a field highlights its corresponding bytes in the Packet Bytes pane (byte-level grounding).
@@ -71,14 +77,14 @@ ASCII layout sketch (conceptual)
7177 * Application protocol (e.g., HTTP)
7278 * Application data (payload)
7379
74- 2 . Pattern Cards
80+ ## Pattern Cards
7581
76- 2.1 “If you can click it, you can filter it”
82+ ### 2.1 “If you can click it, you can filter it”
7783
7884* Select a field in Packet Details → right-click → Apply as Filter (immediate narrowing).
7985* Use Prepare as Filter when you want to build a compound expression before applying.
8086
81- 2.2 Conversation-first triage
87+ ### 2.2 Conversation-first triage
8288
8389* When you want the whole conversation (endpoints + ports) rather than a single field:
8490
@@ -87,23 +93,23 @@ ASCII layout sketch (conceptual)
8793
8894 * View → Colourise Conversation.
8995
90- 2.3 Reconstruct application content
96+ ### 2.3 Reconstruct application content
9197
9298* Packet-level views fragment payload.
9399* Follow Stream reconstructs application-level data:
94100
95101 * Follow TCP/UDP/HTTP Stream (depending on protocol).
96102* After following, Wireshark applies a stream filter automatically; clear it using the “X” on the display filter bar.
97103
98- 2.4 “Navigate like a debugger”
104+ ### 2.4 “Navigate like a debugger”
99105
100106* Go to Packet: jump to a packet number when the task gives you an anchor (e.g., “packet 38”).
101107* Find Packet: search content using String/Regex/Hex/Display filter, with the correct search scope (list/details/bytes).
102108* Mark + Comments: annotate packets for later review or collaboration; marks reset per session, comments persist in the capture file.
103109
104- 3 . Command Cookbook (only items present in the room text)
110+ ## Command Cookbook
105111
106- 3.1 Display filter examples
112+ ### 3.1 Display filter examples
107113
108114``` text
109115# By protocol
@@ -123,13 +129,13 @@ udp.port == 53
123129ip.addr == TARGET_IP
124130```
125131
126- 3.2 File hash (terminal)
132+ ### 3.2 File hash (terminal)
127133
128134``` bash
129135md5sum < filename>
130136```
131137
132- 4 . Workflow Checklist (mapped to the room tasks)
138+ ## Workflow Checklist (mapped to the room tasks)
133139
134140Task 1–2: Loading + first orientation
135141
@@ -208,19 +214,19 @@ Right-click filtering modes
208214* Apply as Column: add a field as a column to compare across many packets.
209215* Follow Stream: reconstruct app-layer stream; auto-applies stream filter; clear with “X”.
210216
211- 5 . Pitfalls
217+ ## Pitfalls
212218
213219* Searching the wrong pane: a string in Packet Details won’t be found if you search only Packet List.
214220* Over-trusting color: packet coloring is a triage aid, not evidence.
215221* Forgetting stream filters: Follow Stream silently applies a stream filter; if you “lose packets,” check the display filter bar.
216222* Mixing capture vs display filters: beginners often type display syntax into capture filter fields.
217223
218- 6 . References
224+ ## References
219225
220226* Wireshark User’s Guide (official): [ https://www.wireshark.org/docs/wsug_html/ ] ( https://www.wireshark.org/docs/wsug_html/ )
221227* Display filter syntax (manpage): [ https://www.wireshark.org/docs/man-pages/wireshark-filter.html ] ( https://www.wireshark.org/docs/man-pages/wireshark-filter.html )
222228
223- CN–EN Glossary (small)
229+ ## CN–EN Glossary (small)
224230
225231* packet capture / PCAP:数据包抓包文件
226232* packet dissection:协议剖析 / 分层解析
0 commit comments