Skip to content

Next Bootcamp Edition
May 4th, 2026

Back to Blog

Wireshark Tutorial for Beginners: Network Packet Analysis

Wireshark interface showing network packet capture with protocol analysis

Learn Wireshark with this beginner's guide to installation, packet capture, filters, and security analysis for SOC analysts.

Daute Delgado
13 min read
(Updated: )
  • Defense
  • Detection
  • Mindset
  • Career Paths
  • Confidence
Share this article:

TL;DR

Wireshark is the world's most popular network protocol analyzer, essential for cybersecurity professionals. This tutorial covers installation (with Npcap on Windows or wireshark group permissions on Linux), capturing packets by selecting your network interface, and using display filters like ip.addr, tcp.port, and http.request to find specific traffic. Security analysts use Wireshark to investigate incidents, detect malware communications, and analyze suspicious network behavior.

The screen filled with packets. Hundreds per second, scrolling past faster than anyone could read. The junior analyst had heard about Wireshark during training, watched colleagues use it during incidents, and felt confident about launching it on her first solo investigation. Now, staring at thousands of lines of hexadecimal data and protocol abbreviations, that confidence evaporated. Somewhere in this flood of network traffic was evidence of the breach. But where do you even start?

This moment comes for every security professional. Wireshark captures everything on the wire, which creates an overwhelming amount of data. The difference between drowning in packets and conducting effective network analysis lies in understanding how to filter, focus, and interpret what the tool reveals. Network packet analysis is a foundational skill that supports incident response, threat hunting, and penetration testing. The learning curve is real, but manageable with the right approach.

What Is Wireshark and Why Do Security Professionals Need It?

Wireshark is a free, open-source network protocol analyzer that captures and decodes network traffic in real time. According to the official documentation, Wireshark can decode over 3000 network protocols, presenting packet data "in as much detail as possible". This capability makes it indispensable for anyone who needs to understand what is actually happening on a network.

The tool serves multiple roles in security work. SOC analysts use Wireshark to investigate alerts, tracing suspicious connections from detection to detailed analysis. Penetration testers capture credentials, analyze protocols, and verify that their activities reach targets as intended. Incident responders examine malware communications, identifying command-and-control infrastructure and data exfiltration patterns.

You really do want to master display filters in Wireshark. That is the ideal way to find the needle in the haystack.

Laura Chappell·Chappell University Network Forensics Cheat Sheet

Understanding network traffic at the packet level provides insights that higher-level monitoring tools cannot match. When a SIEM alerts on suspicious DNS traffic, Wireshark reveals exactly what queries were made and what responses came back. When an application behaves unexpectedly, packet captures show whether packets reached their destination, whether connections completed successfully, and what data actually traveled across the wire.

How Do You Install Wireshark Correctly?

Installation varies by operating system, but each platform has specific requirements that beginners often miss. Getting these right during installation prevents frustration later.

On Windows, download Wireshark from the official website. The critical step that Nucamp notes most beginners miss is the capture driver. During installation, Wireshark prompts you to install Npcap. If you skip this step, Wireshark opens without errors but cannot see any network interfaces. Accept the Npcap installation with default settings, which include loopback capture support that lets you analyze traffic between applications on the same machine.

On macOS, the installer includes the necessary capture components. After installation, you may need to grant permission for Wireshark to access the network. Navigate to System Preferences, Security & Privacy, Privacy, and ensure Wireshark has the access it needs.

On Linux, the challenge is usually permissions rather than drivers. You can run Wireshark with sudo, but this practice is risky. A safer approach adds your user to the dedicated wireshark group:

sudo usermod -aG wireshark $(whoami)

After adding yourself to the group, log out and back in for the change to take effect. You can then capture packets without full root privileges, following security best practices.

What Does the Wireshark Interface Show You?

Opening Wireshark presents a welcome screen listing available network interfaces. Each interface shows a sparkline graph indicating current traffic levels. Double-click your main interface (typically Wi-Fi or Ethernet) to begin capturing.

The capture window divides into three panes that Varonis describes as essential for packet inspection. The Packet List at the top shows every captured packet with columns for packet number, timestamp, source and destination addresses, protocol, length, and a brief info field. This pane provides your high-level view of the capture.

Clicking any packet populates the Packet Details pane in the middle. This section breaks down the packet layer by layer, from the physical frame through data link, network, and transport layers up to the application protocol. Expanding each layer reveals specific fields, such as TCP sequence numbers or HTTP headers.

The Packet Bytes pane at the bottom displays raw data: hexadecimal on the left, ASCII representation on the right. This view matters when you need to see exact byte values or when looking for readable strings in unencrypted traffic. Passwords transmitted over HTTP, for example, appear clearly in this pane.

A fourth element, the display filter bar below the toolbar, becomes your most frequently used control. This is where you type filters to focus on specific traffic, transforming thousands of packets into a manageable set.

How Do You Capture Your First Packets?

Start with a simple exercise: capture your own web browsing traffic. Select your active network interface and click the blue shark fin icon (or press Ctrl+E on Windows, Cmd+E on Mac) to begin capture. The interface name should show traffic activity in its sparkline.

Open a web browser and navigate to a simple HTTP site (not HTTPS, for this initial exercise). Watch Wireshark fill with packets. After the page loads, click the red square icon to stop capture. You now have a packet capture containing your browsing activity.

Before analyzing, save the capture. File, Save As, and choose a location. Wireshark saves in PCAPNG format by default, which preserves all capture metadata. This file can be reopened later, shared with colleagues, or analyzed with other tools.

What Are Display Filters and How Do You Use Them?

Display filters are Wireshark's most powerful feature. The official reference documents over 328,000 filterable fields across all supported protocols. You do not need to memorize them all; understanding the syntax and knowing commonly used filters covers most situations.

Display filters use a syntax distinct from capture filters. The basic pattern is field operator value. For example, ip.addr == 192.168.1.100 shows packets where either the source or destination IP matches that address. The == operator tests equality; other operators include != for not equal, > and < for numeric comparisons, and contains for substring matches.

Protocol filters are the simplest form. Typing http shows only HTTP traffic. Typing dns shows only DNS. These single-word filters help you quickly isolate traffic types when investigating specific concerns.

Wireshark is an incredible tool used to read and analyze network traffic coming in and out of an endpoint. It can load previously captured traffic to assist with troubleshooting network issues or analyze malicious traffic to help determine what a threat actor is doing on your network.

Black Hills Information Security·Wireshark Cheatsheet

Combining filters with logical operators creates precise queries. The operator && means AND; || means OR; ! means NOT. The filter http && ip.addr == 10.0.0.5 shows only HTTP traffic involving that specific IP. The filter dns || http shows both DNS and HTTP traffic. The filter !broadcast excludes broadcast packets from view.

Here are essential filters every beginner should learn:

IP and Port Filters:

  • ip.addr == 192.168.1.100 shows traffic to or from an IP
  • ip.src == 192.168.1.100 shows traffic only from that source
  • ip.dst == 192.168.1.100 shows traffic only to that destination
  • tcp.port == 443 shows traffic on port 443 (either direction)
  • tcp.dstport == 80 shows traffic going to port 80

Protocol-Specific Filters:

  • http.request shows HTTP requests
  • http.response shows HTTP responses
  • http.request.method == "POST" shows only POST requests
  • dns.flags.response == 0 shows DNS queries (not responses)
  • tls.handshake shows TLS handshake packets

Security-Focused Filters:

  • tcp.flags.syn == 1 && tcp.flags.ack == 0 shows SYN packets (potential scans)
  • tcp.flags.reset == 1 shows connection resets
  • frame contains "password" searches all content for a string
  • http.request.uri contains "SELECT" looks for potential SQL injection

How Do You Follow Streams to Reconstruct Conversations?

Individual packets tell only part of the story. Real analysis often requires seeing complete conversations. Wireshark's Follow Stream feature reconstructs these exchanges.

Right-click any packet and select Follow, then TCP Stream (for TCP connections) or UDP Stream (for UDP). Wireshark opens a new window showing the entire conversation in order. For HTTP traffic, this means seeing the full request followed by the complete response, including headers and body content.

The stream view color-codes data by direction. Traffic from the client typically appears in one color, server responses in another. This visual distinction helps you trace the flow of a conversation.

Following streams proves invaluable during investigations. When analyzing potential data exfiltration, following the TCP stream reveals exactly what data left the network. When investigating web application attacks, following HTTP streams shows complete request and response bodies, including any injected payloads or error messages that reveal successful exploitation.

The HackerTarget tutorial recommends a beginner workflow: start with Statistics, Conversations for a high-level view, then right-click an IP and Apply as Filter to drill down. After that, use Follow Stream to view full exchanges for specific flows that warrant deeper investigation.

What Statistics Features Help You Understand Traffic Patterns?

Before diving into individual packets, use Wireshark's Statistics menu to understand the overall shape of your capture. These views identify the most active hosts, protocols, and conversations, directing your detailed analysis where it matters most.

Statistics, Conversations shows all communication pairs in the capture. You can view by Ethernet, IPv4, IPv6, TCP, or UDP. Sorting by bytes transferred reveals which conversations moved the most data. During incident response, unusually large data transfers to external IPs warrant immediate investigation.

Statistics, Protocol Hierarchy breaks down traffic by protocol. This view reveals the composition of your capture: how much is HTTP versus DNS versus SSH. Unexpected protocols in this view, such as IRC or BitTorrent on a corporate network, may indicate policy violations or compromise.

Statistics, Endpoints lists all communicating hosts. Combined with external reputation data, this quickly identifies connections to known-malicious infrastructure. Black Hills Information Security notes that Statistics, IPv4 Statistics, Destinations and Ports shows all IPs, transport protocols, and ports involved in communication, helping you understand the overall traffic profile.

Analyze, Expert Information surfaces Wireshark's analysis of potential problems. This includes TCP errors like retransmissions, duplicate ACKs, and zero window conditions. It also flags malformed packets and protocol violations. During troubleshooting, this view quickly highlights issues that might otherwise require packet-by-packet review.

How Do Security Analysts Use Wireshark for Incident Investigation?

When investigating security incidents, Wireshark provides evidence that other tools cannot match. The detailed packet view reveals exactly what happened on the wire, supporting both detection and response activities.

Investigation typically follows a workflow. First, scope the timeframe using capture filters or display filters to focus on the relevant period. If you know which hosts are involved, filter to their traffic. The filter ip.addr == 10.1.1.50 && ip.addr == 203.0.113.100 shows only traffic between an internal host and a suspicious external IP.

Command-and-control traffic often exhibits distinctive patterns. Regular beacon intervals, where a compromised host connects to an external server every few minutes, appear clearly in capture timestamps. The Chappell University cheat sheet suggests using filters like dns.count.answers > 10 to detect unusually high numbers of DNS answers, which may indicate DNS tunneling or fast-flux networks.

Data exfiltration leaves traces in packet captures. Large outbound transfers, encrypted connections to unusual destinations, and protocols running on unexpected ports all warrant investigation. The filter tcp.len > 10000 shows packets with large payloads. Following streams from these packets reveals what data was transferred.

For malware traffic analysis, look for initial callbacks: DNS lookups for unknown domains, HTTP or HTTPS connections to unfamiliar hosts, and traffic on non-standard ports. Comparing captured user agents, query patterns, and connection timing against known malware behaviors helps identify the threat family.

What Are Common Mistakes Beginners Should Avoid?

The most common beginner mistake is trying to analyze too much traffic at once. Start with filtered captures rather than capturing everything. If investigating web traffic, use a capture filter like port 80 or port 443 to reduce noise from other protocols.

Permission errors frustrate many Linux users. If Wireshark shows no interfaces or fails to capture, check group membership and permissions before assuming the tool is broken. The solution almost always involves adding your user to the wireshark group or adjusting permissions on capture interfaces.

Capture file size grows quickly on busy networks. A capture running on a gigabit interface during business hours can generate gigabytes within minutes. Set appropriate capture limits, either by time (stop after X minutes) or by size (stop after X megabytes), to keep files manageable.

Forgetting to stop capture leads to unnecessarily large files and difficulty finding relevant traffic. Stop capture as soon as you have the traffic you need. You can always start a new capture if you need more data.

Overlooking encrypted traffic is a conceptual mistake. Modern networks use TLS extensively. Wireshark captures encrypted packets, but you see only metadata: destinations, ports, and handshake details. For testing your own applications, you can configure browsers to log TLS session keys that Wireshark uses for decryption. For investigating third-party traffic, accept that content may be opaque while metadata remains valuable.

How Do You Build Wireshark Skills for a Security Career?

Regular practice with real traffic develops proficiency faster than any course. Start by capturing your own traffic: web browsing, email, software updates. Analyze what you capture. Understanding normal traffic patterns makes anomalies obvious.

Practice captures from sites like malware-traffic-analysis.net provide structured learning opportunities. These captures come with objectives and explanations, simulating real investigations with known answers. Working through these exercises builds the pattern recognition that distinguishes experienced analysts.

The Wireshark User's Guide provides comprehensive documentation, though it can overwhelm beginners. Focus on chapters covering display filters and specific protocols relevant to your work rather than reading cover to cover.

For those pursuing SOC analyst roles, demonstrate Wireshark proficiency during interviews by describing specific investigations or analyses you have conducted. Employers value candidates who can explain what they found in a packet capture, not just that they have used the tool.

Certifications like SANS SEC503 (Network Monitoring and Threat Detection) cover Wireshark extensively in a security context. While not required for entry-level positions, such training validates skills for more advanced roles. The free Coursera project offers structured introduction for absolute beginners.

Conclusion

Wireshark transforms abstract network concepts into visible reality. Every protocol you learn about, every attack technique you study, ultimately manifests in packets that Wireshark can capture and display. The junior analyst who felt overwhelmed by scrolling packets eventually became the one who calmly filters to the evidence that matters. The path from confusion to confidence runs through practice.

Start today with a simple capture of your own traffic. Apply a filter. Follow a stream. See what your computer is actually doing on the network. Build from there, adding filters as you need them, exploring statistics features, practicing with sample captures. The foundational skills covered in this tutorial support everything from entry-level SOC work to advanced incident response.

The network tells its story in packets. Wireshark lets you read it.

About the Author
Daute Delgado
Daute Delgado

Founder & Bootcamp Director

Security Engineer · AI Research

Cybersecurity strategist with experience spanning international organizations, aviation security, and Security Operations Centers. Former threat analyst and offensive security specialist now focused on workforce development. Researches the intersection of AI anthropology and machine behaviour to shape next-generation security education.

View Profile
Start Your Journey

Ready to Start Your Cybersecurity Career?

Join hundreds of professionals who've transitioned into cybersecurity with our hands-on bootcamp.

Start Your Journey

Ready to Start Your Cybersecurity Career?

Join hundreds of professionals who've transitioned into cybersecurity with our hands-on bootcamp.

Hours
360+
Success Rate
94%
Avg. Salary
$85K
Explore the Bootcamp