
This lesson requires Loopus Pro access. Upgrade to unlock all courses, labs, and challenges.
Wireshark provides powerful tools for packet analysis. Understanding Wireshark enables detailed examination of network captures, reconstructing what happened and identifying malicious activity.
Packet list shows captured packets chronologically. Columns display time, addresses, protocol, and summary.
Packet details expands protocol layers. Click to examine Ethernet headers, IP headers, TCP/UDP, and application data.
Packet bytes shows raw hexadecimal and ASCII content.
Display filters show only matching packets:
ip.addr == 192.168.1.100
tcp.port == 443
http.request.method == "POST"
dns.qry.name contains "evil"
Combine with operators: and, or, not
Capture filters limit what is captured initially. Useful for high-volume environments.
"Follow TCP Stream" reconstructs conversations. Right-click a packet and select Follow > TCP Stream. The entire conversation displays in readable form.
Color coding distinguishes client and server traffic. Useful for HTTP requests/responses, command sessions, and protocol analysis.
HTTP - Examine requests, responses, headers, and content. Extract downloaded files through File > Export Objects > HTTP.
DNS - Query names and responses reveal command and control, data exfiltration, or reconnaissance. Filter: dns
SMB - File sharing and remote execution. Filter: smb or smb2
TLS - Encrypted traffic shows handshakes but not content. Certificate information reveals servers and potentially domains.
Unusual protocols - Unexpected DNS over TLS, HTTP on non-standard ports, or unknown protocols warrant investigation.
Beaconing - Regular, periodic connections to the same destination suggest C2 communication. Examine timing patterns.
Large transfers - Significant outbound data volume might indicate exfiltration.
Suspicious domains - DNS queries to newly registered domains, high-entropy names, or known-bad indicators.
Export packets - Save filtered results for focused analysis or evidence preservation.
Extract files - Export Objects menu extracts transferred files.
Expert Information - Wireshark flags anomalies: connection resets, retransmissions, malformed packets.
Document findings with screenshots showing relevant packets and analysis.
How do you analyze pcaps in Wireshark?
What menu exports files?
What indicates malicious traffic?
What term describes regular C2 pings?
Found the flag? Submit it below to complete this lesson.
Format: LOOPUS{...}