Skip to main content

        Wireshark Filters - Featured image

Wireshark Filters

ICMP Request and Reply

icmp.type==8                        #Request
icmp.type==0                        #Reply
icmp.type==8 or icmp.type==0        #Both

TCP Flags

URG (Urgent)
ACK (Acknowledgement)
PSH (Push)
RST (Reset)
SYN (Synchronize)
FIN (Finish)
ECN (Explicit Congestion Notification)

SYN Request

tcp.flags.syn==1

SYN+ACK Reply

tcp.flags.syn==1 and tcp.flags.ack==1

TCP Null Scan

tcp.flags==0x00

TCP RST

tcp.flags.reset==1

SYN and FIN Flags

tcp.flags==0x003

OS Fingerprinting

(tcp.flags==0x02) && (tcp.window_size < 1025)

FTP Brute Force

ftp.response.code==220

HTTP Response Codes

http.response.code = 200
http.response.code = 404

HTTP Requests

http.request

HTTP Request Method

http.request.method == "POST"
http.request.method == "GET"

HTTP Packet Filter

http contains PNG
http contains MP3
http contains ZIP

HTTP User Agent

http.user.agent == "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36"

HTTP Host

http.host == "abc.com"

HTTP Date

http.date == "Wed, 2 Jul 2020 18:55:12 GMT"

HTTP Content Type

http.content_type == "application/json"

MySQL Success Login

mysql.response_code == 0x00

FTP Success Login

ftp.response.code == 200

FTP Failed Login

ftp.response.code == 530

FTP Success File Process

ftp.response.code == 226

FTP Data Processes

ftp-data

ARP Request-Reply

arp.opcode == 1                 #ARP Request
arp.opcode == 2                 #ARP Reply

MAC Address Filter

eth.addr==08:00:27:53:0c:ba

WLAN BSSID Filter

(wlan.bssid == F8:14:FE:4D:E6:F2)

WiFi Deauthentication Frames

wlan.fc.type_subtype == 12

Rogue Access Point & Evil-Twin Attacks Detection

(wlan.fc.type == 00) and (wlan.fc.type_subtype == 8)

# Beacon analysis is crucial in differentiating between genuine and fraudulent access points. One of the initial places to start is the Robust Security Network (RSN) information. This data communicates valuable information to clients about the supported ciphers, among other things.

Legitimate: Wireshark

Rogue: Wireshark

SSL Traffic

ssl.record.content_type == 22

Wireshark

SSL Client Hello Packages

ssl.handshake.type == 1

DNS

1. Query Initiation
2. Local Cache Check
3. Recursive Query
4. Root Servers
5. TLD Servers
6. Authoritative Servers
7. Domain Name's Authoritative Servers
8. Response
Record Type

(Address)|This record maps a domain name to an IPv4 address
AAAA (Ipv6 Address)|This record maps a domain name to an IPv6 address
CNAME (Canonical Name)|This record creates an alias for the domain name. Aka [hello.com](http://hello.com/) = [world.com](http://world.com/)
MX (Mail Exchange)|This record specifies the mail server responsible for receiving email messages on behalf of the domain.
NS (Name Server)|This specifies an authoritative name servers for a domain.
PTR (Pointer)|This is used in reverse queries to map an IP to a domain name
TXT (Text)|This is used to specify text associated with the domain
SOA (Start of Authority)|This contains administrative information about the zone

DNS Query Name

dns.qry.name == "www.google.com"

UDP

1. Real-time Applications - Applications like streaming media, online gaming, real-time voice and video communications
2. DNS (Domain Name System) - DNS queries and responses use UDP
3. DHCP (Dynamic Host Configuration Protocol) - DHCP uses UDP to assign IP addresses and configuration information to network devices.
4. SNMP (Simple Network Management Protocol) - SNMP uses UDP for network monitoring and management
5. TFTP (Trivial File Transfer Protocol) - TFTP uses UDP for simple file transfers, commonly used by older Windows systems and others.

.

.

.