close

Wireshark Tutorials

Learn Wireshark through comprehensive tutorials that cover packet capturing, protocol analysis, and network troubleshooting. Study Wireshark online via hands-on labs and practical cybersecurity exercises in our interactive playground.

Create and Apply Colorizing Rules in Wireshark

Create and Apply Colorizing Rules in Wireshark

In this lab, you will learn how to create and apply colorizing rules in Wireshark to highlight specific network traffic. You'll explore existing rules, create new ones, modify existing rules, and import coloring rule sets for efficient packet analysis.
Wireshark
Verify Wireshark Installation

Verify Wireshark Installation

In this challenge, you will verify your Wireshark installation. This hands-on exercise ensures that Wireshark is properly installed and ready for network traffic analysis. Confirm successful installation and prepare for more advanced Wireshark challenges.
Wireshark
Read Packet Data in Tshark

Read Packet Data in Tshark

In this lab, you'll learn to read packet data in Tshark. The steps include opening a file with -r capture.pcap, displaying packet summaries with default output, showing detailed fields using -V, and counting packets with -c 100. It focuses on skills in the Wireshark domain.
Wireshark
Limit Capture Size in Tshark

Limit Capture Size in Tshark

In this lab, you'll learn to limit the capture size in Tshark. The steps include setting the packet count to 500 with -c, defining the snapshot length as 128 using -s, capturing traffic on the eth1 interface with -i, and saving the captured data to a file named limited.pcap with -w.
Wireshark
Crack ZIP Passwords in John the Ripper

Crack ZIP Passwords in John the Ripper

In this lab, you will learn how to use John the Ripper to crack ZIP passwords. Follow steps to install, create a protected ZIP, extract its hash, run the cracking tool, and confirm the password.
HydraNmapWireshark
Export Suspicious Network Evidence

Export Suspicious Network Evidence

In this challenge, you will learn how to export suspicious network evidence using Wireshark. This hands-on exercise will guide you through the process of identifying and extracting relevant data for further analysis and investigation.
Wireshark
Use Display Filters in Tshark

Use Display Filters in Tshark

In this lab, you'll learn to use display filters in Tshark. The steps include reading a file with -r capture.pcap, filtering by source IP using -Y "ip.src==10.0.2.15", combining filters with -Y "ip.src==10.0.2.15 and tcp.port==80", and verifying the output with -P. It focuses on skills in the Wireshark domain.
Wireshark
Apply Capture Filters in Tshark

Apply Capture Filters in Tshark

In this lab, you'll learn to apply capture filters in Tshark. The steps include learning syntax with manual reference, filtering TCP traffic using -f "tcp", capturing filtered traffic on eth1, and saving the results with -w tcp.pcap. It focuses on enhancing skills in the Wireshark domain.
Wireshark
Filter DNS Communications

Filter DNS Communications

In this challenge, you will learn how to effectively filter DNS communications using Wireshark. This hands-on exercise will guide you through the process of isolating and analyzing DNS traffic, enabling you to identify potential security threats and troubleshoot network issues.
Wireshark
Capture Live Traffic in Tshark

Capture Live Traffic in Tshark

In this lab, you'll learn to capture live traffic using Tshark. The steps include listing interfaces with -D, selecting an interface like -i eth1, starting the capture with default settings, and stopping and saving the captured data to a file named capture.pcap using -w.
Wireshark
Encrypt Files in OpenSSL

Encrypt Files in OpenSSL

In this lab, you will learn how to encrypt and decrypt files using OpenSSL. You will install OpenSSL, create a sample file, generate a symmetric key, encrypt the file with AES, and then decrypt it to verify the process.
LinuxWireshark
Create HTTPS Traffic Detector

Create HTTPS Traffic Detector

In this challenge, you will learn how to create an HTTPS traffic detector using Wireshark. This hands-on exercise will guide you through the process of identifying and analyzing encrypted web traffic, enhancing your network security skills.
Wireshark
Extract Web Traffic Evidence

Extract Web Traffic Evidence

In this challenge, you will learn how to extract web traffic evidence using Wireshark. Analyze network packets and identify key information related to web browsing activity. This hands-on exercise will enhance your skills in network forensics and security analysis.
Wireshark
Customize Wireshark Column Display

Customize Wireshark Column Display

In this challenge, you will learn how to customize the Wireshark column display to efficiently analyze network traffic. This hands-on exercise will guide you through adding, removing, and reordering columns to tailor the interface to your specific needs, improving your packet analysis workflow.
Wireshark
Track IPv6 Traffic Patterns

Track IPv6 Traffic Patterns

In this challenge, you will learn how to track IPv6 traffic patterns using Wireshark. Analyze IPv6 packets, filter specific traffic, and identify communication patterns to understand network behavior. Enhance your network analysis skills with this hands-on exercise.
Wireshark
Find Exposed Login Credentials

Find Exposed Login Credentials

In this challenge, you will use Wireshark to analyze network traffic and identify exposed login credentials. Learn how to filter packets and inspect data to uncover sensitive information transmitted in clear text.
Wireshark
Uncover Suspicious DNS Queries

Uncover Suspicious DNS Queries

In this challenge, you will use Wireshark to analyze network traffic and identify suspicious DNS queries. Learn to filter and interpret DNS data to uncover potential security threats and malicious activity.
Wireshark
Filter Encrypted Web Traffic

Filter Encrypted Web Traffic

In this challenge, you will learn how to filter encrypted web traffic using Wireshark. This hands-on exercise will guide you through the process of identifying and isolating encrypted communication within network captures.
Wireshark
  • Prev
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • ...
  • 24
  • Next