Here’s something that will make you uncomfortable.
Right now, on the same WiFi network as you — in a coffee shop, office, hotel, or airport — someone could be running a free tool called Wireshark and watching every unencrypted packet of data leaving your device. Your usernames. Your session cookies. Your browsing activity. All of it — captured in real time.
Wireshark is not a hacker tool. It’s a legitimate, free, open-source network packet analyzer used by security professionals, ethical hackers, and network engineers worldwide. But understanding it is the difference between knowing what’s happening on your network — and being completely blind to threats.
This is the complete Wireshark tutorial for 2026. No fluff. No textbook jargon. Whether you’ve never heard of it or you’ve opened it once and closed it because it looked terrifying — by the end of this guide, you’ll know exactly how to use it and what to look for.
What Is Wireshark?
Imagine every piece of information traveling across a network is like a letter being passed from person to person. Now imagine you have a magic glass that lets you intercept, open, and read every single one of those letters — without disturbing them or alerting anyone.
That magic glass is Wireshark.
Wireshark is a free, open-source network packet analyzer. It captures all the data packets traveling through your network interface in real time and lets you inspect them in extraordinary detail. You can see exactly what websites are being visited, what data is being sent, what protocols are in use, and whether anything suspicious is happening.
Security professionals use it to troubleshoot network problems, investigate breaches, and analyze suspicious traffic. Packet analysis is one of the most in-demand skills in cybersecurity today — and Wireshark is the tool that makes it accessible to everyone.
How to Download and Install Wireshark (Step by Step)
Installing Wireshark takes about 3 minutes. Here’s exactly how to do it on any operating system.
Visit wireshark.org/download.html — always download from the official source only. Third-party sites may bundle malware. This is non-negotiable.
Windows: Download the 64-bit installer (.exe). Run it and install WinPcap or Npcap when prompted — required for packet capture.
macOS: Download the .dmg file. Drag to Applications. Allow it in System Preferences > Security if prompted.
Linux / Kali Linux: Run sudo apt install wireshark in terminal. Select Yes when asked if non-superusers should capture packets.
Open Wireshark. You should see a list of network interfaces (WiFi, Ethernet, Loopback) with live wave graphs on the home screen. If you see them — installation is successful and you’re ready to capture.
Understanding the Wireshark Interface
Most beginners open Wireshark, see a wall of colorful data scrolling past at terrifying speed, and immediately close it. Don’t be that person. The interface is simple once you know what each part does.
Every row is one captured packet. Columns show: time, source IP, destination IP, protocol, length, and a brief info summary. This is your live feed of network activity.
Click any packet and this pane expands its full contents — every protocol layer from Ethernet at the bottom to HTTP at the top. This is where real analysis happens.
The raw hexadecimal and ASCII representation of the selected packet. Advanced analysts read credentials, form data, and file contents directly from this pane.
The most powerful feature in Wireshark. Type filter expressions here to show only the traffic you care about. The bar turns green when your filter is valid. This separates beginners from experts.
What the colors mean
- Green — TCP traffic (normal web browsing, most general internet communication)
- Light Blue — UDP traffic (DNS queries, video streaming, VoIP calls)
- Dark Blue — DNS traffic specifically
- Yellow / Light — Windows network traffic (SMB, NetBIOS)
- Red / Dark — TCP errors, bad checksums, connection resets — always investigate these
- Gray — TCP retransmissions, duplicate ACKs — signs of network instability or interference
Your First Packet Capture — Step by Step
Let’s do a live capture right now. You’ll see your own traffic in real time — and it will surprise you what’s visible to anyone else on the same network.
On the Wireshark home screen, look for the interface with a moving wave graph — that’s the active one. Usually it’s Wi-Fi or eth0. Double-click it to start capturing immediately.
Packets appear immediately — even with no active browsing. Background apps, system updates, DNS lookups, and keepalive connections constantly generate traffic. This is completely normal.
Open a browser and visit http://example.com (HTTP, not HTTPS — we want unencrypted traffic for this exercise). Return to Wireshark and you’ll see the HTTP request packets appear in real time.
Click the red stop button (or press Ctrl+E). You now have a static capture to analyze at your own pace. Save it as a .pcap file — a standard format used across forensics, incident response, and CTF competitions.
In the display filter bar, type http and press Enter. Click a packet and expand the HTTP layer in the middle pane — request headers, URL, and browser type all appear in plain text. This is exactly what an attacker on the same unprotected network would see.
“That unencrypted HTTP request you just captured? On a public WiFi network, every device on that segment can see the exact same thing. That’s why HTTPS and network security aren’t optional anymore.”
Wireshark Display Filters — The Complete Cheat Sheet
Filters are what make Wireshark usable. Without them, you’re drowning in thousands of packets. With them, you can zero in on exactly what matters in seconds. Master these and you’ll be ahead of 90% of Wireshark users.
Filter by protocol
https # Show only HTTPS / TLS traffic
dns # Show only DNS queries and responses
tcp # Show all TCP packets
udp # Show all UDP packets
icmp # Show ping packets (ICMP)
arp # Show ARP requests — detect ARP spoofing attacks
ftp # Show FTP traffic (credentials often in plain text!)
ssh # Show SSH encrypted sessions
Filter by IP address
ip.src == 192.168.1.1 # Traffic FROM this IP only
ip.dst == 192.168.1.1 # Traffic TO this IP only
ip.addr != 192.168.1.1 # Exclude this IP — show everything else
Filter by port
tcp.port == 443 # HTTPS port
tcp.port == 22 # SSH port
tcp.port == 21 # FTP port
udp.port == 53 # DNS port
Power combos (AND / OR / NOT)
tcp.port == 80 or tcp.port == 443 # All web traffic
not arp and not dns # Hide noisy background traffic
http.request.method == “POST” # Form submissions — credential exposure risk
tcp.flags.syn == 1 and tcp.flags.ack == 0 # SYN-only — detect active port scans
Real Hacker Scenarios — What Attackers Actually Look For
This is what an attacker sees when they run Wireshark on an unprotected network. Understanding this is the foundation of defense.
An attacker connects to public WiFi at a conference. They filter for http.request.method == "POST". Within minutes, a login form submission appears — username and password in plain text from another user’s HTTP admin panel. Total time: under 3 minutes.
Defense: Never use HTTP for anything sensitive. Always verify a site uses HTTPS before entering credentials.
The attacker doesn’t need your password at all. They capture session cookie values from HTTP request headers, paste that cookie into their own browser using developer tools, and they’re now logged into your session. The server sees them as you — no password required.
Defense: Use HTTPS-only sites, enable HSTS, and avoid public WiFi for sensitive sessions entirely.
A security engineer notices DNS responses arriving from an unexpected IP. She filters dns and compares response IPs against known-good values. She spots responses pointing to a rogue server. A DNS poisoning attack caught before any users were redirected. Wireshark made it visible in seconds.
This attack type is closely related to man-in-the-middle attacks — understanding how MITM works will make your Wireshark analysis far more effective.
Advanced Wireshark Features You Must Know
Follow TCP Stream
One of the most powerful features available. Right-click any TCP packet → Follow → TCP Stream. This reconstructs the entire conversation between two hosts as readable text — the full back-and-forth of a session. Essential for investigating suspicious connections and malware command-and-control traffic.
Statistics → Endpoints
Go to Statistics → Endpoints. This shows every unique IP address in your capture — how many packets, how many bytes. Sort by bytes to instantly spot data exfiltration or abnormal bandwidth usage. This is a core technique in network forensics and incident response.
Statistics → Conversations
Shows all two-way IP conversations in the capture. Useful for mapping network relationships and spotting unexpected communications — like an internal device talking to an external IP it has no reason to contact.
Export Objects
Go to File → Export Objects → HTTP. Wireshark shows every file transferred over HTTP during the capture — images, HTML, JavaScript, documents. This is how forensic analysts recover files transferred during a security incident.
Capture Filters vs Display Filters
Capture filters (BPF syntax, set before starting) limit what Wireshark records — e.g. port 80. Display filters (Wireshark syntax, applied post-capture) filter the view without discarding data — e.g. tcp.port == 80. Mixing up these two syntaxes is the most common mistake in every certification lab and interview.
Pro Tips From 20+ Years of Network Analysis
Always capture to file, not memory. Go to Capture > Options and set a save path before starting. Long captures will crash Wireshark if stored in RAM only. Always capture directly to a .pcap file during live tests and lab exercises.
Use ring buffer captures for long sessions. In Capture > Options, enable “Use a ring buffer.” Wireshark automatically rotates through files, keeping disk usage controlled during multi-hour monitoring sessions.
Learn tshark for headless analysis. Tshark is Wireshark’s command-line version — same engine, no GUI. It runs on servers, works over SSH, and is essential for automated analysis pipelines. Once you know Wireshark filters, tshark becomes immediately usable.
Practice on real pcap files first. The Wireshark Sample Captures wiki hosts real-world .pcap files — malware traffic, VoIP calls, network attacks. Analyzing these builds faster instincts than any course.
Color rules are fully customizable. Go to View > Coloring Rules to flag specific traffic patterns — like connections to known-bad IP ranges or unusual protocol combinations — in any color you choose. Professional analysts build custom rule sets tailored to their environment.
Common Beginner Mistakes That Waste Hours
If you’re on WiFi but capture on Ethernet, you’ll see almost nothing. Always verify which interface shows the live wave graph before starting a capture.
Scrolling raw packets is hopeless. Even a simple http or ip.addr == X.X.X.X filter cuts noise by 95%. Apply a filter before you do anything else.
On a switched network, Wireshark only captures your own machine’s traffic plus broadcasts. Capturing all segment traffic requires promiscuous mode and a mirrored switch port — this surprises almost every beginner.
port 80 is valid BPF syntax (capture filter). tcp.port == 80 is the correct Wireshark display filter equivalent. These are completely different syntaxes — confusing them is the single most common beginner error in labs and cert exams.
Unauthorized packet capture is a criminal offense in most jurisdictions. Always practice on your own network, or in legal lab environments like TryHackMe and HackTheBox — both have dedicated network analysis rooms.
Frequently Asked Questions About Wireshark
Your Network Has No Secrets From Wireshark
Wireshark is one of the most powerful tools in cybersecurity. Every professional in the field knows it. Now you do too — the interface, the filters, the real-world attack scenarios it exposes, and exactly how to use it to defend your network.
Do one thing before you close this page: open Wireshark and do your first live capture. That 10 minutes of hands-on experience will teach you more than any course.
Download at wireshark.org and start capturing. Every expert was a beginner who just started.
1. Download from wireshark.org (official site only)
2. Select the correct network interface (look for the live wave graph)
3. Start a capture and browse to http://example.com to generate traffic
4. Apply the http display filter and observe what’s visible in plain text
5. Right-click a packet → Follow → TCP Stream to read a full session conversation
6. Check Statistics → Endpoints to see every communicating device
7. Practice on real captures at wiki.wireshark.org/SampleCaptures






