Cyber Research Wiki

Wireshark

Wireshark is an open-source network protocol analyzer for capturing and interactively analyzing packet data from live interfaces or capture files, with a companion CLI (TShark) and a capture utility (dumpcap).

Overview

Wireshark is used for network troubleshooting, protocol development, education, and digital forensics. It provides deep protocol dissection with powerful display filtering and supports numerous capture file formats. Live capture is delegated to the separate dumpcap program and platform capture libraries (libpcap on UNIX-like systems and Npcap on Windows), enabling the main analyzer to operate with normal user privileges. Much of the same analysis capability is available in a terminal interface through TShark. Wireshark’s default capture format is pcapng, though it can read and write pcap and many other formats. When supplied with appropriate keys or secrets, it supports limited decryption workflows (for example, TLS using (Pre)-Master Secret logs).

What It Is

Wireshark is a GUI-centric protocol analyzer comprising hundreds of dissectors for both common and specialized protocols. It functions within a toolchain where dumpcap performs privileged packet capture, while Wireshark and TShark perform decoding, filtering, and analysis. It operates on live traffic or stored captures and integrates a display filter language tied to protocol fields for targeted investigation and reporting.

How It Works

Core Concepts

Typical Workflow

Use Cases

Limitations

Related Tools

Evidence Gaps

Sources

Confidence

high