Wireshark network packet capture tool

Source: Internet
Author: User

Reading directory

  1. Wireshark Introduction
  2. Wireshark cannot do
  3. Wireshark vs fiddler
  4. Other similar tools
  5. Who will use Wireshark?
  6. Wireshark starts packet capture
  7. Wireshark window Introduction
  8. Wireshark display Filtering
  9. Save Filter
  10. Filter expression
  11. Packet List Pane)
  12. Packet details pane)
  13. Wireshark and corresponding OSI Layer-7 Model
  14. Specific content of the TCP package
  15. Instance analysis TCP three-way handshake process


Wireshark Introduction

Wireshark official download site: http://www.wireshark.org/

Wireshark is a very popular network packet analysis software with powerful functions. You can intercept various network packets to display the details of network packets.

Wireshark is an open-source software that can be safely used. It can run on Windows and Mac OS.


Wireshark users must understand the network protocol. Otherwise, Wireshark cannot be understood.

Wireshark cannot do

For security considerations, Wireshark can only view packets, but cannot modify the contents of the packets or send packets.


Wireshark vs fiddler

Fiddler is a program running on Windows. It is specially used to capture HTTP and HTTPS.

Wireshark can obtain HTTP and https, but cannot decrypt https, so Wireshark cannot understand the content in https


To sum up, if HTTP and HTTPS are processed, or Fiddler is used, other protocols such as TCP and UDP use Wireshark.

Other similar tools

Microsoft Network Monitor



Who will use Wireshark?

1. The network administrator will use Wireshark to check network problems

2. Software Testing engineers use Wireshark to capture packets and analyze the software they test.

3. engineers engaged in socket programming will use Wireshark for debugging

4. I heard that most engineers of Huawei and ZTE will use Wireshark.


In short, Wireshark may be used for network-related things.

Wireshark starts packet capture

Start Interface

Wireshark is a network package that captures a certain network card on the machine. When there are multiple network cards on your machine, you need to select a network card.

Click caputre-> interfaces .. The following dialog box is displayed. Select the correct Nic. Click "start" to start packet capture.


Wireshark window Introduction


Wireshark is mainly divided into these interfaces

1. Display filter, used for filtering

2. Packet List Pane (packet list): displays the captured packets, source addresses, target addresses, and port numbers. Different colors, representing

3. Packet details pane (packet details) to display the fields in the packet

4. dissector pane (hexadecimal data)

5. miscellanous (Address Bar, miscellaneous)


Wireshark display Filtering

Filtering is very important. When Beginners use Wireshark, they will get a lot of redundant information, which is so difficult to find what they need in thousands or even tens of thousands of records. Confused.

Filters help us quickly find the information we need in a large amount of data.

There are two filters,

One is the display filter, which is the one on the main interface used to find the desired record in the captured record.

One is the capture filter, which is used to filter captured packets to avoid capturing too many records. Set in capture-> capture Filters


Save Filter

In the Filter column, fill in the filter expression and click Save to get a name. For example, "filter 102 ",

A "filter 102" button is added to the Filter column.

Filter expression rules

Expression rules

1. Protocol Filtering

For example, TCP only displays the TCP protocol.

2. IP address filtering

For example, IP. src = indicates that the source address is,

IP. dst =, Destination Address:

3. Port Filtering

TCP. Port = 80, port 80

TCP. srcport = 80, only display the port of TCP protocol is 80.

4. http mode filtering

HTTP. Request. Method = "get", only the http get method is displayed.

5. The logical operator is and/or.

Common filter expressions

Filter expression Purpose
HTTP View Only HTTP protocol records
IP. src = or IP. dst = The source address or target address is








Packet List Pane)

The number, timestamp, source address, target address, protocol, length, and packet information are displayed on the panel of the package list. You can see that different protocols are displayed in different colors.

You can also modify the display color rules, view-> coloring rules.


Packet details pane)

This panel is the most important for us to view every field in the Protocol.

Each row information is

Frame: data frame overview of the Physical Layer

Ethernet II: Ethernet frame header information at the data link layer

Internet Protocol Version 4: Internet layer IP packet header information

Transmission Control Protocol: information about the data segment header of transport layer T, which is TCP

Hypertext Transfer Protocol: information of the application layer. This is the HTTP protocol.


Wireshark and corresponding OSI Layer-7 Model

Specific content of the TCP package

Each field in the TCP packet captured by Wireshark is displayed.



Instance analysis TCP three-way handshake process

Now we have a preliminary understanding of wireshak.


The three-way handshake process is


I have read this picture many times. This time we used Wireshark to analyze the three handshakes.

Open Wireshark, open browser input http://www.cnblogs.com/tankxiao

Enter HTTP filtering in Wireshark, select the record of get/tankxiao HTTP/1.1, right-click and click "follow TCP stream ",

The purpose of this operation is to obtain the data packets related to opening the website in a browser.

As shown in the figure, Wireshark intercepts three data packets of three handshakes. The fourth packet is HTTP, which indicates that HTTP uses TCP to establish a connection.


First handshake packet

The client sends a TCP packet. The flag is SYN and the serial number is 0, indicating that the client requests to establish a connection. For example

The second handshake packet.

The server sends back the confirmation packet. The flag is SYN, and ACK. Sets acknowledgement number to the customer's I S N plus 1 to. 0 + 1 = 1, as shown in

Data packet for the third handshake

The client resends the ack syn flag to 0 and the ACK flag to 1. in addition, the serial number field + 1 sent from the server is placed in the confirmation field and sent to the other party. and put the ISN's + 1 in the data segment, for example:

In this way, the TCP three-way handshake is used to establish a connection.



If you have read this blog and want to learn more, click[Recommended]

If you want to repost this blog,Please specify the source

If you have any comments or suggestions for this article, please leave a message.

Thank you for reading this article. Please follow up on my blog

Wireshark network packet capture tool

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.