Network Forensics with wireshark
IP Filters
ip.addr == 192.168.1.1 : Specific IP To filter packets from or to a specific IP
ip.src == 192.168.1.1 : Source or Destination IP Specify if you're interested in packets from a source or to a destination.
ip.dst == 192.168.1.1Port-Based Filters
tcp.port == 80 : HTTP Traffic (Port 80) Often used to identify cleartext web traffic
tcp.port == 443 : HTTPS Traffic (Port 443) Useful for tracking encrypted web traffic.
udp.port == 53 : DNS Traffic (Port 53) DNS queries and responses, often targeted in DNS tunneling attacks
tcp.dstport == 3333Protocol-Specific Filters
dns : DNS Traffic &Track domain name resolutions
dns.qry.name contains ".onion" || dns.qry.name contains "suspiciousdomain" : Suspicious Domain Lookups & Look for uncommon or long domain names, which can indicate DNS tunneling.
http || tls : HTTP and HTTPS Monitor both HTTP and HTTPS traffic
ftp : FTP Traffic Often used by attackers for data exfiltration.
ftp.request.command == "STOR" || ftp.request.command == "RETR" : FTP File Transfers & Detect uploads and downloads
icmp : ICMP Traffic Useful for identifying ping sweeps or DoS attacks
icmp.type == 8
smb || smb2 : Often used by attackers for lateral movement and Capture all SMB communications
smb.cmd == 0x2e : SMB File Access & Track file access events on SMB shares
kerberos : Kerberos Traffic Filter for all Kerberos authentication traffic
ldap : LDAP Traffic: Capture LDAP protocol traffic Malicious Traffic Indicators
Filters for ARP Poisoning
Buffer Overflow in Network Traffic
Analyzing Payloads and Content
searching for specific file
Detecting Anomalous Connections
Kerberos Traffic
LDAP Traffic (Active Directory)
Last updated