🎁 New User? Get 20% off your first purchase with code NEWUSER20 Register Now β†’
Menu

Categories

Wireshark Cheat Sheet 2026: The Complete Network Analysis Guide

Wireshark Cheat Sheet 2026: The Complete Network Analysis Guide
Wireshark network analysis workspace with packet capture data on multiple monitors

Wireshark is the world's most popular network protocol analyzer β€” and for good reason. Whether you're troubleshooting a sluggish application, investigating a security breach, or studying for your CCNA certification, Wireshark gives you unprecedented visibility into what's happening on your network.

This comprehensive cheat sheet covers everything from basic display filters to advanced forensic analysis techniques. We've organized 200+ filters, commands, and techniques into logical sections so you can quickly find exactly what you need. Plus, you can download the complete 22-page PDF for offline reference.

πŸ“₯ Free Download: Wireshark Complete Cheatsheet 2026

22 pages β€’ 200+ filters β€’ tshark CLI β€’ Forensics β€’ VoIP β€’ Wireless

Download Free PDF β†’

1. Display Filter Fundamentals

Display filters are the most powerful feature in Wireshark. They let you narrow down captured traffic to exactly what you need to see. Understanding the syntax is essential for efficient packet analysis.

Comparison Operators

OperatorExampleDescription
== (eq)ip.addr == 192.168.1.1Equal to
!= (ne)ip.addr != 10.0.0.1Not equal to
> (gt)frame.len > 1000Greater than
< (lt)tcp.port < 1024Less than
containshttp.host contains "google"Field contains value
matches (~)http.host matches "\.(com|org)$"Regex match
intcp.port in {80, 443, 8080}Value in set

Logical Operators

# AND - both conditions must match
ip.src == 10.0.0.1 && tcp.port == 80

# OR - either condition matches
dns || http

# NOT - exclude matching packets
!arp

# Grouping with parentheses
(ip.src == 10.0.0.1) && (tcp.port == 80 || tcp.port == 443)
πŸ’‘ Pro Tip: The display filter bar turns green when the syntax is valid and red when invalid. Start typing a protocol name and Wireshark will auto-complete field suggestions.

2. Capture Filters (BPF Syntax)

Network packet analysis showing protocol layers with TCP UDP HTTP DNS highlighted

Capture filters use Berkeley Packet Filter (BPF) syntax β€” a completely different language from display filters. They're applied before packets are captured, which is critical for high-traffic networks where you'd otherwise run out of memory.

Essential Capture Filters

FilterDescription
host 192.168.1.1Traffic to/from specific host
net 192.168.1.0/24Traffic for entire subnet
port 80Traffic on specific port
tcpTCP traffic only
not broadcastExclude broadcast traffic
host 10.0.0.1 and port 443HTTPS to specific host
not port 22Exclude SSH traffic
icmpICMP traffic only (ping, traceroute)
⚠️ Important: Display filters and capture filters use DIFFERENT syntax! ip.addr == 192.168.1.1 is a display filter. host 192.168.1.1 is the equivalent capture filter. Don't mix them up.

3. IP & Ethernet Filters

IP Address Filtering

# Traffic involving specific IP (source OR destination)
ip.addr == 192.168.1.1

# Source IP in private range
ip.src == 10.0.0.0/8

# Packets with low TTL (routing issues)
ip.ttl < 10

# Fragmented packets
ip.flags.mf == 1

# IPv6 traffic
ip.version == 6

# ARP requests only
arp.opcode == 1

# Duplicate IP detection
arp.duplicate-address-detected

4. TCP Analysis & Troubleshooting

TCP analysis is where Wireshark truly shines. Understanding TCP flags and Wireshark's built-in analysis expert helps you quickly identify network performance problems.

TCP Flag Filters

FilterWhat It Finds
tcp.flags.syn == 1 && tcp.flags.ack == 0Initial connection requests (SYN only)
tcp.flags.syn == 1 && tcp.flags.ack == 1Server responses (SYN-ACK)
tcp.flags.fin == 1Connection termination
tcp.flags.reset == 1Connection resets (refused/aborted)

TCP Troubleshooting Filters

# Retransmissions (packet loss indicator)
tcp.analysis.retransmission

# Duplicate ACKs (receiver requesting retransmission)
tcp.analysis.duplicate_ack

# Zero window (receiver buffer full)
tcp.analysis.zero_window

# Out-of-order segments
tcp.analysis.out_of_order

# Lost segments
tcp.analysis.lost_segment

# Follow a specific TCP conversation
tcp.stream eq 5

# All TCP problems combined
tcp.analysis.flags
πŸ” Troubleshooting Guide: High retransmissions = packet loss or congestion. Zero window = receiver overwhelmed. Duplicate ACKs = receiver detected gap. Use Statistics > TCP Stream Graphs > Round Trip Time to visualize latency per stream.

5. HTTP/HTTPS Traffic Analysis

Network security monitoring command center with traffic analysis dashboards

HTTP Filters

# All HTTP requests
http.request

# Specific methods
http.request.method == "GET"
http.request.method == "POST"

# API endpoint requests
http.request.uri contains "/api/"

# Specific host
http.host == "example.com"

# Error responses
http.response.code >= 400    # All errors
http.response.code == 404    # Not Found
http.response.code >= 500    # Server errors

# Content types
http.content_type contains "json"
http.content_type contains "html"

# Authentication headers
http.authorization
http.cookie contains "session"

TLS/HTTPS Decryption

To decrypt HTTPS traffic in Wireshark:

  1. Set the SSLKEYLOGFILE environment variable in your browser before capturing
  2. In Wireshark: Edit > Preferences > Protocols > TLS
  3. Set the (Pre)-Master-Secret log filename to your key log file
  4. Wireshark will automatically decrypt matching TLS sessions
# TLS handshake messages
tls.handshake

# Client Hello (connection initiation)
tls.handshake.type == 1

# Server Name Indication (SNI) filter
tls.handshake.extensions_server_name contains "example"

# TLS 1.3 traffic
tls.handshake.extensions.supported_versions == 0x0304

# TLS alerts (errors)
tls.alert_message

6. DNS Investigation

Essential DNS Filters

FilterPurpose
dns.qry.name == "example.com"Queries for specific domain
dns.flags.rcode == 3NXDOMAIN (domain not found)
dns.qry.type == 1A record queries (IPv4)
dns.qry.type == 28AAAA record queries (IPv6)
dns.qry.type == 15MX record queries (mail)
dns.qry.type == 16TXT record queries
dns.count.answers > 10Suspiciously many answers
dns.qry.name.len > 50Long domains (tunneling indicator)
πŸ”΄ Security Alert: DNS tunneling indicators: query names >50 characters, high TXT query volume, large DNS responses (>512 bytes), and repeated queries to unusual TLDs. Filter: dns.qry.name.len > 50 || dns.resp.len > 512

7. tshark Command-Line Interface

tshark is the command-line version of Wireshark β€” essential for headless servers, scripting, and automated analysis. It supports the same display filters and protocol dissectors.

Essential tshark Commands

# List available interfaces
tshark -D

# Capture 1000 packets on eth0
tshark -i eth0 -c 1000

# Capture with display filter
tshark -i eth0 -Y "http.request"

# Write to file
tshark -i eth0 -w capture.pcapng

# Read file with filter
tshark -r capture.pcapng -Y "dns"

# Custom field output
tshark -r capture.pcapng -T fields -e ip.src -e ip.dst -e tcp.port

# JSON output
tshark -r capture.pcapng -T json -Y "http.request"

# Ring buffer (rotate 10 files, 100MB each)
tshark -i eth0 -b filesize:102400 -b files:10 -w ring.pcapng

# Extract HTTP objects
tshark -r capture.pcapng --export-objects http,./exported_files/

# Protocol hierarchy statistics
tshark -r capture.pcapng -z io,phs

# TCP conversation statistics
tshark -r capture.pcapng -z conv,tcp

Companion CLI Tools

ToolPurpose
editcapSplit, trim, convert, and deduplicate capture files
mergecapMerge multiple capture files into one
capinfosDisplay capture file statistics (packets, duration, size)
dumpcapLow-level capture tool (used by Wireshark internally)
text2pcapConvert hex dump text to pcap format

8. Network Forensics & Security

Digital forensics and network troubleshooting concept with data packet analysis

Wireshark is an indispensable tool for security investigations. Here are the key filters for detecting malicious activity.

Port Scan Detection

# TCP SYN scan (many SYN, few established connections)
tcp.flags.syn == 1 && tcp.flags.ack == 0

# NULL scan (no flags set)
tcp.flags == 0x000

# XMAS scan (FIN+PSH+URG)
tcp.flags.fin == 1 && tcp.flags.push == 1 && tcp.flags.urg == 1

# Many RST responses (closed ports)
tcp.flags.reset == 1

Threat Detection Filters

ThreatFilter
ARP Spoofingarp.duplicate-address-detected
DNS Tunnelingdns.qry.name.len > 50 || dns.resp.len > 512
ICMP Tunnelingicmp && data.len > 64
SSH Brute Forcetcp.port == 22 && tcp.flags.syn == 1
Cleartext Credentialshttp.authorization || ftp.request.command == "PASS"
Suspicious HTTPhttp.user_agent contains "curl" || http.user_agent contains "wget"
Data Exfiltrationtcp.len > 10000 && !(http || tls)
HTTP to IP (no domain)http.host matches "^[0-9]+\.[0-9]+"

9. VoIP & SIP/RTP Analysis

SIP Call Analysis

# All SIP traffic
sip

# Call initiation
sip.Method == "INVITE"

# Call termination
sip.Method == "BYE"

# SIP errors
sip.Status-Code >= 400

# RTP media streams
rtp

# RTCP quality reports
rtcp

Use Telephony > VoIP Calls for a complete call listing with duration and codecs. Telephony > RTP Player can play back captured audio. Call quality issues show as jitter >30ms, packet loss >1%, or latency >150ms.

10. Wireless (802.11) Capture

Wireless capture requires your adapter to support monitor mode. Key filters for WiFi analysis:

# Management frames (beacons, probes, auth)
wlan.fc.type == 0

# Beacon frames
wlan.fc.type_subtype == 0x0008

# Specific SSID
wlan.ssid == "MyNetwork"

# Deauthentication frames (attack indicator!)
wlan.fc.type_subtype == 0x000c

# WPA handshake capture
eapol

# Probe requests (device discovery)
wlan.fc.type_subtype == 0x0004
⚠️ Legal Notice: Capturing network traffic without authorization may violate laws in your jurisdiction. Always obtain proper permission before capturing traffic, especially on networks you don't own or administer.

11. Performance & Statistics

Performance Problem Filters

ProblemFilter
TCP Retransmissionstcp.analysis.retransmission
Out-of-Order Packetstcp.analysis.out_of_order
Zero Windowtcp.analysis.zero_window
Connection Resetstcp.flags.reset == 1
Slow DNSdns.time > 0.5
Slow HTTPhttp.time > 1
High Latencyframe.time_delta > 0.1

Statistics Menu Quick Reference

  • Statistics > Protocol Hierarchy β€” Protocol breakdown by percentage
  • Statistics > Conversations β€” Top talkers by bytes/packets
  • Statistics > Endpoints β€” All unique endpoints with traffic volume
  • Statistics > I/O Graphs β€” Visual traffic over time (add custom filters)
  • Statistics > Flow Graph β€” Sequence diagram between hosts

12. Keyboard Shortcuts

ShortcutAction
Ctrl+EStart/Stop capture
Ctrl+RRestart capture
Ctrl+FFind packet
Ctrl+GGo to packet number
Ctrl+MMark/Unmark packet
Ctrl+TSet time reference
Ctrl+Shift+SSave capture as...
Right-click > FollowFollow TCP/UDP/HTTP stream

Top 15 Must-Know Filters

If you remember nothing else from this cheat sheet, memorize these 15 filters. They'll solve 90% of your network analysis needs:

ip.addr == x.x.x.x             # Traffic involving specific IP
tcp.port == 80                   # HTTP port traffic
dns                              # All DNS traffic
http.request                     # HTTP requests only
tcp.flags.syn == 1               # Connection initiations
tcp.flags.reset == 1             # Connection resets
tcp.analysis.retransmission      # Retransmitted packets
!arp && !dns                     # Exclude ARP and DNS noise
tcp.stream eq N                  # Follow specific TCP stream
http.response.code >= 400        # HTTP errors
tls.handshake                    # TLS handshakes
frame.len > 1000                 # Large packets only
tcp.analysis.zero_window         # Zero window events
dns.flags.rcode != 0             # DNS errors
tcp.analysis.flags               # All TCP problems

πŸ“₯ Download the Complete Wireshark Cheatsheet

22 pages of filters, commands, and techniques β€” free PDF download

Download Free PDF β†’

Related Resources

Stay Updated with IT Insights

Get new cheat sheets, guides, and exclusive deals delivered to your inbox.

Subscribe to Newsletter β†’
Share this article:
Dargslan Editorial Team (Dargslan)
About the Author

Dargslan Editorial Team (Dargslan)

Collective of Software Developers, System Administrators, DevOps Engineers, and IT Authors

Dargslan is an independent technology publishing collective formed by experienced software developers, system administrators, and IT specialists.

The Dargslan editorial team works collaboratively to create practical, hands-on technology books focused on real-world use cases. Each publication is developed, reviewed, and...

Programming Languages Linux Administration Web Development Cybersecurity Networking

Stay Updated

Subscribe to our newsletter for the latest tutorials, tips, and exclusive offers.