Wireshark cheat sheet (quick reference)
1) Capture filters (BPF) β applied when starting capture
Use these in the Capture β Options (or dumpcap / tshark -f).
Capture traffic to/from a host
host 192.168.1.10
Only source host
src host 10.0.0.5
Only destination host
dst host 10.0.0.5
Network (subnet)
net 192.168.0.0/24
Specific port (TCP or UDP)
port 80
TCP only on a port
tcp port 443
UDP only (e.g., DNS)
udp and port 53
Port range
portrange 1000-2000
Ether address filter
ether host 00:11:22:33:44:55
Combine filters
tcp and host 10.0.0.5 and port 80
2) Display filters (Wireshark GUI / -Y in tshark)
Powerful, protocol-aware filtering after capture.
Basic IP/TCP/UDP
ip.addr == 192.168.1.10 β any IP field matches
ip.src == 192.168.1.10
ip.dst == 8.8.8.8
tcp.port == 80 β matches src or dst port
tcp.srcport == 443
udp.port == 53
HTTP / DNS / TLS examples
http β show HTTP packets
http.request.method == "GET"
http.host == "example.com"
dns.qry.name == "example.com"
tls or ssl β show TLS/SSL (depends on version of Wireshark)
tls.handshake.type == 1 β ClientHello exists
frame contains "password" β payload contains text
Flags / conditions
tcp.flags.syn == 1 && tcp.flags.ack == 0 β SYN packets (connection start)
tcp.flags.reset == 1 β RST
tcp.analysis.retransmission β retransmitted packets
ip.len > 1500 β packets bigger than MTU
Text / regex
http.user_agent contains "Firefox"
http.host matches ".*google.*" β regex match
Existence checks
http.request β packets that are HTTP requests (exists)
ssl.handshake β packets where handshake exists
3) Useful GUI actions (shortcuts & tips)
Apply display filter: type in the filter bar and press Enter.
Clear display filter: Ctrl+Shift+C (or click X).
Start/Stop capture: green/red toolbar buttons.
Follow TCP stream: right-click a TCP packet β Follow β TCP Stream.
Export objects (HTTP): File β Export Objects β HTTP (grab files transferred).
Statistics β Endpoints / Conversations / Protocol Hierarchy β use for summaries.
Coloring rules: View β Coloring Rules to add visual filters.
4) Command line: tshark, dumpcap, editcap, mergecap
dumpcap β capture to file (recommended for long captures)
Capture on eth0, write to capture.pcap:
dumpcap -i eth0 -w capture.pcap
Ring buffer (split files by size):
dumpcap -i eth0 -b filesize:10240 -b files:10 -w capture.pcap
(filesize in KB; this rotates and keeps files number of files)
tshark β CLI packet analyzer (like tcpdump + Wireshark)
Capture live and write pcap:
tshark -i eth0 -w capture.pcap -f "port 80"
Read pcap and show summary:
tshark -r capture.pcap -q -z io,stat,0,COUNT,ip.src==192.168.1.10
Export selected fields (CSV-like):
tshark -r capture.pcap -Y "http" -T fields -e frame.number -e ip.src -e ip.dst -e http.request.method -E header=y -E separator=, > http_requests.csv
Follow TCP stream (ASCII) from capture (stream index 0):
tshark -r capture.pcap -q -z "follow,tcp,ascii,0"
(Change last number for the stream index shown in GUI follow list.)
editcap β split/convert pcap files
Split into files with 100000 packets each:
editcap -c 100000 input.pcap out_split.pcap
Convert pcapng β pcap:
editcap -F pcap input.pcapng output.pcap
mergecap β merge capture files
Merge files:
mergecap -w merged.pcap part1.pcap part2.pcap
5) Decrypting TLS / SSL (basic notes)
For older SSL/TLS with RSA key exchange, you can supply the server private key in Preferences β Protocols β TLS β RSA keys list (format: ip,port,protocol,keysfile).
For modern TLS (ECDHE/TLS1.3) use (Pre)-Master-Secret logging from the client (e.g., set SSLKEYLOGFILE in Firefox/Chrome) and configure Wireshark to use that file under TLS β (Pre)- Master-Secret log filename.
Note: Not all captures can be decrypted (depends on cipher suites and available keys).
6) Quick common filters & what they show
http β all HTTP traffic
tcp.port == 22 β SSH packets
ssh β SSH protocol (if detected)
dns β show DNS queries/responses
icmp β ping / ICMP traffic
arp β local ARP requests/replies
ip.addr == 10.0.0.5 && tcp.port == 80 β traffic to/from that IP on HTTP
frame.time >= "2025-09-12 14:00:00" β show packets after timestamp (use exact format Wireshark shows)
7) Troubleshooting tips / best practices
Use capture filters to limit data collection (less noise). Use display filters to slice details afterward.
When troubleshooting slowness: check tcp.analysis.retransmission, tcp.analysis.duplicate_ack, tcp.analysis.zero_window.
Use Protocol Hierarchy and Conversations for a quick overview of top talkers.
Keep timezone / clock sync in mind: mismatched clocks between devices make timelines confusing.
Save your display filters and coloring rules as a profile (Edit β Configuration Profiles).
8) Handy examples (copy/paste)
Capture only HTTPS traffic (port 443) and write ring buffer:
dumpcap -i eth0 -b filesize:10240 -b files:12 -f "tcp port 443" -w https_capture.pcap
Extract CSV of HTTP requests from a capture:
tshark -r capture.pcap -Y "http.request" -T fields -e frame.number -e frame.time -e ip.src -e ip.dst -e http.request.method -e http.request.uri -E header=y -E separator=, > http_requests.csv
Show only DNS queries for example.com:
GUI display filter:
dns.qry.name == "example.com"
Find SYN floods (lots of SYN without ACKs):
tcp.flags.syn == 1 && tcp.flags.ack == 0
View TCP stream #3 as ASCII in CLI:
tshark -r capture.pcap -q -z "follow,tcp,ascii,3"






