Saturday, May 31, 2025

Useful Wireshark Filters Cyber Threat Intelligence

Useful

Wireshark Filters

Cyber Threat Intelligence

ip.addr == 10.0.0.1: Show all traffic with 10.0.0.1 as either source or destination.

ip.addr == 10.0.0.0/24: Show all traffic to and from any address in 10.0.0.0/24.

ip.src == 10.0.0.1 && ip.dst == 10.0.0.2: Show all traffic from 10.0.0.1 to 10.0.0.2.

!(ip.addr == 10.0.0.1): Exclude all traffic to or from 10.0.0.1.

icmp.type == 3: Show ICMP "destination unreachable" packets.

tcp or udp: Show TCP or UDP traffic.

tcp.port == 80: Show TCP traffic with port 80.

tcp.srcport < 1000: Show TCP traffic with source port range.

http or dns: Show all HTTP or DNS traffic.

tcp.flags.syn == 1: Show TCP packets with SYN flag set.

tcp.flags == 0x012: Show TCP packets with both SYN and ACK flags set.

tcp.analysis.retransmission: Show all retransmitted TCP packets.

http.request.method == "GET": Show TCP packets associated with HTTP GET.

http.response.code == 404: Show packets associated with HTTP 404 response.

http.host == "www.abc.com: Show HTTP traffic matching the Host header field.

tis.handshake: Show only TLS handshake packets.

tls.handshake.type == 1: Show client Hello packet during TLS handshake.

dhcp and ip.addr == 10.0.0.0/24: Show DHCP traffic for 10.0.0.0/24 subnet.

dhcp.hw.mac_addr == 00:11:22:33:44:55: Show DHCP packets for client MAC address.

dns.resp.name == cnn.com: Show DNS responses with name field of "cnn.com".

frame contains keyword: Show all packets that contain the word "keyword".

frame.len > 1000: Show all packets with total length larger than 1000 bytes.

eth.addr == 00:11:22:33:44:55: Show all traffic to or from the specified MAC address.

eth [0x47:2] == 01:80: Match Ethernet frames with 2 bytes at offset 0x47 == 01:80.

!(arp or icmp or stp): Filter out background traffic from ARP, ICMP, and STP.

vlan.id == 100: Show packets with VLAN ID 100.

No comments: