When you launch Wireshark, a welcome screen lists the available
network connections on your current device. Displayed to the right of
each is an EKG-style line graph that represents live traffic on that
network.
To begin capturing packets with Wireshark:
Select one or more of networks, go to the menu bar, then select Capture.
To select multiple networks, hold the Shift key as you make your selection.
In the Wireshark Capture Interfaces window, select Start.
There are other ways to initiate packet capturing. Select the shark fin on the left side of the Wireshark toolbar, press Ctrl+E, or double-click the network.
The captured data interface contains three main sections:
The packet list pane, located at the top of the window, shows all
packets found in the active capture file. Each packet has its own row
and corresponding number assigned to it, along with each of these data
points:
The details pane, found in the middle, presents the protocols and
protocol fields of the selected packet in a collapsible format. In
addition to expanding each selection, you can apply individual Wireshark
filters based on specific details and follow streams of data based on
protocol type by right-clicking the desired item.
At the bottom is the packet bytes pane, which displays the raw data of the selected packet in a hexadecimal view. This hex dump contains 16 hexadecimal bytes and 16 ASCII bytes alongside the data offset.
Selecting a specific portion of this data automatically highlights
its corresponding section in the packet details pane and vice versa. Any
bytes that cannot be printed are represented by a period.
Capture filters instruct Wireshark to only record packets that meet
specified criteria. Filters can also be applied to a capture file that
has been created so that only certain packets are shown. These are
referred to as display filters.
Wireshark provides a large number of predefined filters by default. To use one of these existing filters, enter its name in the Apply a display filter entry field located below the Wireshark toolbar or in the Enter a capture filter field located in the center of the welcome screen.
For example, if you want to display TCP packets, type tcp.
The Wireshark autocomplete feature shows suggested names as you begin
typing, making it easier to find the correct moniker for the filter
you're seeking.
While Wireshark's capture and display filters limit which packets are
recorded or shown on the screen, its colorization function takes things
a step further: It can distinguish between different packet types based
on their individual hue. This quickly locates certain packets within a
saved set by their row color in the packet list pane.
Other useful metrics are available through the Statistics
drop-down menu. These include size and timing information about the
capture file, along with dozens of charts and graphs ranging in topic
from packet conversation breakdowns to load distribution of HTTP
requests.