Mastering Wireshark Filters: The Ultimate Guide

Wireshark is one of the most powerful tools for network analysis, troubleshooting, and security monitoring. However, dealing with a massive volume of captured packets can be overwhelming. This is where Wireshark display filters come in handy.

In this guide, we cover the top Wireshark filters, from basic to advanced, to help you quickly isolate relevant network traffic.

Wireshark Filters by Category

To make it easier to find relevant filters, we have categorized them into sections based on their use case.

Basic Filters

FilterDescription
ipDisplays all IP-based traffic
tcpFilters only TCP packets
udpFilters only UDP packets
icmpFilters ICMP (ping) traffic
eth.addr == XX:XX:XX:XX:XX:XXFilters packets with a specific MAC address
ip.addr == X.X.X.XShows packets involving a specific IP address
ip.src == X.X.X.XDisplays packets originating from a specific source IP
ip.dst == X.X.X.XShows packets sent to a specific destination IP
tcp.port == XXFilters TCP traffic on a specific port
udp.port == XX

Filters UDP traffic on a specific port

 

Security & Malware Analysis

FilterDescription
http contains "password"Finds plaintext passwords in HTTP traffic
tls.handshake.type == 1Detects TLS Client Hello packets (useful for MITM detection)
ip.geoip.country == "China"Filters traffic from a specific country
dns and dns.qry.name contains "malicious.com"Finds suspicious DNS queries
tcp.flags.reset == 1Shows TCP reset (RST) packets, often used in attacks
smbFilters SMB (Server Message Block) protocol traffic
frame contains "User-Agent"Searches for unusual user-agents in HTTP traffic
http.request.method == "POST"Displays HTTP POST requests (useful for detecting data exfiltration)

 

Wireless & Wi-Fi Filters

FilterDescription
wlanDisplays all Wi-Fi traffic
wlan.ssid == "WiFi_Name"Filters packets for a specific Wi-Fi SSID
wlan.bssid == XX:XX:XX:XX:XX:XXFilters packets from a specific AP (BSSID)
wlan.fc.type_subtype == 0x04Captures probe requests from clients scanning for networks
wlan.fc.type_subtype == 0x08Captures only beacon frames
wlan_mgt.tag.number == 221Filters frames with vendor-specific information
wlan.fc.retry == 1

Shows retransmitted frames, useful for debugging connectivity issues

 

VoIP & Streaming Filters

FilterDescription
rtpDisplays Real-time Transport Protocol (RTP) traffic
sipFilters Session Initiation Protocol (SIP) traffic
rtspShows Real Time Streaming Protocol (RTSP) traffic
h323Filters H.323 VoIP traffic
sdpDisplays only Session Description Protocol (SDP) messages
mgcpFilters Media Gateway Control Protocol traffic

 

Advanced TCP Filters

FilterDescription
tcp.analysis.flagsFinds TCP errors and retransmissions
tcp.analysis.retransmissionDetects TCP retransmissions
tcp.analysis.lost_segmentFinds missing TCP segments
tcp.flags.syn == 1Captures packets with TCP SYN flag (connection initiation)
tcp.flags.fin == 1Captures packets with TCP FIN flag (connection termination)
tcp.window_size < 1000Identifies small TCP window sizes (performance issue)
tcp.options.mss < 500Detects abnormally small Maximum Segment Size (MSS) values
tcp.port == 443Shows only HTTPS traffic

 

DNS & DHCP Filters

FilterDescription
dnsDisplays only DNS traffic
dns.qry.name contains "example.com"Filters DNS queries for a specific domain
dns.flags.response == 1Shows only DNS responses
dhcpDisplays only DHCP traffic
bootp.option.dhcp == 1Filters DHCP packets specifically
dhcp.option.dhcp_message_type == 1Shows only DHCP Discover messages
dhcp.option.dhcp_message_type == 2Shows only DHCP Offer messages

 

 

Wireshark filters make it easier to analyze large packet captures, troubleshoot network issues, and detect security threats. Whether you’re a beginner or an experienced network professional, mastering these filters will boost your efficiency.

 

What’s Next?

 

Leave a Reply

Your email address will not be published. Required fields are marked *