Wireshark Packet Analysis
Packet-level inspection, protocol dissection, and network flow understanding using Wireshark. Shows investigative workflow for security analysts.
Wireshark Packet Capture & Analysis
๐ฏ Project Goal
Capture and analyze DNS, HTTP, and TLS/HTTPS traffic on a local network.
Demonstrate the difference between plaintext vs. encrypted protocols and practice using Wireshark filters.
๐ ๏ธ Environment
- Tool: Wireshark v4.x
- System: (fill in: Windows / Linux / macOS)
- Capture file:
Capture.pcapng - Screenshots: see
screenshots/folder
๐ก Steps Performed
- Opened Wireshark and started capture on active network interface (
192.168.0.185). - Generated traffic by:
- Visiting
http://example.com(plaintext HTTP) - Visiting
https://www.wikipedia.organdhttps://msn.com(TLS/HTTPS) - Triggering DNS lookups (
example.com)
- Visiting
- Applied filters:
dnsโ show DNS queries and responseshttpโ show HTTP GET/200 OK requeststlsโ show TLS handshakes (ClientHello, ServerHello)ip.addr == 192.168.0.185โ isolate host traffic
- Saved capture to
captures/Capture.pcapng. - Took screenshots of DNS answers, HTTP exchanges, and TLS handshake.
๐ Findings
๐ฃ DNS
- Queries to
example.comresolved to both IPv6 (AAAA) and IPv4 (A) records:2a01:860::10072a01:860::72.207.183.72.207.183.135
- Shows how DNS resolves names to multiple IPs, across IPv4/IPv6.
๐ธ Screenshot: screenshots/Screenshot 2025-08-20 160503.png
๐ข HTTP (plaintext)
- Observed cleartext GET /rootDesc.xml and
HTTP/1.1 200 OKresponse between192.168.0.185and192.168.0.1. - Also saw requests to
2.207.183.135with visible response headers/content type(text/html).
๐ธ Screenshot: screenshots/Screenshot 2025-08-20 160719.png
๐ต TLS / HTTPS
- Captured ClientHello to
assets.msn.com. - Visible details:
- SNI (Server Name Indication):
assets.msn.com - Supported TLS versions:
1.3,1.2 - Cipher suites, extensions, signature algorithms
- SNI (Server Name Indication):
- Application data (actual page content) was encrypted and not visible, proving confidentiality.
๐ธ Screenshot: screenshots/Screenshot 2025-08-20 160617.png
๐ Key Takeaways
- DNS traffic is plaintext (unless DoH/DoT is used) and reveals queried domains and IPs.
- HTTP exposes full requests and responses, including headers and content.
- HTTPS secures content, but metadata (server name, IP, handshake details) remains visible.
- Wireshark filters (
dns,http,tls,ip.addr == X) are essential for cutting through noise.
๐ Project Structure
wireshark-packet-analysis/
โโโ README.md # this file
โโโ captures/
โ โโโ Capture.pcapng # saved capture file
โโโ screenshots/
โ โโโ Screenshot 2025-08-20 160503.png
โ โโโ Screenshot 2025-08-20 160527.png
โ โโโ Screenshot 2025-08-20 160617.png
โ โโโ Screenshot 2025-08-20 160719.png
โโโ reports/
โโโ analysis-2025-08-20.md
โ ๏ธ Ethics & Safety
- Performed only on my own machine/network.
- No sensitive traffic shared publicly.
- Capture file only contains demo HTTP/DNS/HTTPS examples.