Wireshark

Content that refers to the Wireshark packet analysis tool.

The TLS 1.2 Protocol Ladder

I provide this information for reference when examining TLS in Wireshark. The TLS 1.2 protocol ladder (also called the TLS handshake ladder) describes the step-by-step sequence of message exchanges between a client and server as they negotiate a secure, encrypted connection. Think of it as a “ladder” where each side alternates rungs (messages) upward until […]

The TLS 1.2 Protocol Ladder Read More »

What is the Adapter for loopback traffic capture in Wireshark?

Using a loopback adapter (also called a local loopback interface) for packet capture in Wireshark allows you to capture traffic that stays within your own computer — for example, packets exchanged between local applications via localhost or 127.0.0.1. Normally, this traffic never reaches a physical network interface, so a loopback capture is needed to see

What is the Adapter for loopback traffic capture in Wireshark? Read More »

Ethernet Taps to Capture Network Traffic

Many technicians and network engineering staff, as well as IT staff, often need to “tap” into the Ethernet to capture and troubleshoot network traffic. A full-duplex tap (also called a network tap) is a hardware device placed inline on an Ethernet link that allows network engineers to capture all traffic traveling in both directions —

Ethernet Taps to Capture Network Traffic Read More »

Wireshark TCP Analysis Flags Cheat Sheet

Below is a great TCP Analysis Flags Cheat Sheet for Wireshark. These are essentially Display Filters. They are all included in our TCP troubleshooting profile you can find here. Analysis Flags/Display filter Trigger Impact/Meaning/Notes tcp.analysis.ack_lost_segment A segment that is not in the trace has been acknowledged Indicates that not all packets have been recorded or a route has been flapped tcp.analysis.duplicate_ack The receiver

Wireshark TCP Analysis Flags Cheat Sheet Read More »

Troubleshooting C15 and MGCP Protocols for VoIP

Let’s start with some simple definitions of these protocols and how they work together. In Voice over IP (VoIP) to PSTN (telephone) network integration, MGCP and C15 can work together as part of a layered signaling architecture that bridges IP-based call control with traditional PSTN switching systems. Here’s how they fit and interact: MGCP (Media

Troubleshooting C15 and MGCP Protocols for VoIP Read More »

Capturing Packet Traffic with VLAN Tags on Windows

Capturing network traffic with VLAN tags on a Windows computer can be tricky due to how network adapters and capture software handle VLAN-tagged frames. By default, Windows often strips VLAN tags before passing packets to capture applications like Wireshark. However, there are ways to configure your setup to properly capture VLAN information. 1. Install the

Capturing Packet Traffic with VLAN Tags on Windows Read More »

Automatically Switch Configuration Profiles in Wireshark

As most of my readers, students, and clients know, I absolutely love Wireshark. I deeply am infatuated with Wireshark’s Profiles, more properly called configuration profiles. So much so that many years ago now, I set up the first Wireshark Profiles Repository. 100’s of thousands of downloads have resulted, and I hope I have helped the

Automatically Switch Configuration Profiles in Wireshark Read More »

A Simple Capture and Filter Exercise for Wireshark

Someone asked the following “getting started” question on the Wireshark Discord site, and it prompted me to write this FAQ to help newcomers to Wireshark understand how to navigate the initial complexity of packet capture. Hi everyone! I’m new here and just downloaded wireshark for a Computer Comm class. I need to capture traffic sent

A Simple Capture and Filter Exercise for Wireshark Read More »

Scroll to Top