BASICS
Read from a pcap: tshark -r <file.pcap>
Print TCP conversations: tshark -r <file.pcap> -z conv,tcp
(add -q
to suppress packet info)
Print field-formatted: tshark -r <file.pcap> -T fields -e <field1> -e <field2> ...
List User-Agents: tshark -r <file.pcap> -T fields -e http.user_agent
Print X.509 certs: tshark -r <file.pcap> -T fields -R "ssl.handshake.certificate" -e x509sat.printableString
Apply a display filter: tshark -r <file.pcap> -Y <display filter>
Print packet summaries for TCP packets to port 71: tshark -r <file.pcap> -Y "tcp.dstport == 71"
Display contents of TCP stream between 10.0.0.1 port 123 and 10.0.0.2 port 456: tshark -r <file.pcap> -z "follow,tcp,ascii,10.0.0.1:123,10.0.0.2:456"
Decrypt WPA traffic (-o <pref>:<val>
overrides preference) and print http file data: tshark -r <file.pcap> -o wlan.enable_decryption:TRUE -o "uat:80211_keys:\"wpa-pwd\",\"password:<w1F1-P4ssw0rD\"" -T fields -e http.file_data
Decrypt using SSL keys: tshark -r <file.pcap> -o 'uat:rsa_keys:"./server_private_key.pem",""' -Tfields -e text
Decrypt with pre master secret: tshark -r <file.pcap> -o 'tls.keylog_file:./premastersecret.txt' -T fields -e http.request.uri
Show detailed view of http packets and summaries of others: tshark -r <file.pcap> -O http
List possible fields: tshark -G
Fields Cheatsheet
The field text
on its own may sometimes work (e.g. for HTTP and FTP)
Ethernet eth
https://www.wireshark.org/docs/dfref/e/eth.html
addr
, len
, src
, dst
, lg
, trailer
, ig
, multicast
, type
IPv4 ip
https://www.wireshark.org/docs/dfref/i/ip.html
addr
, checksum
, checksum_bad
, checksum_good
, dst
, dst_host
, flags
, flags.df
, flags.mf
, flags.rb
, hdr_len
, host
, id
, len
, proto
, reassembled_in
, src
, src_host
, tos
, tos.cost
, tos.delay
, tos.precedence
, tos.reliability
, tos.throughput
, ttl
, version
IPv6 ipv6
https://www.wireshark.org/docs/dfref/i/ipv6.html
addr
, dst
, dst_host
, hlim
, host
, nxt
, opt.pad1
, opt.padn
, plen
, reassembled_in
, src
, src_host
, version
TCP tcp
https://www.wireshark.org/docs/dfref/t/tcp.html
ack
, checksum
, checksum_bad
, checksum_good
, continuation_to
, dstport
, flags
, flags.{ack,cwr,ecn,fin,push,reset,syn,urg}
, hdr_len
, len
, nxtseq
, options
, options.{cc,ccecho,ccnew,echo,echo_reply,md5,mss,mss_val,qs,sack,sack_le.sack_perm,sack_re,time_stamp,wscale,wscale_val}
, pdu.{last_frame,size,time}
, port
, reassembled_in
, segment
, segment.{error,multipletails,overlap,overlap.conflict,toolongfragment}
, segments
, seq
, srcport
, time_delta
, time_relative
, urgent_pointer
, window_size
, payload
UDP udp
https://www.wireshark.org/docs/dfref/u/udp.html
checksum
, checksum_bad
, checksum_good
, dstport
, length
, port
, srcport
HTTP http
https://www.wireshark.org/docs/dfref/h/http.html
accept
, accept_encoding
, accept_language
, authbasic
, authorization
, cache_control
, connection
, content_encoding
, content_length
, content_type
, cookie
, date
, file_data
, host
, last_modified
, location
, notification
, proxy_authenticate
, proxy_authorization
, proxy_connect_host
, proxy_connect_port
, referer
, request
, request.{full_uri,method,uri,version}
, request.uri.{path,query,query.parameter}
, response
, response.{code,code.desc,phrase}
, server
, set_cookie
, transfer_encoding
, user_agent
, www_authenticate
, x_forwarded_for
SSL ssl
https://www.wireshark.org/docs/dfref/s/ssl.html
handshake
, handshake.{cert_status,cert_status_len,cert_status_type,cert_type,cert_types,cert_types_count,certificate,certificate_length,challenge,challenge_length,cipher_spec_len,cipher_suites_length,cipherspec,ciphersuiteciphersuites,clear_key_data,clear_key_lengthclient_cert_vrfy.sig,client_cert_crfy.sig_len,client_point,client_point_len,comp_method,comp_methods,comp_methods_length,connection_id,connection_id_length,encrypted_key,encrypted_key_length,epms,epms_len,exponent,exponent_len,extension.data,extension.len,modulus,modulus_len,identity,identity_len,server_point,server_point_len}
, handshake.cert_type.{type,types,types_len}
FTP ftp
(not prefixed): ftp-data.command
, ftp-data.setup-method
, ftp-data.current-working-directory
active.{cip,nat,port}
, command