⬅ HOME
tshark Cheatsheet

BASICS

Read from a pcap: tshark -r <file.pcap>

Print TCP conversations: tshark -r <file.pcap> -z conv,tcp (add -q to suppress packet info)

Print field-formatted: tshark -r <file.pcap> -T fields -e <field1> -e <field2> ...

List User-Agents: tshark -r <file.pcap> -T fields -e http.user_agent

Print X.509 certs: tshark -r <file.pcap> -T fields -R "ssl.handshake.certificate" -e x509sat.printableString

Apply a display filter: tshark -r <file.pcap> -Y <display filter>

Print packet summaries for TCP packets to port 71: tshark -r <file.pcap> -Y "tcp.dstport == 71"

Display contents of TCP stream between 10.0.0.1 port 123 and 10.0.0.2 port 456: tshark -r <file.pcap> -z "follow,tcp,ascii,10.0.0.1:123,10.0.0.2:456"

Decrypt WPA traffic (-o <pref>:<val> overrides preference) and print http file data: tshark -r <file.pcap> -o wlan.enable_decryption:TRUE -o "uat:80211_keys:\"wpa-pwd\",\"password:<w1F1-P4ssw0rD\"" -T fields -e http.file_data

Decrypt using SSL keys: tshark -r <file.pcap> -o 'uat:rsa_keys:"./server_private_key.pem",""' -Tfields -e text

Decrypt with pre master secret: tshark -r <file.pcap> -o 'tls.keylog_file:./premastersecret.txt' -T fields -e http.request.uri

Show detailed view of http packets and summaries of others: tshark -r <file.pcap> -O http

List possible fields: tshark -G

Fields Cheatsheet

The field text on its own may sometimes work (e.g. for HTTP and FTP)

Ethernet eth

https://www.wireshark.org/docs/dfref/e/eth.html

addr, len, src, dst, lg, trailer, ig, multicast, type

IPv4 ip

https://www.wireshark.org/docs/dfref/i/ip.html

addr, checksum, checksum_bad, checksum_good, dst, dst_host, flags, flags.df, flags.mf, flags.rb, hdr_len, host, id, len, proto, reassembled_in, src, src_host, tos, tos.cost, tos.delay, tos.precedence, tos.reliability, tos.throughput, ttl, version

IPv6 ipv6

https://www.wireshark.org/docs/dfref/i/ipv6.html

addr, dst, dst_host, hlim, host, nxt, opt.pad1, opt.padn, plen, reassembled_in, src, src_host, version

TCP tcp

https://www.wireshark.org/docs/dfref/t/tcp.html

ack, checksum, checksum_bad, checksum_good, continuation_to, dstport, flags, flags.{ack,cwr,ecn,fin,push,reset,syn,urg}, hdr_len, len, nxtseq, options, options.{cc,ccecho,ccnew,echo,echo_reply,md5,mss,mss_val,qs,sack,sack_le.sack_perm,sack_re,time_stamp,wscale,wscale_val}, pdu.{last_frame,size,time}, port, reassembled_in, segment, segment.{error,multipletails,overlap,overlap.conflict,toolongfragment}, segments, seq, srcport, time_delta, time_relative, urgent_pointer, window_size, payload

UDP udp

https://www.wireshark.org/docs/dfref/u/udp.html

checksum, checksum_bad, checksum_good, dstport, length, port, srcport

HTTP http

https://www.wireshark.org/docs/dfref/h/http.html

accept, accept_encoding, accept_language, authbasic, authorization, cache_control, connection, content_encoding, content_length, content_type, cookie, date, file_data, host, last_modified, location, notification, proxy_authenticate, proxy_authorization, proxy_connect_host, proxy_connect_port, referer, request, request.{full_uri,method,uri,version}, request.uri.{path,query,query.parameter}, response, response.{code,code.desc,phrase}, server, set_cookie, transfer_encoding, user_agent, www_authenticate, x_forwarded_for

SSL ssl

https://www.wireshark.org/docs/dfref/s/ssl.html

handshake, handshake.{cert_status,cert_status_len,cert_status_type,cert_type,cert_types,cert_types_count,certificate,certificate_length,challenge,challenge_length,cipher_spec_len,cipher_suites_length,cipherspec,ciphersuiteciphersuites,clear_key_data,clear_key_lengthclient_cert_vrfy.sig,client_cert_crfy.sig_len,client_point,client_point_len,comp_method,comp_methods,comp_methods_length,connection_id,connection_id_length,encrypted_key,encrypted_key_length,epms,epms_len,exponent,exponent_len,extension.data,extension.len,modulus,modulus_len,identity,identity_len,server_point,server_point_len}, handshake.cert_type.{type,types,types_len}

FTP ftp

(not prefixed): ftp-data.command, ftp-data.setup-method, ftp-data.current-working-directory

active.{cip,nat,port}, command