Wireshark for Forensic Analysis
Wireshark for Forensic Analysis
Wireshark remains the primary tool for detailed packet analysis:
Essential Wireshark Filters:
# HTTP traffic analysis
http.request.method == "POST"
http.response.code == 200
http contains "password"
# DNS analysis
dns.flags.response == 0
dns.qry.name contains "suspicious.com"
# TCP analysis
tcp.flags.syn == 1 and tcp.flags.ack == 0
tcp.analysis.retransmission
# Data exfiltration
tcp.len > 1000 and ip.dst == 192.168.1.100
Advanced Analysis Techniques:
Following TCP Streams:
- Right-click packet → Follow → TCP Stream
- Reconstructs complete conversations
- Identifies transferred data
Exporting Objects:
- File → Export Objects → HTTP
- Extracts transferred files
- Recovers malware samples
Statistical Analysis:
- Statistics → Conversations
- Identifies top talkers
- Reveals communication patterns