hack3rs.ca network-security
/learning/tools/wireshark-tshark :: tool-guide-1

defender@hack3rs:~/learning/tools$ open wireshark-tshark

Wireshark / TShark

Packet analysis

Wireshark packet analysis and TShark give defenders a ground-truth view of what happened on the wire. Use them to validate alerts, troubleshoot protocol failures, and reconstruct incident timelines from a pcap file.

how-to-learn-this-tool-like-a-defender

Work through the stages in order. Each one builds on the previous. Skipping straight to 'run a command' without knowing what the output means is how analysts end up misreading evidence under pressure.

  • $Name the specific question this tool answers — and one question it cannot answer alone.
  • $Run the simplest command in a lab against a host you control; read every field in the output before moving on.
  • $Identify which output fields are direct evidence and which are inferences the tool made on your behalf.
  • $Pull a second source — a log, a PCAP, a SIEM event — that either confirms or contradicts what the tool reported.
  • $Write down the exact command you ran, what you expected, what you got, and what you are doing next.

preflight-checklist-before-using-tool

  • $Confirm in writing: who authorized this, what hosts are in scope, and what the maximum acceptable impact is.
  • $State the question you are trying to answer — not 'run the tool' but 'confirm whether port 443 is open on 10.10.20.15'.
  • $Name the second source you will use if the tool output is ambiguous (log, PCAP, CMDB, another tool).
  • $Record the start time, the host or interface you ran it on, and the exact command — enough for another analyst to reproduce it.
  • $Know what normal output looks like for this host before you run anything in anger.

how-experts-read-output

  • $Field recognition: identify the two or three fields that directly answer your question and ignore the rest for now.
  • $Scope check: confirm the output covers the host, interface, and time window you intended — not a cached or adjacent result.
  • $Evidence type: is this a direct observation (packet captured, port open) or an inference the tool made (service guessed from banner)?
  • $Correlation: name the one other source — a log line, a PCAP stream, a CMDB entry — that would confirm or contradict this.
  • $Decision: close the question, escalate with evidence, refine the scope, or collect another source — pick one and do it.

official-links

ethical-use-and-defense-scope

Capture only on networks and systems you own or are explicitly authorized to monitor. A pcap file can contain credentials, session cookies, internal hostnames, and other sensitive data — handle it accordingly.

Know why you are capturing before you start. Troubleshooting a service outage, validating an IDS alert, and scoping an incident are all legitimate. “Capture everything indefinitely” is not a plan — it is a liability without a retention, privacy, and governance policy behind it.

Scope captures tightly: right interface, right host filter, right protocol, shortest window that answers the question. Store pcap files with access controls, and strip or segment sensitive content before sharing with vendors or teammates who do not need full packet visibility.

tool-history-origin-and-purpose

  • $When created: Started in the late 1990s (Ethereal, commonly cited as 1998); renamed to Wireshark in 2006.
  • $Why it was created: Defenders and network operators needed a way to inspect real packet behavior, not just summaries from logs. Packet-level visibility was necessary to troubleshoot protocol failures, validate network behavior, and understand what was actually sent on the wire.

Gerald Combs began the project as Ethereal to solve practical protocol analysis and troubleshooting needs on systems where commercial analyzers were expensive or unavailable. The project continued under the Wireshark name after the trademark could not move with the core team.

why-defenders-still-use-it

People use Wireshark/TShark because it gives high-fidelity evidence for TCP/IP, DNS, TLS, HTTP, and many other protocols. It is widely trusted for troubleshooting, incident validation, education, and protocol learning because it shows details many other tools abstract away.

How the tool evolved
  • +Originally developed as Ethereal, then renamed Wireshark in 2006 with the core team continuing development.
  • +TShark shares the same dissector engine, making GUI and CLI analysis workflows consistent.
  • +Grew into a standard packet-analysis platform used in operations, IR, engineering, and training.

when-this-tool-is-a-good-fit

  • +Validate IDS/IPS alerts by confirming whether detected traffic matches the actual protocol behavior in the pcap.
  • +Troubleshoot TLS handshake failures, certificate errors, and HTTP application response codes.
  • +Investigate DNS anomalies: query spikes, NXDOMAIN patterns, resolver mismatches, and unusual TTLs.
  • +Reconstruct timelines for suspicious outbound connections and potential data exfiltration attempts.

when-to-use-another-tool-or-source

  • !When you need host process/user context, pair with endpoint or OS logs.
  • !When you need ownership and business impact, pair with CMDB/ticketing/asset context.
  • !When the tool output is ambiguous, validate using a second evidence source before concluding.
  • !When production risk is high, test in a lab first and use change coordination.

1. What Wireshark and TShark Are Good At

Wireshark is the interactive GUI for packet inspection, stream following, and protocol dissection. TShark runs the same dissector engine from the command line, which makes it practical for SSH sessions, servers, automation, and quick field extractions during incident triage.

These tools answer questions that logs and alerts routinely cannot: Did the TCP handshake complete? Did DNS resolve? Did the TLS negotiation succeed or fail, and at which step? Did the client retry three times before giving up? Packet evidence cuts through conflicting tool outputs.

When a firewall says accepted, an application says timeout, and the IDS says nothing — a packet capture breaks the tie. Whether the problem is retransmission, a protocol mismatch, or an unexpected reset, the wire does not lie.

2. Defensive Packet Analysis Workflow

Start by writing down the question you are trying to answer. Troubleshooting a service outage means focusing on resets, retransmissions, and application response codes. Investigating suspicious activity means looking at destination patterns, protocol choices, session timing, and repeated behavior.

Run two passes. First, scope: identify top talkers, protocol mix, time windows, and obvious errors. Second, dig: reconstruct individual streams, inspect DNS query behavior, check TLS metadata, and annotate the packet evidence that supports your conclusions.

Write down the capture context every time — interface, capture point, filter used, time window, and what was not visible from that vantage. Without this, the analysis is hard to reproduce and easy to misread by the next analyst who picks it up.

3. DNS and TLS Analysis for Blue Teams

Wireshark is one of the best places to learn how DNS actually behaves in your environment. You can watch query names, response codes, resolver selection, retry timing, and latency in real time. Most "suspicious domain" questions turn out to be stale records, misconfigured resolvers, or normal CDN behavior — and you can only tell the difference by looking.

TLS analysis is valuable even though payloads are encrypted. The handshake is visible: protocol version, cipher suites offered and chosen, certificate details, SNI, and failure step if the negotiation breaks. These details explain service problems and support network-based detections without decrypting anything.

The right mental model for encrypted traffic is not "I cannot see it." It is "I can see the protocol behavior, timing, and metadata." That shift makes you a better troubleshooter and a better threat hunter.

4. Using TShark for Repeatable IR Tasks

TShark pulls specific fields out of large captures quickly — DNS query names, TLS SNI values, IP conversations, HTTP methods, protocol counts. When your first goal is narrowing a 2 GB pcap file to the relevant ten minutes and three hosts, TShark is faster than clicking through the GUI.

During incident response, TShark lets you build small evidence tables for the report: which suspicious destinations did this host contact, how many TLS handshakes failed, how many NXDOMAIN responses came back in the first hour. These summaries help responders who are not packet analysts understand what the traffic shows.

Keep a small set of tested TShark commands for recurring tasks. Security teams who invest fifteen minutes building these snippets recover that time on the first real incident they use them. The commands also make your workflow reproducible across cases.

5. Capture Strategy, Performance, and Privacy

Where you capture matters more than which tool you use. An endpoint capture, a SPAN port, a VPN concentrator tap, and a cloud traffic mirror each have different blind spots. Know what traffic your capture point can and cannot see before drawing conclusions from what you did not observe.

Capture filters cut volume at collection time but permanently discard traffic. Display filters are safer when you are unsure what you need — they preserve everything and let you filter later. In high-volume environments, short targeted captures with documented rationale beat large unfocused ones every time.

A pcap file often contains regulated or sensitive data. Build habits around secure storage, limited retention, and access control from day one. For training purposes, use lab captures or strip sensitive content before sharing.

6. How Wireshark and TShark Fit Into a Blue Team Stack

Packet tools extend what SIEMs, IDS/IPS, and endpoint telemetry can tell you. An alert shows that something happened. Packet evidence shows exactly what the handshake looked like, whether the payload matched the signature, and whether the traffic was actually interesting or a false positive.

Teams that treat packet analysis as a normal skill — not a rare escalation — close incidents faster and produce better root-cause write-ups. The three recurring tasks are: troubleshoot a service, validate an alert, reconstruct a timeline. You do not need full packet capture everywhere to get value from those.

Targeted captures during an incident window, lab captures for baselining normal protocol behavior, and short captures after a change all build the muscle memory you need before a real crisis lands in your queue.

7. Training Strategy and Skill Development

Learn normal traffic before you try to recognize abnormal traffic. Capture a web browsing session, a DNS lookup, an SSH connection, a software update, and a failed TLS handshake. Build a mental model of what each looks like in Wireshark before you hunt for malicious behavior.

Develop a personal filter set and refine it over time. You do not need to memorize every protocol field — you need a reliable workflow for filtering by host, protocol, stream, time, and error condition. That gets you to the relevant packets in two minutes instead of twenty.

Write short summaries after each lab capture. Translating packet details into clear evidence statements — "the client sent three SYN packets with no response from the server side" — is the same skill you will need when writing an incident timeline at 2 a.m.

scenario-teaching-playbooks

Work through each scenario step by step. The goal is to practice making decisions with the tool — not just executing commands — so the workflow becomes automatic before you need it under pressure.

1. Validate IDS/IPS alerts by confirming whether detected traffic matches the actual protocol behavior in the pcap.

Suggested starting block: Capture And Scope

  • $Write the question you need to answer and the exact hosts or segments you are authorized to inspect.
  • $Run the first command from the selected command block; note the timestamp and interface used.
  • $Read the output field by field — identify what the tool confirmed versus what it inferred.
  • $Check a second source (host log, SIEM alert, PCAP, ticket, or CMDB record) that covers the same time window.
  • $Write one sentence stating your finding, your confidence level, and the next action.

2. Troubleshoot TLS handshake failures, certificate errors, and HTTP application response codes.

Suggested starting block: DNS / TLS Field Extraction (TShark)

  • $Write the question you need to answer and the exact hosts or segments you are authorized to inspect.
  • $Run the first command from the selected command block; note the timestamp and interface used.
  • $Read the output field by field — identify what the tool confirmed versus what it inferred.
  • $Check a second source (host log, SIEM alert, PCAP, ticket, or CMDB record) that covers the same time window.
  • $Write one sentence stating your finding, your confidence level, and the next action.

3. Investigate DNS anomalies: query spikes, NXDOMAIN patterns, resolver mismatches, and unusual TTLs.

Suggested starting block: Focused Follow-Up

  • $Write the question you need to answer and the exact hosts or segments you are authorized to inspect.
  • $Run the first command from the selected command block; note the timestamp and interface used.
  • $Read the output field by field — identify what the tool confirmed versus what it inferred.
  • $Check a second source (host log, SIEM alert, PCAP, ticket, or CMDB record) that covers the same time window.
  • $Write one sentence stating your finding, your confidence level, and the next action.

4. Reconstruct timelines for suspicious outbound connections and potential data exfiltration attempts.

Suggested starting block: Capture And Scope

  • $Write the question you need to answer and the exact hosts or segments you are authorized to inspect.
  • $Run the first command from the selected command block; note the timestamp and interface used.
  • $Read the output field by field — identify what the tool confirmed versus what it inferred.
  • $Check a second source (host log, SIEM alert, PCAP, ticket, or CMDB record) that covers the same time window.
  • $Write one sentence stating your finding, your confidence level, and the next action.

cli-workflows

Lab-safe commands for authorized environments. Run each one, read the output, and note what field or value tells you something useful before moving to the next.

cli-walkthroughs-with-expected-output

One command per block, with sample output. Study the output before you run the command yourself — you should recognize what you are looking at when it appears on your screen.

Capture And Scope

Beginner
Command
sudo tcpdump -ni any -w web-trace.pcap -c 1000 host example.com
Example Output
tcpdump: listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
1000 packets captured
1000 packets received by filter
0 packets dropped by kernel
# Saved to web-trace.pcap

$ how to read it: Read the key fields — host, port, protocol, state — then ask whether the output answers the question you started with. If it raises a new question instead, collect a second source before drawing a conclusion.

DNS / TLS Field Extraction (TShark)

Intermediate
Command
tshark -r web-trace.pcap -Y dns -T fields -e frame.time -e ip.src -e dns.qry.name
Example Output
Protocol Hierarchy Statistics
eth
 ip
  tcp
   tls
  udp
   dns

$ how to read it: Read the key fields — host, port, protocol, state — then ask whether the output answers the question you started with. If it raises a new question instead, collect a second source before drawing a conclusion.

Focused Follow-Up

Advanced
Command
editcap -A "2026-01-01 00:00:00" -B "2026-01-01 00:05:00" web-trace.pcap slice.pcap
Example Output
# editcap: Time-sliced output written to slice.pcap
# Use capinfos slice.pcap to verify the time window

$ how to read it: Read the key fields — host, port, protocol, state — then ask whether the output answers the question you started with. If it raises a new question instead, collect a second source before drawing a conclusion.

command-anatomy-and-expert-usage

Each card explains what the command is for, what can go wrong, and what the output means. Syntax is easy to look up; knowing which command to reach for — and what to ignore in the output — is the skill worth building.

Capture And Scope

Beginner
Command
sudo tcpdump -ni any -w web-trace.pcap -c 1000 host example.com
Command Anatomy
  • $Base command: sudo
  • $Primary arguments/options: tcpdump -ni any -w web-trace.pcap
  • $Operator goal: know what answer you expect before you run it; if the output surprises you, investigate before concluding.
Use And Risk

$ intent: Packet capture, packet summary, or PCAP slicing for evidence.

$ risk: Medium: captures may include sensitive data; restrict scope and store securely.

$ learning focus: Baseline command: learn what normal output looks like.

Show sample output and interpretation notes
tcpdump: listening on any, link-type LINUX_SLL2 (Linux cooked v2), snapshot length 262144 bytes
1000 packets captured
1000 packets received by filter
0 packets dropped by kernel
# Saved to web-trace.pcap

$ expert reading pattern: Check that the scope matches what you intended, pick out the two or three fields that answer your question, then find one other source that confirms before you act.

Capture And Scope

Beginner
Command
capinfos web-trace.pcap
Command Anatomy
  • $Base command: capinfos
  • $Primary arguments/options: web-trace.pcap
  • $Operator goal: know what answer you expect before you run it; if the output surprises you, investigate before concluding.
Use And Risk

$ intent: Packet capture, packet summary, or PCAP slicing for evidence.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Intermediate step: refine scope or extract more useful evidence.

Show sample output and interpretation notes
File name:           web-trace.pcap
File type:           Wireshark/tcpdump/... - pcap
File encapsulation:  Ethernet
Capture length:      262144 bytes
Packet size limit:   262144 bytes
Number of packets:   1000
File size:           1234 kB
Data size:           1200 kB
Capture duration:    30.123 seconds
First packet time:   2026-03-17 10:00:00
Last packet time:    2026-03-17 10:00:30

$ expert reading pattern: Check that the scope matches what you intended, pick out the two or three fields that answer your question, then find one other source that confirms before you act.

Capture And Scope

Beginner
Command
wireshark web-trace.pcap
Command Anatomy
  • $Base command: wireshark
  • $Primary arguments/options: web-trace.pcap
  • $Operator goal: know what answer you expect before you run it; if the output surprises you, investigate before concluding.
Use And Risk

$ intent: Packet capture, packet summary, or PCAP slicing for evidence.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Intermediate step: refine scope or extract more useful evidence.

Show sample output and interpretation notes
# Wireshark is a GUI application — it will open in your desktop environment
# If running headless, use tshark for CLI analysis instead

$ expert reading pattern: Check that the scope matches what you intended, pick out the two or three fields that answer your question, then find one other source that confirms before you act.

Capture And Scope

Beginner
Command
tshark -r web-trace.pcap -q -z io,phs
Command Anatomy
  • $Base command: tshark
  • $Primary arguments/options: -r web-trace.pcap -q -z io,phs
  • $Operator goal: know what answer you expect before you run it; if the output surprises you, investigate before concluding.
Use And Risk

$ intent: Packet capture, packet summary, or PCAP slicing for evidence.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Advanced step: use after baseline and validation are understood.

Show sample output and interpretation notes
Protocol Hierarchy Statistics
eth
 ip
  tcp
   tls
  udp
   dns

$ expert reading pattern: Check that the scope matches what you intended, pick out the two or three fields that answer your question, then find one other source that confirms before you act.

DNS / TLS Field Extraction (TShark)

Intermediate
Command
tshark -r web-trace.pcap -Y dns -T fields -e frame.time -e ip.src -e dns.qry.name
Command Anatomy
  • $Base command: tshark
  • $Primary arguments/options: -r web-trace.pcap -Y dns -T
  • $Operator goal: know what answer you expect before you run it; if the output surprises you, investigate before concluding.
Use And Risk

$ intent: Packet capture, packet summary, or PCAP slicing for evidence.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Baseline command: learn what normal output looks like.

Show sample output and interpretation notes
Protocol Hierarchy Statistics
eth
 ip
  tcp
   tls
  udp
   dns

$ expert reading pattern: Check that the scope matches what you intended, pick out the two or three fields that answer your question, then find one other source that confirms before you act.

DNS / TLS Field Extraction (TShark)

Intermediate
Command
tshark -r web-trace.pcap -Y tls.handshake.type==1 -T fields -e ip.src -e ip.dst -e tls.handshake.extensions_server_name
Command Anatomy
  • $Base command: tshark
  • $Primary arguments/options: -r web-trace.pcap -Y tls.handshake.type==1 -T
  • $Operator goal: know what answer you expect before you run it; if the output surprises you, investigate before concluding.
Use And Risk

$ intent: Packet capture, packet summary, or PCAP slicing for evidence.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Intermediate step: refine scope or extract more useful evidence.

Show sample output and interpretation notes
Protocol Hierarchy Statistics
eth
 ip
  tcp
   tls
  udp
   dns

$ expert reading pattern: Check that the scope matches what you intended, pick out the two or three fields that answer your question, then find one other source that confirms before you act.

DNS / TLS Field Extraction (TShark)

Intermediate
Command
tshark -r web-trace.pcap -Y tcp.analysis.retransmission
Command Anatomy
  • $Base command: tshark
  • $Primary arguments/options: -r web-trace.pcap -Y tcp.analysis.retransmission
  • $Operator goal: know what answer you expect before you run it; if the output surprises you, investigate before concluding.
Use And Risk

$ intent: Packet capture, packet summary, or PCAP slicing for evidence.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Advanced step: use after baseline and validation are understood.

Show sample output and interpretation notes
Protocol Hierarchy Statistics
eth
 ip
  tcp
   tls
  udp
   dns

$ expert reading pattern: Check that the scope matches what you intended, pick out the two or three fields that answer your question, then find one other source that confirms before you act.

Focused Follow-Up

Advanced
Command
editcap -A "2026-01-01 00:00:00" -B "2026-01-01 00:05:00" web-trace.pcap slice.pcap
Command Anatomy
  • $Base command: editcap
  • $Primary arguments/options: -A "2026-01-01 00:00:00" -B "2026-01-01
  • $Operator goal: know what answer you expect before you run it; if the output surprises you, investigate before concluding.
Use And Risk

$ intent: Packet capture, packet summary, or PCAP slicing for evidence.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Baseline command: learn what normal output looks like.

Show sample output and interpretation notes
# editcap: Time-sliced output written to slice.pcap
# Use capinfos slice.pcap to verify the time window

$ expert reading pattern: Check that the scope matches what you intended, pick out the two or three fields that answer your question, then find one other source that confirms before you act.

Focused Follow-Up

Advanced
Command
tshark -r slice.pcap -z conv,tcp -q
Command Anatomy
  • $Base command: tshark
  • $Primary arguments/options: -r slice.pcap -z conv,tcp -q
  • $Operator goal: know what answer you expect before you run it; if the output surprises you, investigate before concluding.
Use And Risk

$ intent: Packet capture, packet summary, or PCAP slicing for evidence.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Intermediate step: refine scope or extract more useful evidence.

Show sample output and interpretation notes
Protocol Hierarchy Statistics
eth
 ip
  tcp
   tls
  udp
   dns

$ expert reading pattern: Check that the scope matches what you intended, pick out the two or three fields that answer your question, then find one other source that confirms before you act.

Focused Follow-Up

Advanced
Command
wireshark slice.pcap
Command Anatomy
  • $Base command: wireshark
  • $Primary arguments/options: slice.pcap
  • $Operator goal: know what answer you expect before you run it; if the output surprises you, investigate before concluding.
Use And Risk

$ intent: Packet capture, packet summary, or PCAP slicing for evidence.

$ risk: Review command impact before running; validate in lab first if uncertain.

$ learning focus: Advanced step: use after baseline and validation are understood.

Show sample output and interpretation notes
# Wireshark is a GUI application — it will open in your desktop environment
# If running headless, use tshark for CLI analysis instead

$ expert reading pattern: Check that the scope matches what you intended, pick out the two or three fields that answer your question, then find one other source that confirms before you act.

Capture And Scope

sudo tcpdump -ni any -w web-trace.pcap -c 1000 host example.com
capinfos web-trace.pcap
wireshark web-trace.pcap
tshark -r web-trace.pcap -q -z io,phs

DNS / TLS Field Extraction (TShark)

tshark -r web-trace.pcap -Y dns -T fields -e frame.time -e ip.src -e dns.qry.name
tshark -r web-trace.pcap -Y tls.handshake.type==1 -T fields -e ip.src -e ip.dst -e tls.handshake.extensions_server_name
tshark -r web-trace.pcap -Y tcp.analysis.retransmission

Focused Follow-Up

editcap -A "2026-01-01 00:00:00" -B "2026-01-01 00:05:00" web-trace.pcap slice.pcap
tshark -r slice.pcap -z conv,tcp -q
wireshark slice.pcap

defensive-use-cases

  • $Validate IDS/IPS alerts by confirming whether detected traffic matches the actual protocol behavior in the pcap.
  • $Troubleshoot TLS handshake failures, certificate errors, and HTTP application response codes.
  • $Investigate DNS anomalies: query spikes, NXDOMAIN patterns, resolver mismatches, and unusual TTLs.
  • $Reconstruct timelines for suspicious outbound connections and potential data exfiltration attempts.

common-mistakes

  • $Capturing from the wrong interface and drawing conclusions from incomplete traffic.
  • $Using capture filters too aggressively and discarding the evidence you actually needed.
  • $Assuming encrypted traffic reveals nothing — TLS metadata and timing are often enough to start.
  • $Sharing a raw pcap file without reviewing what credentials and sensitive data it contains.

expert-habits-for-free-self-study

Free teaching resource. The loop that makes analysts better: ask a precise question, collect evidence, read it carefully, validate against a second source, document what you found, and repeat with a harder question.

  • $Pick the least disruptive command that can still answer the question — then run that one first.
  • $Before you look at output, write one sentence stating what you expect to see.
  • $Mark each output field as 'observed' or 'inferred by tool' before acting on it.
  • $Save the exact command with flags and target — not a paraphrase — so another analyst can run the same thing.
  • $During a quiet period, capture what normal output looks like from key hosts; store those samples where you can find them during an incident.
  • $When you escalate, include the command output, the timestamp, and one sentence on why it matters — not just 'looks suspicious'.

knowledge-check

  • ?What question is this tool best suited to answer first?
  • ?What permissions or scope approvals are needed before using it?
  • ?Which second evidence source should you pair with it for higher confidence?
  • ?What does normal output look like for your environment?

teaching-answer-guide

Show teaching hints
  • #Start from the tool’s role and the scenario you are investigating.
  • #Never rely on one tool alone for high-confidence incident decisions.
  • #Document normal output patterns during calm periods so anomalies are easier to spot.
  • #Prefer lab validation for new commands, rules, or scans before production use.

practice-plan

# Capture a complete web transaction — DNS, TCP, TLS, HTTP — and write a plain-English summary of each step.
# Compare a successful connection and a failed one to the same service and explain the difference packet by packet.
# Use TShark to extract DNS query names and TLS SNI fields from a capture and present them as an evidence table.
# Build a personal packet analysis checklist you could hand to a colleague during an incident.

related-tools-in-this-path

Continue within the same guided track. These tools are commonly studied next in the path(s) this page belongs to.

<- tools index Back to tool cards -> next tool Nmap