You assume your internet traffic is invisible. When you click a link or send an email, you see the result on your screen and trust that the journey happened through some kind of private tunnel. This assumption is precisely why network security feels like magic to so many people, and why mastering this Wireshark tutorial for beginners is fundamental for any aspiring security analyst.
The reality is brutally physical. Data travels in small digital envelopes called packets. Every time you load a webpage, thousands of these envelopes fly out of your ethernet port or wireless adapter. If someone positions themselves correctly on the network, they can catch those packets. And if those packets aren’t encrypted, they can read them. Wireshark is the X-Ray machine that lets you see every single bit leaving your computer.
This guide will teach you how to install Wireshark properly, understand why most beginners fail within the first five minutes, capture your first packets, filter through the noise to find what matters, and spot the telltale signs of malware phoning home to its masters.
The WiFi Problem: Why Beginners Often Fail
New users often expect to install Wireshark and immediately see every device on their home network. They launch the application, click the big blue shark fin to start capturing, and find something disappointing: they can only see their own computer’s traffic. The router, the smart TV, the teenager’s gaming console? None of it appears.
Technical Definition
Wireshark defaults to Promiscuous Mode, which instructs your network interface card (NIC) to process every packet it receives on the local wire segment, rather than discarding packets that aren’t addressed to its MAC address. However, in a switched Ethernet environment or encrypted WiFi network, your NIC never receives other devices’ packets in the first place. The switch or access point delivers traffic only to its intended destination.
The Analogy
Think of a hotel hallway. Promiscuous Mode is like opening your own hotel room door and listening to the noise in the corridor. You can hear what passes by your door: housekeeping carts, conversations between guests walking past, the elevator ding. But you cannot hear what is happening inside Room 402 down the hall.
Monitor Mode is like having a master key and a stethoscope. It lets you listen to every room on the floor regardless of where you are standing. You’re actively intercepting all wireless transmissions in the air.
Under the Hood
The difference between these modes comes down to hardware capability and driver support. Here’s how they compare:
| Mode | What It Does | Hardware Required | Typical Use Case |
|---|---|---|---|
| Promiscuous Mode | Processes all packets arriving at your NIC | Standard NIC | Capturing traffic on your own wired segment |
| Monitor Mode | Captures all 802.11 frames from the air | Specialized WiFi adapter with monitor support | Wireless network analysis, rogue AP detection |
| Normal Mode | Only processes packets addressed to your MAC | Any NIC | Standard networking operations |
Most Windows drivers are locked down by the manufacturer. They prevent the WiFi card from entering Monitor Mode entirely, which is required to sniff traffic out of the air from other devices like your iPhone or smart thermostat. To perform full wireless network analysis, you typically need a specialized USB WiFi adapter (Alfa cards are popular in the security community) and a Linux-based environment like Kali. For this tutorial, we focus on capturing your own PC’s traffic, which is still enormously valuable for finding internal threats, diagnosing connectivity issues, and understanding how your applications communicate.
Setting Up: The Npcap Installation Step
When you download and run the Wireshark installer, you will encounter a screen asking whether to include a secondary component. Many beginners skip this checkbox without reading it carefully. If you do, Wireshark will install and launch successfully, but it will be functionally blind.
Technical Definition
You must check the box to install Npcap (WinPcap is deprecated and no longer supported as of Wireshark 4.6). Npcap is the packet capture library for Windows, actively maintained by the Nmap project. It serves as the translator between your physical network hardware and the Wireshark application layer. Without it, Wireshark has no mechanism to request raw packet data from the operating system. The current version (Npcap 1.85 as of early 2026) supports Windows 7 through Windows 11, including ARM64 devices.
The Analogy
If Wireshark is a digital camera, then Npcap is the lens. You can power on the camera, navigate through all the menus, and press the shutter button as many times as you want. But without a lens attached, you will never capture an actual image.
Under the Hood
Npcap installs a kernel-mode driver into the Windows network stack that taps the packet flow:
| Stage | Without Npcap | With Npcap |
|---|---|---|
| Packet arrives at NIC | Passed to kernel | Passed to kernel |
| Kernel processing | Routes to app | Copies to Npcap buffer |
| Result | Only app sees data | App AND Wireshark see raw packet |
Pro-Tip: Enable “Support raw 802.11 traffic” during installation if your adapter supports Monitor Mode. Enable “WinPcap API-compatible Mode” for legacy tools. The Administrator-only option adds UAC elevation for capture operations.
The HTTP vs. HTTPS Demo: Why Encryption Matters
To truly understand the stakes of network security, you need to witness what unprotected data looks like when it travels across a network. This comparison reveals exactly why attackers love unencrypted connections and why HTTPS adoption became non-negotiable.
Technical Definition
HTTP (Hypertext Transfer Protocol) transmits data in cleartext, readable by anyone who captures the packets. HTTPS wraps HTTP inside a TLS (Transport Layer Security) tunnel, encrypting all application data before it leaves your browser. Modern implementations use TLSv1.3, which mandates forward secrecy through ephemeral Diffie-Hellman key exchange, meaning even if an attacker captures the traffic and later obtains the server’s private key, they still cannot decrypt historical sessions due to the strength of the encryption..
The Analogy
Think of HTTP as sending a postcard through the mail. Anyone who handles that postcard can read the message written on the back. HTTPS is like putting that message in a locked safe, then mailing the safe. Even if someone intercepts the package, they cannot read the contents without the key. With TLSv1.3’s forward secrecy, a new key is generated for every conversation, so stealing yesterday’s key doesn’t help with today’s traffic.
Under the Hood: The Protocol Comparison
| Aspect | HTTP Traffic | HTTPS Traffic |
|---|---|---|
| Visibility in Wireshark | Full cleartext payload | Encrypted ciphertext |
| Password exposure | Immediately readable | Mathematically protected |
| Protocol shown | HTTP/1.1 or HTTP/2 | TLSv1.2 or TLSv1.3 |
| Man-in-the-middle risk | Trivially exploitable | Requires certificate compromise |
| Session hijacking | Easy with captured cookies | Cookies encrypted in transit |
| Default port | 80 | 443 |
Practical Demonstration
Here’s how to see the difference yourself:
- Start a Wireshark capture on your active interface
- Visit http://neverssl.com (one of the few remaining unencrypted test sites)
- Apply the filter:
http - Right-click any packet and select Follow → TCP Stream
- You’ll see your entire HTTP request in plain text
Now try the same with any HTTPS site. Apply the filter tls and you’ll see encrypted packets labeled as “Application Data.” The content is completely unreadable without the decryption keys.
Understanding the Interface: What You’re Looking At
When you first open Wireshark, you’re greeted with three horizontal panes and a toolbar that looks like NASA mission control. Each element serves a specific purpose in packet analysis.
Technical Definition
The Packet List Pane (top section) displays a time-ordered summary of every captured packet with columns for timestamp, source/destination addresses, protocol, length, and a human-readable description. The Packet Details Pane (middle section) shows the complete protocol stack for the selected packet in an expandable tree format, from Layer 2 (Ethernet) up through Layer 7 (Application). The Packet Bytes Pane (bottom section) displays the raw hexadecimal and ASCII representation of the selected packet’s data.
Under the Hood
Each packet in the list represents a single frame captured from the wire. When you select a packet, Wireshark’s dissectors parse the binary data according to protocol specifications:
| Pane | Shows | Why It Matters |
|---|---|---|
| Packet List | High-level overview | Quick scanning for patterns |
| Packet Details | Protocol layers expanded | Understanding what’s happening |
| Packet Bytes | Raw binary/hex data | Spotting malformed packets or hidden data |
The color coding follows default rules: TCP appears in light purple, UDP in light blue, HTTP in pale green, and problematic packets (malformed, retransmissions, resets) in black or red. You can customize these in View → Coloring Rules.
Essential Display Filters: Finding What Matters
Raw packet captures are overwhelming. A single webpage load generates hundreds or thousands of packets. Without filters, you’re drowning in data. Display filters are your lifeline.
Technical Definition
Display filters use Wireshark’s filter expression syntax to show only packets matching specific criteria. Unlike capture filters (which discard unwanted packets during collection), display filters work on already-captured data and can be changed instantly without restarting the capture. The syntax follows the pattern: protocol.field operator value, where operators include == (equals), != (not equals), > (greater than), < (less than), and logical operators and, or, not.
Under the Hood: Common Filter Patterns
| Filter Expression | What It Shows | When To Use It |
|---|---|---|
dns | All DNS queries and responses | Troubleshooting name resolution |
http | HTTP traffic only | Finding unencrypted web traffic |
tls.handshake.type == 1 | TLS Client Hello packets | Seeing which sites you’re connecting to |
ip.addr == 192.168.1.1 | All traffic to/from this IP | Investigating specific host |
tcp.port == 443 | All HTTPS traffic | Monitoring encrypted connections |
http.request.method == "POST" | Only HTTP POST requests | Finding form submissions |
tcp.flags.reset == 1 | TCP reset packets | Diagnosing connection failures |
frame.time_relative > 5 | Packets after 5 seconds | Skipping initial handshakes |
Pro-Tip: Use the filter toolbar autocomplete. Start typing a protocol name and Wireshark suggests valid field names. This prevents syntax errors and teaches you available options.
Spotting Malware: The C2 Beacon Pattern
Wireshark isn’t just for network troubleshooting. It’s a powerful tool for detecting compromised systems. Malware must communicate with its command and control (C2) server to receive instructions and exfiltrate data. This communication leaves distinctive patterns in network traffic.
Technical Definition
A C2 beacon is a periodic outbound connection from infected malware to its controller. Traditional beacons use fixed intervals (e.g., every 60 seconds), but modern implants add jitter (randomized timing variation) to evade simple interval-based detection. The beacon typically sends a small “heartbeat” packet and waits for commands.
The Analogy
Think of a spy in enemy territory. They can’t maintain a constant phone line to headquarters without getting caught. Instead, they check a dead drop location every few hours. Sometimes they check early or late by a few minutes (jitter) to avoid predictable patterns. They leave a note saying “I’m still here” and check if headquarters left new instructions.
Under the Hood: Detection Methodology
| Beacon Characteristic | How To Spot It | Wireshark Filter |
|---|---|---|
| Regular timing | Statistics → Conversations → Sort by duration | Look for long-lived connections |
| Consistent packet sizes | Graph packet lengths over time | tcp.len == 124 (adjust value) |
| Unknown destination | Look up IP in threat intel | ip.dst == [suspicious IP] |
| High-entropy data | Encrypted payload in HTTP | Follow TCP stream, look for gibberish |
| User-Agent anomalies | Generic or outdated strings | http.user_agent contains "MSIE 6.0" |
Real-World Example: Cobalt Strike beacons often use HTTPS to blend in, but they create regular connection patterns. Filter for tls and ip.dst == [external IP], then check Statistics → I/O Graph with 1-second intervals. Regular spikes (even with some variation) are suspicious. Legitimate HTTPS traffic is bursty and irregular.
Advanced Techniques: Following Streams and Extracting Objects
Once you’ve identified suspicious traffic, the Follow Stream feature reconstructs complete application-layer conversations. Right-click any packet and select Follow → TCP Stream or Follow → TLS Stream. Wireshark color-codes client and server traffic for easy analysis.
Extracting Files from Captures
Wireshark can automatically extract files transferred over unencrypted protocols. Navigate to File → Export Objects → HTTP, then select individual files or save all to a directory. Analyze potentially malicious files in a sandbox environment.
Common Troubleshooting Scenarios
Beyond security analysis, Wireshark excels at diagnosing network performance issues. For slow website loading, filter for dns (check resolution delays), tcp.analysis.retransmission (packet loss), and tcp.time_delta > 1 (long gaps).
| Finding | Likely Cause | Solution |
|---|---|---|
| DNS responses taking 2+ seconds | Slow DNS server | Switch to 8.8.8.8 or 1.1.1.1 |
| Many TCP retransmissions | Network congestion | Check physical connections |
| Long gaps after SYN | Remote server slow | Server-side issue |
| RST after connection attempt | Firewall blocking | Check firewall rules |
For connection failures, filter ip.addr == [server IP] and look for the TCP handshake (SYN, SYN-ACK, ACK). Missing SYN-ACK indicates blocking; RST indicates rejection. To identify bandwidth hogs, use Statistics → Endpoints → IPv4 sorted by bytes transferred.
Building Your Practice Lab
The best way to develop Wireshark skills is hands-on practice with real traffic samples. Download PCAPs from malware-traffic-analysis.net for malware investigations or the official Wireshark Sample Captures for protocol learning.
For your own lab, set up a VM with snapshots, configure SSLKEYLOGFILE, start capturing, then perform various network activities. Save captures in .pcapng format and practice finding specific events. Generate both legitimate and suspicious-looking traffic to teach yourself pattern recognition in a controlled environment.
Conclusion
Wireshark doesn’t hack. It reveals. It shows you what applications are actually sending over the wire, not what they claim to be doing. That distinction matters in security, where malware is designed to lie and exfiltration masquerades as normal traffic.
If you see a strange IP address in your traffic that you can’t explain, don’t ignore it. Your computer talks to the world constantly: DNS lookups, telemetry, update checks, cloud sync. This Wireshark tutorial for beginners is your first step in learning how to listen.
Download Wireshark, install Npcap, and run a dns filter. Look at how many servers your computer contacts to load a single news website: analytics providers, ad networks, CDNs, social widgets. Each represents a connection you never explicitly authorized. Understanding that reality is the foundation of network security awareness.
Frequently Asked Questions (FAQ)
Why can’t I see my phone’s traffic in Wireshark?
Your computer’s WiFi adapter operates in standard mode by default, which only captures traffic addressed to its own MAC address. To capture traffic from other wireless devices, you need Monitor Mode, a capability that most consumer Windows WiFi drivers deliberately disable. Professional wireless analysis requires a specialized USB adapter and typically a Linux environment with proper driver support.
Can Wireshark capture and read HTTPS passwords?
Not without the TLS session keys. HTTPS encrypts data using TLS before it leaves your browser, meaning the password is scrambled into ciphertext before it touches the network wire. Wireshark will show that a connection was established, but the actual content appears as unreadable encrypted data. To decrypt traffic, you must configure SSLKEYLOGFILE before the capture begins.
What exactly is Promiscuous Mode?
Promiscuous Mode is a network interface setting that tells your NIC: “Don’t discard packets just because they aren’t addressed to my MAC address. Accept everything that hits the wire and pass it up to the operating system.” It’s required for packet analysis, but it only works for traffic that physically reaches your interface.
Is Wireshark illegal to use?
Wireshark itself is a legitimate, open-source network diagnostic tool used by network engineers, security professionals, and IT administrators worldwide. Using it to capture your own traffic on networks you own or administer is completely legal. However, using it to capture other people’s traffic without authorization constitutes illegal wiretapping in most jurisdictions. Always ensure you have proper authorization before capturing network traffic.
Why does my antivirus flag Wireshark as suspicious?
Some aggressive antivirus programs flag Wireshark because packet-sniffing tools can be used maliciously. This is a false positive. Wireshark is not malware. Major antivirus vendors have whitelisted the official Wireshark installers. Always download Wireshark from the official website (wireshark.org) to ensure you’re getting the legitimate software and not a trojanized version.
What’s the difference between Npcap and WinPcap?
WinPcap was the original Windows packet capture library, but development stopped in 2013 and Wireshark 4.6 dropped support entirely. Npcap is its modern successor, actively maintained by the Nmap project. Npcap offers Windows 10/11 compatibility, improved performance, support for loopback traffic capture, ARM64 support, and the option for raw 802.11 frame capture if your adapter supports it. For any current installation, use Npcap exclusively.
How do I detect C2 beacons with jitter?
Traditional beacon detection relies on fixed-interval timing, but modern C2 frameworks add jitter (randomized timing variation) to evade this. Look for statistical patterns instead: consistent packet sizes, regular communication with the same external IP (even if timing varies by 10-20%), and destinations not associated with legitimate services. Tools like RITA can calculate beacon probability scores even when jitter is present by analyzing timing variance and packet size consistency across many samples.
Sources & Further Reading
- Wireshark Official Documentation – Official user guides and software downloads from the development team
- Malware Traffic Analysis – Curated collection of real PCAP files from malware infections for practice analysis
- Chris Greer – Packet Pioneer YouTube Channel – Industry-standard tutorials on packet analysis techniques
- SANS Internet Storm Center – Daily network security analysis and threat intelligence
- Active Countermeasures RITA – Beacon detection methodology and Zeek-based threat hunting
- Unit 42 Wireshark Tutorials – Palo Alto Networks’ practical guides for malware traffic analysis
- Npcap Official Documentation – Official Nmap project documentation for the Windows packet capture library




