[EN] Wireshark Filters

2 minute read

ICMP Request and Reply:

icmp.type==8                        #Request
icmp.type==0                        #Reply
icmp.type==8 or icmp.type==0        #Both

TCP Flags:

URG (Urgent)
ACK (Acknowledgement)
PSH (Push)
RST (Reset)
SYN (Synchronize)
FIN (Finish)
ECN (Explicit Congestion Notification)

SYN Request:

tcp.flags.syn==1

SYN+ACK Reply:

tcp.flags.syn==1 and tcp.flags.ack==1

TCP Null Scan:

tcp.flags==0x00

TCP RST:

tcp.flags.reset==1

SYN and FIN flags:

tcp.flags==0x003

OS Fingerprinting:

(tcp.flags==0x02) && (tcp.window_size < 1025)

FTP Brute Force:

ftp.response.code==220

HTTP Response Codes:

http.response.code = 200
http.response.code = 404

HTTP Requests:

http.request

HTTP Request Method:

http.request.method == "POST"
http.request.method == "GET"

HTTP Packet Filter:

http contains PNG
http contains MP3
http contains ZIP

HTTP User Agent:

http.user.agent == "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36"

HTTP Host:

http.host == "abc.com"

HTTP Date:

http.date == "Wed, 2 Jul 2020 18:55:12 GMT"

HTTP Content Type:

http.content_type == "application/json"

Mysql Success Login:

mysql.response_code == 0x00

FTP Success Login:

ftp.response.code == 200

FTP Failed Login:

ftp.response.code == 530

FTP Success File Process:

ftp.response.code == 226

FTP Data Procesess:

ftp-data

ARP Request-Reply:

arp.opcode == 1                 #ARP Request
arp.opcode == 2                 #ARP Reply

MAC Address Filter:

eth.addr==08:00:27:53:0c:ba

Wlan BSSID Filter:

(wlan.bssid == F8:14:FE:4D:E6:F2)

Wifi Deauthentication frames:

wlan.fc.type_subtype == 12

Rogue Access Point & Evil-Twin Attacks Detection:

(wlan.fc.type == 00) and (wlan.fc.type_subtype == 8)

# Beacon analysis is crucial in differentiating between genuine and fraudulent access points. One of the initial places to start is the Robust Security Network (RSN) information. This data communicates valuable information to clients about the supported ciphers, among other things.

Legitimate: Wireshark

Rogue: Wireshark

SSL Traffic:

ssl.record.content_type == 22

Wireshark

SSL “Client Hello” Packages:

ssl.handshake.type == 1

DNS:

1. Query Initiation
2. Local Cache Check
3. Recursive Query
4. Root Servers
5. TLD Servers
6. Authoritative Servers
7. Domain Name's Authoritative Servers
8. Response
Record Type

A (Address)|This record maps a domain name to an IPv4 address
AAAA (Ipv6 Address)|This record maps a domain name to an IPv6 address
CNAME (Canonical Name)|This record creates an alias for the domain name. Aka [hello.com](http://hello.com/) = [world.com](http://world.com/)
MX (Mail Exchange)|This record specifies the mail server responsible for receiving email messages on behalf of the domain.
NS (Name Server)|This specifies an authoritative name servers for a domain.
PTR (Pointer)|This is used in reverse queries to map an IP to a domain name
TXT (Text)|This is used to specify text associated with the domain
SOA (Start of Authority)|This contains administrative information about the zone

DNS Query Name:

dns.qry.name == "www.google.com"

UDP:

1. Real-time Applications - Applications like streaming media, online gaming, real-time voice and video communications
2. DNS (Domain Name System) - DNS queries and responses use UDP
3. DHCP (Dynamic Host Configuration Protocol) - DHCP uses UDP to assign IP addresses and configuration information to network devices.
4. SNMP (Simple Network Management Protocol) - SNMP uses UDP for network monitoring and management
5. TFTP (Trivial File Transfer Protocol) - TFTP uses UDP for simple file transfers, commonly used by older Windows systems and others.

.

.

.