Wireshark Cheatsheet
Wireshark Cheatsheet
4. Search for HTTP traffic to a specific domain 6. Get All requested Domains & Their IPs
Investigate Files: Scan the generated files Investigate the traffic streams: Use Block
with virustotal or investigate them further No. 3
Description: Description:
with malware analysis tools Investigate websites: Investigate the
Wireshark Investigate Websites: Investigate the domains/IPs that downloaded these malicious If you have a specific domain that you want to
investigate its http traffic (probably you got it from
This query helps in getting all requested domains that
successfully restuned IPs or CNAME domains and their
domains/IPs that downloaded these malicious files. Which machines are connected to these
Cheatsheet files. Which machines are connected to these
websites and so on
websites and so on Block No. 2 or from an alert or log files), you can use
this query to find its http traffic.
equivalent domains/IP.
Steps:
Investigating & Hunting in Network 1. in Filters, type the following query:
Steps:
Packets 2. Get All HTTP Traffic 3. Get The Full HTTP Communication 1. in Filters, type the following query:
dns and dns.flags.response == 1 and
dns.flags.rcode == 0
Network Investigation - Starting Point http.host == <domain name>
Description: Description: 2. In each result, you can see the UI down the
http.host contains <part of the domain>
Most of backdoors, downloaders and command & Once you find the HTTP traffic that you want to dessect of the packet. Choose the "Domain Name
1. Live Network Monitoring: To capture network
➡️
traffic, you need to click on Menu: Capture Start control communications (C&C) use HTTP protocol to
communicate with the attacker.
investigate further, you can use Wireshark to get the
exact communication between the client & the server
Note: only use the domain without "http" or
"https"
System (response)" tab and you see the requested
domain and the returned results
in plain text mode or hexdecimal mode (for binary Next Steps:
Wireshark allows you to see all the requested websites traffic).
Investigate each result's HTTP stream: Use
and the all the paths that were requested from them.
Steps: Block No. 3 on each result
Steps:
➡️
1. Right click on any traffic Follow ➡️
TCP Stream
Look for similar communications: Search
using User-Agent or URI to find other
1. Go to Statistics ➡️ HTTP ➡️ Requests (or HTTP Stream, both end up the same) domains that might have been used by the
attacker. Block No. 8
Export any downloaded files: Use Block No. 1
2. Opening Packet Capture File: To open a packet and filter with the domain name to save any
➡️
capture file (pcap, pcapng). Just go to File Open downloaded files from this domain
and choose the file you want
3. You can also use part of the results as a Filter to Next Steps:
query similar traffic. Right click on any item and Check the No. of bytes
➡️
click "Apply as Filter" Selected downloaded/uploaded: This can help you Watch a 1-Hour Hands-on Video Tutorial For
this Cheat Sheet at:
find if it's a normal browsing/downloading or
data exfiltration (way more upload than https://maltrak.com/cheatsheet
download)
Check the time of network requests: if
Next Steps:
there's a request every 60 secs or 2-3 mins
Extract all downloaded & uploaded files in for long time, it might be a malware looking
FTP: Use block No. 1 for new commands (beaconing)
Investigate The FTP IP Further: Use block Check the workday to network requests: It's
No.13 to get the domain behind the FTP Note: you can choose "Not selected" if you not common to find network connections out
server want to exclude this from results of the working hours or at night.