Jasper Alblas
Jasper Alblas
Welcome to this walkthrough of the Wireshark: Packet Operations Room on TryHackMe. In this room we will cover advanced features of the Wireshark by focusing on packet-level details with Wireshark statistics, filters, operators and functions. Be sure to checkout the walkthrough on the previous Wireshark room: TryHackMe: Wireshark: The Basics (SOC Level 1)
https://tryhackme.com/room/wiresharkpacketoperations
I am making these walkthroughs to keep myself motivated to learn cyber security, and ensure that I remember the knowledge gained by these challenges on HTB and THM. Join me on learning cyber security. I will try and explain concepts as I go, to differentiate myself from other walkthroughs.
Now, let’s move on!
In this room, we will cover the fundamentals of packet analysis with Wireshark and investigate the event of interest at the packet-level. Note that this is the second room of the Wireshark room trio, and it is suggested to visit the first room (Wireshark: The Basics) to practice and refresh your Wireshark skills before starting this one.
In the first room, we covered the basics of the Wireshark by focusing on how it operates and how to use it to investigate traffic captures. In this room, we will cover advanced features of the Wireshark by focusing on packet-level details with Wireshark statistics, filters, operators and functions.
Answer: No answer needed
The summary menu provides an overview of network traffic, protocols, endpoints, and conversations to help analysts form investigative hypotheses. Here are some of the functionality found in this menu:
Go into Statistics -> Resolved Addresses:
A window will show up with a list of addresses (both IP and MAC) and the hostnames they resolve to.
Search for bbc and you will find the answer: 199.232.24.81.
Answer: 199.232.24.81
Conversation represents traffic between two specific endpoints. To see an overview over all conversations go to Statistics -> Conversations.
You can see the answer in the top, on the second tab.
Answer:435
This time it is time to look at the Endpoints window, by going at Statistics -> Endpoints.
While you could first to to Resolved Addresses to find the MAC address corresponding to the Micro-St manufacturer, the easier way is to check Name resolution in the Endpoints window, as shown below.
Find the correct Address, and find the answer in column 3.
Answer: 7474
Stay inside the Endpoints window, but go inside the IPv4 overview tab. Here you will see a column called City. Simply press on it to order by city name:
Scroll down and you will find 4 entries from Kansas City.
Answer: 4
Once again, we can stay into the Endpoints window. There is another field called AS Organization. As before, click on the column title to sort. Find Blicnet and note that there is only one entry,
On that row you will also find the IP address: 188.246.82.7.
Answer: 188.246.82.7
Wireshark has some additional features which gives us the option to narrow the types of protocols which the statistics relate to:
To the IPv4 statistics, we need to go to Statistics -> IPv4 Statistics -> Destinations and Ports.
In this window you can filter on the Count Column, and the IP address on the top (you might have to click twice) will have the highest count (29387).
PS: I found out you can get the same information from the Source and Destination Addresses window, also found under Statistics -> IPv4 Statistics.
Answer:10.100.1.33
Go to Statistics -> DNS. Then find the correct Topic, request-response time (secs) underneath Service Stats.
Finally, look for the Max val column.
Answer: 0.467897
I guess you know where to go now. Go to Statistics -> HTTP -> Load Distribution.
Sort by the Topic / Item, and you should be able to find rad.msn.com.
The answer is 24 +15, you can figure it out..
Answer: 39
Wireshark uses two types of filters for packet analysis:
Capture Filters – Applied before capturing traffic, these filters save only specific packets and cannot be changed during capture. They use byte offsets, hex values, and boolean operators (e.g., tcp port 80
). Only experienced users should rely on them, as incorrect filters can miss critical data.
Display Filters – Used to refine visible packets after capture, these filters support 3000+ protocols and allow detailed packet inspection. They can be changed dynamically (e.g., tcp.port == 80
).
Answer: No answer needed
Wireshark supports 3,000 protocols and enables packet-level investigation using filters. These filters help analysts isolate relevant traffic based on different protocol layers:
IP filters help analyze traffic based on network-level information like IP addresses, TTL, flags, and checksums. Common filters:
Note: ip.addr filters both directions, while ip.src and ip.dst filter based on traffic direction.
These filters analyze transport protocol data such as ports, sequence numbers, window size, and flags.
Filters traffic based on application protocols such as HTTP and DNS.
Wireshark provides a Display Filter Expression menu (Analyze → Display Filter Expression) to help users create filters without memorizing protocol structures. This menu shows all protocol fields, accepted values, and predefined options, aiding in filter creation.
Wireshark allows users to highlight filtered packets using Coloring Rules (View → Coloring Rules). This helps in visually distinguishing filtered traffic.
Mastering Wireshark filters takes time and practice, but using the Display Filter Expression tool simplifies the process.
This one is simple. You simply have to write the following display filter:
ip
That’s it 🙂 This shows all IP packets, and removes everything else from the list.
Answer:81420
You can write the following filter expression:
ip.ttl < 10
PS: If you are unsure on which display filter to use you can look at the Analyse –> Display Filter Expression menu. You can look around there for all the possible fields, and you can even search for properties!
Answer: 66