
These filters are used before the process of packet capturing. Knowing how to use different filters is extremely important for capturing the intended packets.


The process of analysis in Wireshark represents monitoring of different protocols and data inside a network.īefore we start with the process of analysis, make sure you know the type of traffic you are looking to analyze, and various types of devices that emit traffic: HTTP with Secure Sockets Layer – HTTPS (HTTP over SSL/TLS) If you want to learn about the most common ones, check out the following list: Port numberĭynamic Host Configuration Protocol – DHCP Different ports are used for different protocols.

And public ports are ports from 49152-65535, they can be used by any service. Then, from 1024 to 49151 are registered ports – they are assigned by ICANN to a specific service. They can be divided into three different categories: ports from 0 – 1023 are well-known ports, and they are assigned to common services and protocols.
