Useful Links
Computer Science
Computer Networking
Wireshark Training
1. Introduction to Network Analysis and Wireshark
2. Fundamentals of Network Communication
3. The Wireshark Graphical User Interface
4. Capturing Live Network Traffic
5. Analyzing Traffic with Display Filters
6. Core Protocol Analysis
7. Advanced Analysis Techniques
8. Command-Line Tools and Automation
9. Network Troubleshooting Scenarios
10. Security Analysis and Forensics
11. Best Practices and Advanced Topics
12. Continuing Education and Resources
Core Protocol Analysis
Layer 2 Data Link Analysis
Ethernet Protocol Analysis
Ethernet Frame Structure
Preamble and Start Frame Delimiter
Destination MAC Address
Source MAC Address
EtherType Field
Payload Data
Frame Check Sequence
Ethernet Frame Types
Ethernet II Frames
IEEE 802.3 Frames
VLAN Tagging
802.1Q VLAN Tags
Double Tagging
Address Resolution Protocol
ARP Packet Structure
Hardware Type
Protocol Type
Hardware Address Length
Protocol Address Length
Operation Code
Sender Hardware Address
Sender Protocol Address
Target Hardware Address
Target Protocol Address
ARP Operations
ARP Requests
ARP Replies
Gratuitous ARP
ARP Table Management
ARP Security Issues
ARP Spoofing Detection
ARP Cache Poisoning
Spanning Tree Protocol
STP Packet Analysis
Bridge Protocol Data Units
Port States and Transitions
Layer 3 Network Analysis
IPv4 Protocol Analysis
IPv4 Header Structure
Version Field
Internet Header Length
Type of Service
Total Length
Identification
Flags
Reserved Flag
Don't Fragment Flag
More Fragments Flag
Fragment Offset
Time to Live
Protocol Field
Header Checksum
Source Address
Destination Address
Options Field
IPv4 Fragmentation
Fragmentation Process
Fragment Reassembly
Fragmentation Issues
IPv4 Addressing
Address Classes
Subnetting Analysis
Private Address Ranges
IPv6 Protocol Analysis
IPv6 Header Structure
Version Field
Traffic Class
Flow Label
Payload Length
Next Header
Hop Limit
Source Address
Destination Address
IPv6 Extension Headers
Hop-by-Hop Options Header
Routing Header
Fragment Header
Destination Options Header
Authentication Header
Encapsulating Security Payload Header
IPv6 Addressing
Address Types
Address Scopes
Address Configuration
Internet Control Message Protocol
ICMPv4 Analysis
ICMP Message Types
Echo Request and Reply
Destination Unreachable
Source Quench
Redirect
Time Exceeded
Parameter Problem
Timestamp Request and Reply
Information Request and Reply
ICMP Error Message Analysis
Ping Analysis
Traceroute Analysis
ICMPv6 Analysis
ICMPv6 Message Types
Neighbor Discovery Protocol
Path MTU Discovery
Layer 4 Transport Analysis
TCP Protocol Analysis
TCP Segment Structure
Source Port
Destination Port
Sequence Number
Acknowledgment Number
Data Offset
Reserved Bits
Control Flags
URG Flag
ACK Flag
PSH Flag
RST Flag
SYN Flag
FIN Flag
Window Size
Checksum
Urgent Pointer
Options Field
TCP Connection Management
Three-Way Handshake
SYN Packet Analysis
SYN-ACK Packet Analysis
ACK Packet Analysis
Connection Establishment Issues
Connection Termination
Four-Way Handshake
RST-Based Termination
TCP Flow Control
Window Size Management
Window Scaling
Zero Window Conditions
TCP Reliability Mechanisms
Sequence Number Analysis
Acknowledgment Analysis
Retransmission Detection
Duplicate ACK Analysis
Out-of-Order Segment Detection
TCP Performance Analysis
Round-Trip Time Calculation
Throughput Analysis
Congestion Control Analysis
UDP Protocol Analysis
UDP Datagram Structure
Source Port
Destination Port
Length Field
Checksum
UDP Communication Patterns
UDP vs TCP Comparison
UDP-Based Protocol Analysis
Layer 7 Application Analysis
Domain Name System Analysis
DNS Message Structure
Header Section
Transaction ID
Flags
Question Count
Answer Count
Authority Count
Additional Count
Question Section
Answer Section
Authority Section
Additional Section
DNS Query Types
A Records
AAAA Records
CNAME Records
MX Records
PTR Records
NS Records
SOA Records
TXT Records
DNS Resolution Process
Recursive Queries
Iterative Queries
Caching Behavior
DNS Security Analysis
DNS Cache Poisoning
DNS Tunneling Detection
HTTP Protocol Analysis
HTTP Request Analysis
Request Line
Method
URI
Version
Request Headers
Host Header
User-Agent Header
Accept Headers
Authorization Header
Cookie Header
Request Body
HTTP Response Analysis
Status Line
Version
Status Code
Reason Phrase
Response Headers
Content-Type Header
Content-Length Header
Set-Cookie Header
Cache-Control Header
Response Body
HTTP Methods
GET Method
POST Method
PUT Method
DELETE Method
HEAD Method
OPTIONS Method
HTTP Status Codes
1xx Informational
2xx Success
3xx Redirection
4xx Client Error
5xx Server Error
HTTP Performance Analysis
Request-Response Timing
Keep-Alive Connections
Compression Analysis
HTTPS and TLS Analysis
TLS Handshake Analysis
Certificate Analysis
Encryption Analysis
DHCP Protocol Analysis
DHCP Message Structure
Message Type
Hardware Type
Hardware Address Length
Hops
Transaction ID
Seconds
Flags
Client IP Address
Your IP Address
Server IP Address
Gateway IP Address
Client Hardware Address
Server Name
Boot Filename
Options
DHCP Process Analysis
DHCP Discover
DHCP Offer
DHCP Request
DHCP Acknowledge
DHCP Options Analysis
Subnet Mask Option
Router Option
DNS Server Option
Lease Time Option
DHCP Troubleshooting
Lease Renewal Issues
IP Address Conflicts
Previous
5. Analyzing Traffic with Display Filters
Go to top
Next
7. Advanced Analysis Techniques