Wireshark for CTF

Sometimes Apackets is useless so lets make a quick reference for packet analysis during CTF challenges.


๐Ÿงฉ Basic Navigation


๐ŸŽฏ Essential Display Filters

๐Ÿ”น Protocol Filters

ip
tcp
udp
icmp
http
https
dns
ftp
smtp
ssh

๐Ÿ”น Filter by IP

ip.addr == 10.0.0.5
ip.src == 192.168.1.10
ip.dst == 8.8.8.8

๐Ÿ”น Filter by Port

tcp.port == 80
tcp.srcport == 443
tcp.dstport == 1337

๐Ÿ”น Filter by MAC Address

eth.addr == AA:BB:CC:DD:EE:FF

๐Ÿ”น Filter by Contains Data

frame contains flag
http contains "flag"
dns.qry.name contains "ctf"

๐Ÿ”น Filter for Credentials

http.authbasic
ftp.request.command == "USER"
ftp contains PASS

๐Ÿ”น Filter by Packet Type

tcp.flags.syn == 1
tcp.flags.fin == 1
tcp.flags.reset == 1

๐Ÿ” Common CTF Tasks

โœ” Extract Credentials

  1. Filter:
http
ftp
smtp
pop
imap
  1. Rightโ€‘click โ†’ Follow Stream.

โœ” Reconstruct Files (e.g., images, zip)

โœ” Find Hidden Data

dns.txt
frame matches "[A-Za-z0-9+/]{20,}="

โœ” Follow Streams

Keyboard shortcut: Ctrl + Alt + Shift + T


๐Ÿ›  Useful Tools Inside Wireshark

๐Ÿ”น Decode Asโ€ฆ

Rightโ€‘click โ†’ Decode As โ†’ set protocol (useful for odd ports).

๐Ÿ”น Packet Bytes View

๐Ÿ”น Statistics Menu


๐Ÿ— Decrypting HTTPS (if key available)

Edit โ†’ Preferences โ†’ Protocols โ†’ TLS โ†’ (Preโ€‘Master Secret log)

Then apply filter:

http

๐Ÿงช Advanced Filters (Very Useful)

Find suspicious payload sizes

frame.len > 500

Find ASCII printable bytes

data-text-lines

Track a single TCP session

tcp.stream == 5

Detect port scans

tcp.flags.syn == 1 && tcp.flags.ack == 0

Filter out noise

!(dns || mdns || arp)

๐Ÿ’ก File Carving Tricks

Extract everything likely to be base64

frame matches "[A-Za-z0-9+/]{30,}"

Copy payload โ†’ decode.

Extract PNG files manually

PNG header:

89 50 4E 47 0D 0A 1A 0A

Search using:

frame contains 89:50:4E:47

Export packet bytes โ†’ save โ†’ test with file command.


๐Ÿงฐ External Tools to Pair with Wireshark


๐Ÿš€ Quick Workflow for CTF!

  1. Open PCAP

  2. Check Statistics โ†’ Protocol Hierarchy

  3. Find interesting IPs โ†’ filter by them

  4. Follow streams

  5. Export objects

  6. Search for keywords:

frame contains "flag"
frame contains "ctf"
frame contains "{"
  1. Look for encoded data (base64, hex, gzip)

  2. Extract files