Packet Capture Simulation Platform

User Documentation & Interactive Guide

1. Introduction

Welcome to the Packet Capture Simulation Platform, a safe, interactive tool to learn network packet capture and analysis. Practice with TCP, UDP, DNS, HTTP, ICMP, and more, without needing a live network.

Learning Outcomes:

2. Navigation Overview

The platform is divided into sections accessible via the sidebar:

SectionDescription
WelcomeIntroduction and learning goals
What is Wireshark?Overview of Wireshark and features
How It WorksExplanation of capture, decoding, display, filtering
Simulation ExamplesGuided exercises for TCP, DNS, and filtering
Learn MoreOfficial documentation links
TerminologyGlossary of key terms
Scenarios & WorkspaceInteractive lab environment
Filter QueriesExamples of packet filters
Query ExercisesStep-by-step packet analysis exercises
ChartsVisual analytics of captured packet data

3. Using the Simulation

3.1 Capture Workspace

Simulate network traffic and interact with captured packets. Controls:

3.2 Scenarios

ScenarioPurpose
TCP HandshakeDemonstrates 3-way handshake (SYN → SYN/ACK → ACK)
DNS QueryClient queries DNS server
ICMP PingICMP echo request and reply
HTTP TransactionSimulates HTTP GET and POST requests

3.3 Packet Table

Columns:

Click a packet for details pane and raw bytes.

3.4 Filtering Packets

Filter examples:

TypeExampleDescription
BasictcpShow only TCP packets
IP Specificip.addr == 192.168.1.2Packets from/to IP
Field Equalityprotocol==udpUDP packets only
Negationsource!=192.168.1.2Exclude source IP
Multiple Valuesprotocol==tcp,udpTCP or UDP packets
AND Conditionsprotocol==tcp source==192.168.1.2TCP from specific source
OR Conditionsprotocol==tcp|udpTCP or UDP packets
Flagsflags==synPackets with SYN flag
Complex(protocol==tcp|udp flags==syn|ack) source==192.168.1.2 length>60Multi-condition filter

3.5 Query Exercises

Find the IP sending a SYN packet to port 80:

protocol==TCP flags==SYN destport==80

3.6 Terminology Glossary

  • Frame: Link-layer representation of network data
  • Encapsulation: Wrapping data in protocol headers
  • Payload: Actual content inside the packet
  • Handshake: Initial negotiation between devices
  • Retransmission: Resending lost packets
  • Duplicate ACK: Repeated ACK indicating packet loss
  • Checksum: Ensures packet integrity
  • MTU: Maximum Transmission Unit
  • Promiscuous Mode: NIC captures all traffic
  • SPAN/Port Mirroring: Switch copies traffic to monitoring port
  • Follow TCP Stream: Reconstructs TCP conversation
  • Coloring Rules: Highlight specific packets
  • Expert Info: Warnings/anomalies highlighted
  • RTT: Round-trip time for a packet
  • Malformed Packet: Protocol violation
  • Decryption: Inspect encrypted payloads with keys

4. Best Practices

5. Learning Path Recommendations

  1. Explore Welcome, What is Wireshark?, How It Works.
  2. Try Simulation Examples.
  3. Practice Filter Queries.
  4. Complete Query Exercises.
  5. Analyze trends using Charts.
  6. Refer to Terminology Glossary for key concepts.

6. References