Wireshark Simulation - IP Based

Welcome to the packet capture simulation: monitor traffic, inspect packets, and learn how to respond to real-world threats.

Welcome to the packet capture Simulation

This platform introduces you to a simulation Wireshark, the world’s most popular network protocol analyzer. With Wireshark, you can capture, inspect, and understand data packets as they travel across a network.

Why Use This Simulation?

  • Safe Learning Environment: Practice packet capture and analysis without touching a real network.
  • Hands-On Experience: Simulate real-world traffic like TCP handshakes, DNS queries, and HTTP requests.
  • Interactive Workflows: Learn how professionals use Wireshark to troubleshoot performance issues or investigate security threats.
  • Step-by-Step Guidance: Each scenario includes explanations to help you connect theory with practice.

Learning Goals

By the end of this simulation, you will be able to:

  1. Understand how packets flow between devices on a network.
  2. Recognize different protocols (TCP, UDP, DNS, HTTP) and their role.
  3. Apply filters to isolate relevant traffic.
  4. Analyze suspicious traffic patterns for security awareness.
Client πŸ–₯️
➑️
Router/Firewall 🌐
➑️
Server πŸ—„οΈ

Packets flow from Client β†’ Router β†’ Server. Each color represents a protocol type, similar to what you’ll analyze in Wireshark.

TCP UDP HTTP DNS ICMP

What is Wireshark?

Wireshark is the world’s most widely used network protocol analyzer. Think of it as a microscope for your network traffic. It allows you to capture, inspect, and analyze data traveling across your network in real-time.

Originally developed in 1998 as Ethereal, Wireshark has become a critical tool for network administrators, cybersecurity professionals, and IT students to understand and troubleshoot networks. It works on multiple platforms including Windows, macOS, and Linux.

By mastering Wireshark, you gain the ability to visualize, understand, and troubleshoot complex networks, making it an essential skill for anyone working in IT, networking, or cybersecurity.

How Wireshark Works

Wireshark captures network traffic and breaks it down into understandable layers, helping you see exactly what is happening on your network. Each packet goes through several stages:

By understanding these stages, you can trace network problems, detect intrusions, and learn how different protocols interact in a live network. Our simulation provides a safe environment to practice these skills without capturing real network traffic.

Simulation Examples

Explore realistic network scenarios with our guided simulations. Each example helps you understand how network traffic behaves and how to analyze it like a professional using Wireshark:

The simulation interface mimics Wireshark’s layout, including:

Use these simulations to practice real-world network analysis techniques and improve your packet inspection skills in a safe, interactive environment.

Learn More

Filter Query Examples

Use these queries to practice filtering packets, similar to Wireshark.

1. Basic Free Text Search

  • http β†’ matches any row containing β€œhttp”.
  • 192.168.1.2 β†’ matches any row with this IP.

2. Field Equality (==)

  • protocol==tcp β†’ only TCP packets.
  • source==192.168.1.2 β†’ packets from this IP.
  • dest==172.217.0.14 β†’ packets to this IP.

3. Negation (!=)

  • protocol!=tcp β†’ all non-TCP packets.
  • source!=192.168.1.2 β†’ exclude this source.

4. Multiple Values

  • protocol==tcp,udp β†’ match both TCP and UDP.
  • source==192.168.1.2,192.168.1.3 β†’ packets from either IP.

5. OR Conditions

  • protocol==tcp|udp β†’ matches TCP or UDP.
  • flags==syn|ack β†’ match if packet has SYN or ACK.

6. Numeric Comparisons

  • length>60 β†’ packets larger than 60 bytes.
  • length<=100 β†’ packets 100 bytes or smaller.
  • destport==80 β†’ packets going to port 80.

7. Flags (Array Field)

  • flags==syn β†’ packets with SYN flag.
  • flags==syn,ack β†’ packets with SYN or ACK.
  • flags!=fin,urg β†’ exclude FIN and URG flags.

8. AND Conditions (space separated)

  • protocol==tcp source==192.168.1.2 β†’ TCP packets from this IP.
  • protocol==udp length>50 β†’ UDP packets larger than 50 bytes.

9. Grouping with Parentheses

  • (protocol==tcp|udp) flags==syn β†’ TCP or UDP packets with SYN.
  • (source==192.168.1.2|192.168.1.3) protocol==tcp β†’ TCP packets from either source.

10. Complex Queries

  • (protocol==tcp|udp flags==syn|ack) source==192.168.1.2 length>60 flags!=fin β†’ TCP/UDP packets with SYN or ACK, from 192.168.1.2, length > 60, excluding FIN.

πŸ’‘ Tip: Start simple (protocol==tcp) and gradually add conditions with spaces (AND) and pipes (OR).

Packet Analysis Exercises

Use the simulator to capture packets and answer the questions.

Packet Capture / Wireshark Terminology

Quick-reference glossary β€” expand any item to read the definition.

Frame β€” the physical/link-layer representation of network data as transmitted on a medium (Ethernet/Wi-Fi). It contains headers, trailers, and the payload (which may include an IP packet).

Encapsulation β€” wrapping data with protocol headers/metadata as it moves down the OSI/stack (e.g., HTTP β†’ TCP segment β†’ IP packet β†’ Ethernet frame).

Payload β€” the actual data carried inside a packet (e.g., HTML body, DNS query string). Not the headers β€” the useful content.

Handshake β€” initial negotiation between endpoints before data exchange (e.g., TCP 3-way: SYN β†’ SYN/ACK β†’ ACK; TLS Client/Server Hello exchanges).

Retransmission β€” when a sender resends packets because they were lost or not acknowledged. Frequent retransmits indicate reliability/latency issues or packet loss.

Duplicate ACK β€” repeated ACK packets for the same sequence number. Often a sign of lost packets or reordering; used by TCP for fast retransmit detection.

Checksum β€” a calculated value to verify packet integrity. If corrupted in transit, checksums may fail and Wireshark can flag them (sometimes NIC offload will make checksums appear invalid in captures).

MTU β€” largest payload size that can traverse a link without fragmentation. Mismatched MTUs can cause fragmentation or dropped packets.

Promiscuous Mode β€” NIC setting that receives all traffic on a segment, not just frames addressed to the host. Useful for full-segment captures (may be limited on switched networks).

SPAN / Port Mirroring β€” switch feature that copies (mirrors) traffic from one or more ports to a monitoring port where you run the capture tool.

Capture filter β€” applied before data collection to limit what is saved (BPF syntax). Display filter β€” applied after capture to refine what you see (Wireshark display-filter syntax).

Expert Info β€” Wireshark feature that surfaces anomalies, errors, and warnings (e.g., malformed packets, retransmissions) to speed troubleshooting.

Follow TCP Stream β€” reconstructs an ordered TCP conversation (both directions) so you can view application data (e.g., full HTTP request/response) in one place.

Name Resolution β€” translating raw IP or port numbers into hostnames or service names (e.g., port 80 β†’ HTTP). Handy for readability, but can be disabled if you need raw values.

RTT β€” time it takes for a packet to travel to a destination and back. Useful for latency analysis and performance tuning.

Malformed Packet β€” packet that violates protocol structure (headers missing/invalid). Could indicate capture corruption, misconfiguration, or malicious traffic.

Decryption in Wireshark β€” Wireshark can decrypt TLS/WPA2 captures if given the appropriate keys (pre-master secrets, PSKs). Useful to inspect encrypted payloads during debugging.

Coloring Rules β€” custom rules in Wireshark to highlight packets that match conditions (e.g., SYNs in red). Great for quickly spotting specific traffic patterns.

Scenario-Based Exercises

Capture Workspace

Controls

Network Topology

192.168.1.2
172.217.0.14
192.168.1.105
192.168.1.106
192.168.1.50
Router

Captured Packets

No. Time Source Destination Protocol Length Info
Packets: 0 Status: Stopped

Packet Details

Click on a packet to view details.

Traffic Statistics

Sart the simulation capture to see Stats.