“Wireshark for Beginners: TryHackMe Walkthrough & Tips”

“Wireshark for Beginners: TryHackMe Walkthrough & Tips”

Publish Date: Jul 9
0 0

👋 Hello everyone!

This is my detailed walkthrough for the Wireshark: The Basics room on TryHackMe.

✅ Task 1 — Introduction

What I Learned:

  • Wireshark is an open-source network packet analyzer.
  • The room provides a VM with two .pcapng files.

✅ Task 2 — Use Cases, GUI & File Analysis

📂 File Used

Exercise.pcapng


🔍 1️⃣ Find the Capture File Comments (Flag)

  • Opened Exercise.pcapng in Wireshark.
  • Went to StatisticsCapture File Properties.
  • A pop-up box appeared showing the file metadata.
  • Scrolled down to find the Capture File Comments section.
  • Found the hidden flag inside the comments.

📊 2️⃣ Find the Total Number of Packets

  • While the file was still open:
    • Looked at the bottom right corner in the Status Bar.
    • Found the Total Packets count there.

🔐 3️⃣ Find the SHA256 Hash Value

  • Again, went to StatisticsCapture File Properties.
  • At the top of the pop-up, found the SHA256 hash of the capture file.

✅ Task 3 — Packet Dissection

📂 File Used

Exercise.pcapng


🔍 What I Did

In this task, I practiced packet dissection by decoding protocol layers in Packet 38.


⚙️ Steps I Followed

1️⃣ Markup Language (HTTP)

  • I located Packet 38 in the Packet List Pane.
  • Below, in the Packet Details Pane, I checked the layers.
  • I expanded the HTTP protocol layer.
  • Found the markup language directly under HTTP.

2️⃣ Arrival Date

  • While still in Packet 38, I expanded the HTTP protocol section.
  • Found the Arrival Date field in the headers/info.

3️⃣ TTL Value

  • In the Packet Details Pane, I expanded the IP protocol section.
  • Found the TTL (Time to Live) field listed inside.

4️⃣ TCP Payload Size

  • Just below the IP protocol, there’s the TCP protocol section.
  • Without expanding, the Payload Size was already visible in the same line at the end.

5️⃣ E-Tag Value

  • Again, under the same HTTP protocol section, I looked deeper.
  • Found the E-Tag field and noted its value.

✅ Task 4 — Packet Navigation

📂 File Used

Exercise.pcapng


🔍 What I Did

In this task, I learned to search, navigate, mark, comment, extract, and verify packets using Wireshark’s advanced features.


⚙️ Steps I Followed


1️⃣ Search for r4w String — Artist 1

  • Opened Exercise.pcapng in Wireshark.
  • Went to EditFind Packet.
  • In the Find Packet dialog:
    • Entered r4w as the search string.
    • Set the search to look inside Packet Details.
  • Wireshark highlighted the packet containing r4w → found the full string → revealed Artist 1’s name.

2️⃣ Get MD5 Hash — Packet Comments

  • Went to GoGo to Packet → Entered 12.
  • Right-clicked the packet → selected Packet Comment.
  • The comment said: Go to Packet 39765.
  • Went to GoGo to Packet → Entered 39765.
  • Exported the packet bytes:
    • FileExport Packet Bytes → saved as test.
  • Opened terminal → ran: md5sum test

3️⃣ Extract .txt File — Find the Alien’s Name

  • Opened Exercise.pcapng in Wireshark.
  • Clicked FileExport ObjectsHTTP.
  • A window popped up listing all HTTP objects:
    • Columns: Filename, Size, Packet, Host, Content Type.
  • Sorted the Filename column by clicking the up arrow.
  • Located note.txt in the list.
  • Selected note.txt and saved it to my Downloads folder.
  • Opened my terminal and ran: cat note.txt

🔍 4️⃣ Check Expert Info — Find Number of Warnings

  • Opened Exercise.pcapng in Wireshark.
  • Went to Analyze → Expert Information.
  • This opened the Expert Info dialog box.
  • The dialog showed various categories: Chat, Note, Warn, and Error.
  • Looked for the Warnings section (yellow icon).
  • Checked the Count column next to Warnings.
  • Got the total number of warnings from there.

✅ Task 5 — Packet Filtering

📂 File Used

Exercise.pcapng


🔍 1️⃣ Apply Filter — Get Filter Query

  • Went to Packet 4 in the capture.
  • In the Packet Details Pane below, found the HTTP protocol layer.
  • Right-clicked on the HTTP protocol.
  • Chose Apply as Filter → Selected.
  • The filter was applied automatically.
  • The filter query appeared in the Filter Bar at the top.

🔍 2️⃣ Displayed Packets Count

  • After the filter was applied:
    • Looked at the Status Bar in the bottom right corner.
    • Verified the number of packets displayed.
    • Used this number as the answer.

🔍 3️⃣ Follow HTTP Stream — Total Number of Artists

  • Went to Packet 33790 in the capture.
  • Right-clicked the packet.
  • Selected Follow → HTTP Stream.
  • A new window opened showing the HTTP response.
  • Searched for artist in the source code.
  • Counted the total number of artists listed.

🔍 4️⃣ Name of Second Artist

  • In the same HTTP Stream window:
    • Checked the displayed list of all artists.
    • Found and noted the name of the second artist in the list.

✅ Task 6 — Conclusion


🎉 What I Learned

  • How to open and navigate .pcapng files in Wireshark.
  • How to use Capture File Properties to find metadata like flags and hashes.
  • How to dissect packets layer by layer using the Packet Details Pane.
  • How to apply filters, follow streams, and extract files from packets.
  • How to use Expert Info, Mark Packets, and Packet Comments for deeper analysis.
  • How to search with Find Packet, navigate with Go To Packet, and export objects.

🙌 Thanks for Reading!


🙏 If this helped you, please ❤️ this post, leave a comment, and share it with your friends!

💬 I’d love to hear: Did you find this TryHackMe room useful? Drop your thoughts below!

Happy Packet Sniffing! 🦈✨

Comments 0 total

    Add comment