🔏
RootGuard
HomeSOC OperationsIncident ResponseWindows ForensicsLinux ForensicsKQL Investigations
  • Welcome
    • RootGuard
      • Who Am I?
        • Professional Profile
  • Resources Hub
    • Blogs
      • Articles
        • Safeguarding SMEs: The Strategic Importance of a Security Operations Center (SOC)
      • Posts
        • Roadmap to Becoming a Cybersecurity Specialist
        • Starting a Career in Cybersecurity
        • A Guide to Landing Your First Cybersecurity Analyst Role
        • Moving from Intermediate to Expert Incident Responder
  • SOC Operations
    • Introduction
      • Development Resources
        • SOC Analysts Roadmap
        • Becoming A SOC Analyst
        • SOC Analysts Prep Interview Questions
    • Essential Skills
      • Critical Windows EventIDs to Monitor
    • Junior Analyst Skills
      • Splunk Use Cases
      • KQL Use Cases
        • Reconnaissance (TA0043)
        • Initial Access (TA0001)
        • Execution (TA0002)
        • Persistence (TA0003)
        • Privilege Escalation (TA0004)
        • Defence Evasion (TA0005)
        • Credential Access (TA0006)
        • Discovery (TA0007)
        • Lateral Movement (TA0008)
        • Collection (TA0009)
        • Command and Control (TA0011)
        • Exfiltration (TA0010)
        • Impact (TA0040)
      • Investigating Common Attacks
        • Domain Dominance Attacks - Detection & Analysis
        • Investigating a Suspected AD FS Distributed Key Management (DKM) Attack
        • Authentication From Suspicious DeviceName
        • Identifying Interactive or RemoteInteractive Session From Service Account
        • Identifying Split or Part Archive File Transfers
        • Detect Potential Cleartext Credentials in Command Line
        • Detecting Command Line Interpreters Launched via Scheduled Tasks
        • Detecting Files Containing Potentially Sensitive Data
        • Detecting DeviceNetworkEvents From Windows Processes and Domains by TLD
        • Detecting Silent cmd.exe Execution With Redirected STDERR & STDOUT
        • Detecting Low Prevalence DLL Loaded From Process In User Downloads Directory
        • Detecting Virtual Drive Mounted From Archive
        • Identify Execution of Script From User's Downloads Folder
        • Identify Potential RDP Tunneled Sessions
        • Identify Instances of PowerShell Invoke-WebRequest, IWR or Net.WebClient
        • Identify Processes Launched by PowerShell Remoting (WSMProvHost.exe)
        • Detect DeviceNetworkEvents for LOLBAS with Download or Upload Functions
        • Detect Execution of PSEXESVC via Remote Systems
        • Identify Suspicious String in Service Creation ImagePath
        • Identify File with Double Extensions
        • Detect Potential Cleartext Credentials in Commandline
        • Detect When Large Number of Files Downloaded From OneDrive or SharePoint
        • Identify and Investigate Phishing Attacks with KQL
      • PowerShell for SecOps
        • Powershell Remoting
        • Reconnaissance Discovery
        • Initial Access Discovery
        • Execution Discovery
        • Persistence Discovery
        • Privilege Escalation Discovery
        • Defence Evasion Discovery
        • Credential Access Discovery
        • Discovery
        • Lateral Movement Discovery
        • Collection Discovery
        • Command & Control (C2) Discovery
        • Exfiltration Discovery
        • Impact Discovery
      • Packet Analysis (pcap)
        • Tcpdump
        • Tcpdump (Intermediate)
        • Tshark
        • Ngrep
      • Investigating Suspicious Emails Using KQL
    • Intermediate and Advanced Skills
      • Investigate Using MITRE ATT&CK Methodology
        • Reconnaissance (TA0043) Techniques
        • Resource Development (TA0042) Techniques
        • Initial Access (TA0001) Techniques
        • Command Execution (TA0002) Techniques
        • Persistence (TA0003) Techniques
        • Privilege Escalation (TA0004) Techniques
        • Defence Evasion (TA0005) Techniques
        • Credential Access (TA0006) Techniques
        • Discovery (TA0007) Techniques
        • Lateral Movement (TA0008) Techniques
        • Collection (TA0009) Techniques
        • Command and Control (C2) (TA0011) Techniques
        • Exfiltration (TA0010) Techniques
        • Impact (TA0040) Techniques
    • Vulnerability Management
    • Malware Analysis
  • DFIR
    • Incident Response
      • Incident Triage
        • Triage Types and Processes
        • PowerShell for Detection and Analysis
          • Malware or Compromise Investigation
          • Lateral Movement Discovery
        • Registry Analysis
        • Sysinternals Intrusion Analysis
        • PowerShell Intrusion Analysis
        • Velociraptor Intrusion Analysis
        • Zimmerman Tools Intrusion Analysis
      • KAPE Artifacts Analysis
      • Velociraptor Artifacts Analysis
      • Using The Unified Kill Chain Model to Analyse Individual Cyber Attacks
        • Phase 1 - Gaining an Initial Foothold
          • Gaining Access to the Network
          • Establishing a Foothold
          • Network Discovery
      • Response Strategies
        • Privilege Escalation Assessment
        • Command and Control Assessment
        • Command Execution Assessment
        • Defence Evasion Assessment
        • Detection Assessment
        • Discovery Assessment
        • Exfiltration Assessment
        • Initial Access Assessment
        • Initial Impact Assessment Techniques
        • Lateral Movement Assessment
        • Persistence Assessment
    • Windows Forensics
      • Evidence of Execution
      • Window Artifact Analysis
        • Account Usage
        • User Activity Tracking (Event Logs)
        • Program Execution
        • File and Folder Opening
        • File Download
        • Browser Usage
        • Deleted File or File Knowledge
        • External Device & USB Usage
    • Linux Forensics
      • Linux Commandline Basics
      • Host Compromise Assessment
    • KQL for Defender & Sentinel
      • MDO (Office)
      • MDI (Identity)
      • MDE (Endpoint)
    • Memory Forensics
      • Memory Forensics (Volatility 3)
    • Playbooks
      • First Responder DFIR Playbook
        • Device Isolation
        • Evidence Collection
          • Acquire Triage Image Using KAPE
          • Acquire Triage Data Using Velociraptor
          • Acquire Triage Data Using Powershell
          • Acquire Triage Memory Image
          • Acquire Image Using FTK
          • AXIOM Cyber Data Collection
        • Windows Forensic Artefacts
          • Application Execution
          • File & Folder Knowledge
          • External Device Usage
          • Network Activity
          • Windows Event Logs
        • Initial Analysis
          • Memory Analysis (Vol 3)
          • Axiom Cyber Examiner
  • Detection Engineering
    • AD Attack Detections & Mitigations
      • Kerberoasting
      • Authentication Server Response (AS-REP) Roasting
      • Password Spraying
      • MachineAccountQuota Compromise
      • Unconstrained Delegation
      • Password in Group Policy Preferences (GPP) Compromise
      • Active Directory Certificate Services (AD CS) Compromise
      • Golden Certificate
      • DCSync
      • Dumping ntds.dit
      • Golden Ticket
      • Silver Ticket
      • Golden Security Assertion Markup Language (SAML)
      • Microsoft Entra Connect Compromise
      • One-way Domain Trust Bypass
      • Security Identifier (SID) History Compromise
      • Skeleton Key
      • Active Directory Security Controls
      • Active Directory Events for Detecting Compromise
    • Attack Triage Playbooks (KQL Triage)
      • Windows Malware Detection Playbook
      • Linux Host Intrusion Detection Playbook (CLI)
      • Linux Intrusion Detection Playbook
      • Large-Scale Compromise Detection Playbook
      • Ransomware Detection Playbook
      • Phishing Email Compromise Detection Playbook
      • Scam Detection Playbook
      • Customer Phishing Detection Playbook
      • Insider Abuse Detection Playbook
      • Information Leakage Detection Playbook
      • Social Engineering Detection Playbook
      • Malicious Network Behaviour Detection Playbook
      • Windows Intrusion Detection Playbook
      • Vulnerability Detection Playbook
      • Business Email Compromise Detection Playbook
    • Process Execution (KQL Triage)
    • Threat Hunting
      • Hunting Ransomware Indicators
      • Hunting With KQL
        • Detecting Malware Infection (MITRE ATT&CK: T1566, T1059)
        • Discovery Activities (MITRE ATT&CK: T1016, T1083, T1046)
        • Credential Theft (MITRE ATT&CK: T1003, T1078)
        • Lateral Movement (MITRE ATT&CK: T1076, T1021)
        • Data Theft (MITRE ATT&CK: T1041, T1071)
        • Detecting CommandLine Executions (MITRE ATT&CK: T1059)
        • Windows Security Logs (Identity and Logon Activities)
      • Hunting With Splunk
Powered by GitBook
On this page
  • Using TShark for PCAP Data Analysis in an Investigation
  • 1. Read Basic Packet Information
  • 2. Extract HTTP GET and POST Requests
  • 3. Filter Traffic by IP Address
  • 4. Filter DNS Queries
  • 5. Filter by Protocol
  • 6. Identify Large Packets (Possible Data Exfiltration)
  • 7. Detect SMB Activity
  • 8. Extract Credentials from FTP or HTTP Traffic
  • 9. Analyse Command-and-Control (C2) Activity
  • 10. Detect Port Scanning Activity
  • 11. Extract Specific Fields for Analysis
  • 12. Detect ICMP Tunneling
  • 13. Filter TLS Traffic
  • 14. Identify Unusual DNS Responses
  • 15. Export Traffic to a New PCAP File
  • 16. Reassemble HTTP Objects
  • 17. Detect Unencrypted Credentials in Telnet
  • 18. Monitor RDP Traffic
  • 19. Extract Malicious Traffic Using IoCs
  • 20. Identify Traffic to Tor Nodes
  • 21. Detect Suspicious Packet Rates
Edit on GitHub
  1. SOC Operations
  2. Junior Analyst Skills
  3. Packet Analysis (pcap)

Tshark

Using TShark for PCAP Data Analysis in an Investigation

TShark, the command-line counterpart to Wireshark, is a powerful tool for analysing PCAP data when doing network forensic investigations. It provides detailed insights into network traffic, enabling analysts to uncover malicious activities and understand the scope of security incidents.

Key benefits of using TShark include:

  1. Efficiency in Large-Scale Analysis:

    • TShark can process large PCAP files quickly and efficiently, making it ideal for investigating high-volume network traffic without requiring a graphical interface.

  2. Granular Filtering and Queries:

    • With its robust filtering options, TShark allows analysts to isolate specific traffic types, such as HTTP, DNS, or SMB, or focus on particular indicators like IP addresses, ports, or protocol flags.

  3. Customisable Output:

    • Analysts can extract specific fields (e.g., timestamps, source/destination IPs, packet lengths) and export the data in formats like JSON, CSV, or plain text for further analysis or reporting.

  4. Protocol-Specific Insights:

    • TShark decodes and interprets hundreds of protocols, making it easier to analyse the contents of application-layer protocols like HTTP, FTP, DNS, and TLS.

  5. Integration with Automation:

    • Its command-line nature allows TShark to be integrated into scripts for automated analysis, such as detecting IoCs, extracting credentials, or monitoring traffic patterns.

  6. Forensic Applications:

    • TShark can be used to reconstruct events, such as identifying command-and-control communication, detecting large file transfers (data exfiltration), or analysing malicious payloads.

  7. Reproducibility and Reporting:

    • The ability to generate logs and export specific packets makes TShark a reliable tool for creating reproducible evidence and detailed investigative reports.

By leveraging TShark, investigators gain a precise, scalable, and scriptable tool for deep-diving into network traffic, identifying threats, and gathering actionable intelligence during cybersecurity investigations

Below is a set of TShark queries designed for forensic analysis of.pcap files, each accompanied by an explanation of its purpose. TShark, the command-line version of Wireshark, allows you to efficiently analyse network traffic for investigations.


1. Read Basic Packet Information

tshark -r sample.pcap
  • Explanation: Displays a summary of all packets in the pcap file. Use this as a starting point to get an overview of the traffic.


2. Extract HTTP GET and POST Requests

tshark -r sample.pcap -Y "http.request" -T fields -e http.host -e http.request.method -e http.request.uri
  • Explanation: Extracts HTTP request methods (GET, POST), the hostnames, and URIs. This is useful for identifying malicious web requests or data exfiltration.


3. Filter Traffic by IP Address

tshark -r sample.pcap -Y "ip.addr == 192.168.1.10"
  • Explanation: Displays all packets involving a specific IP address (192.168.1.10). This isolates traffic related to a potentially compromised host.


4. Filter DNS Queries

tshark -r sample.pcap -Y "dns.qry.name" -T fields -e frame.time -e dns.qry.name
  • Explanation: Extracts DNS queries with timestamps. Helps identify unusual or suspicious domain lookups, such as those related to malware or ransomware C2 servers.


5. Filter by Protocol

  • HTTP:

    tshark -r sample.pcap -Y "http"
  • TCP:

    tshark -r sample.pcap -Y "tcp"
  • UDP:

    tshark -r sample.pcap -Y "udp"
  • Explanation: Filters traffic by protocol type to focus on specific types of communication.


6. Identify Large Packets (Possible Data Exfiltration)

tshark -r sample.pcap -Y "frame.len > 1000" -T fields -e frame.time -e ip.src -e ip.dst -e frame.len
  • Explanation: Filters packets larger than 1000 bytes, often associated with file transfers or data exfiltration attempts.


7. Detect SMB Activity

tshark -r sample.pcap -Y "smb" -T fields -e frame.time -e ip.src -e ip.dst -e smb.command
  • Explanation: Extracts SMB traffic to identify suspicious file operations or lateral movement attempts.


8. Extract Credentials from FTP or HTTP Traffic

  • FTP:

    tshark -r sample.pcap -Y "ftp.request.command == USER or ftp.request.command == PASS" -T fields -e ftp.request.command -e ftp.request.arg
  • HTTP Basic Auth:

    bashCopy codetshark -r file.pcap -Y "http.authbasic" -T fields -e http.authbasic
  • Explanation: Detects plaintext credentials in FTP or HTTP traffic.


9. Analyse Command-and-Control (C2) Activity

  • HTTP-Based C2:

    tshark -r sample.pcap -Y "http.request and ip.dst == 198.51.100.1"
  • DNS Tunneling:

    tshark -r sample.pcap -Y "dns.qry.name and frame.len > 300" -T fields -e dns.qry.name -e frame.len
  • Explanation: Filters packets for C2 activity over HTTP or DNS. Replace the IP or payload length as needed.


10. Detect Port Scanning Activity

tshark -r sample.pcap -Y "tcp.flags.syn == 1 and tcp.flags.ack == 0"
  • Explanation: Identifies SYN packets without ACK responses, which are indicative of port scanning attempts.


11. Extract Specific Fields for Analysis

tshark -r sample.pcap -T fields -e frame.time -e ip.src -e ip.dst -e tcp.srcport -e tcp.dstport
  • Explanation: Extracts key fields like timestamp, source/destination IPs, and ports for deeper analysis or reporting.


12. Detect ICMP Tunneling

tshark -r sample.pcap -Y "icmp" -T fields -e frame.time -e ip.src -e ip.dst -e icmp.type -e frame.len
  • Explanation: Analyses ICMP traffic for unusually large packet sizes or frequent activity, which may indicate data tunnelling.


13. Filter TLS Traffic

tshark -r sample.pcap -Y "ssl" -T fields -e frame.time -e ip.src -e ip.dst -e ssl.handshake.ciphersuite
  • Explanation: Displays TLS/SSL traffic, including cipher suites, which may help detect anomalous encrypted communication.


14. Identify Unusual DNS Responses

tshark -r sample.pcap -Y "dns.flags.response == 1 and dns.a"
  • Explanation: Focuses on DNS responses, highlighting resolved IP addresses that may link to malicious domains.


15. Export Traffic to a New PCAP File

tshark -r sample.pcap -Y "ip.addr == 192.168.1.10" -w filtered.pcap
  • Explanation: Filters traffic for a specific condition (e.g., an IP address) and writes it to a new .pcap file for focused analysis.


16. Reassemble HTTP Objects

tshark -r sample.pcap --export-objects http,output_directory/
  • Explanation: Extracts files transferred via HTTP. Useful for recovering potentially malicious payloads or identifying stolen data.


17. Detect Unencrypted Credentials in Telnet

tshark -r sample.pcap -Y "telnet" -T fields -e frame.time -e ip.src -e ip.dst -e telnet.data
  • Explanation: Captures Telnet traffic to identify unencrypted credentials or commands transmitted.


18. Monitor RDP Traffic

tshark -r sample.pcap -Y "tcp.port == 3389"
  • Explanation: Analyses Remote Desktop Protocol (RDP) traffic, often targeted by attackers for brute force attempts or lateral movement.


19. Extract Malicious Traffic Using IoCs

tshark -r sample.pcap -Y "ip.addr == 203.0.113.5 or dns.qry.name contains 'malicious.com'"
  • Explanation: Filters traffic based on known Indicators of Compromise (IoCs), such as malicious IPs or domains.


20. Identify Traffic to Tor Nodes

tshark -r sample.pcap -Y "tcp.port == 9001 or tcp.port == 9030"
  • Explanation: Filters traffic to ports commonly associated with Tor entry or relay nodes, potentially indicating anonymised communication by ransomware.


21. Detect Suspicious Packet Rates

tshark -r sample.pcap -qz io,stat,1
  • Explanation: Summarises packet counts per second. Spikes may indicate scanning, DDoS, or other anomalies.


Notes:

  • Replace placeholders (e.g., 192.168.1.10, 203.0.113.5, malicious.com) with investigation-specific details.

  • Use threat intelligence feeds to refine filters with known IoCs.

These TShark queries provide a toolkit for performing network forensics on pcap files, helping uncover malicious activities or other suspicious behaviours.

PreviousTcpdump (Intermediate)NextNgrep

Last updated 4 months ago

Page cover image