
This is not an exhaustive or all-encompassing tutorial, but hopefully will help to shed light on the steps that most people might take when trying to pinpoint details about a particular application or packet stream on the network. What follows is a basic walkthrough of some of the steps you might follow when undertaking a preliminary investigation of a specific target on your network, and how it might benefit you depending on the objective in mind. It is a freeware tool that, once mastered, can provide valuable insight into your environment, allowing you to see what’s happening on your network. Wireshark is a very useful tool for information security professionals and is thought of by many as the de facto standard in network packet and protocol analysis.
