

As obvious a display level filter will not affect the packets being captured. Packets can be filtered based on many parameters like IP address, port number or protocol at capture level or at display level. Since there are a lot of packets going in and out every second, looking at all of them or searching for one type of packets will be tedious. The top pane shows source address(IPv4 or IPv6) destination address, source and destination ports, protocol to which the packet belongs to and additional information about the packet. The top pane shows real-time traffic, the middle one shows information about the chosen packet and the bottom pane shows the raw packet data. To start sniffing select one interface and click on the bluefin icon on the top left. This window shows the interfaces on your device.

Getting Up and Running: After installation launch Wireshark, approve the administrator or superuser privileges and you will be presented with a window that looks like this: Currently, Wireshark uses NMAP’s Packet Capture library(called npcap).

By default, Wireshark captures on-device data only, but it can capture almost all the data on its LAN if run in promiscuous mode. Wireshark captures the data coming or going through the NICs on its device by using an underlying packet capture library.
