

Wireshark's display filter accepts an expression, and it works as intended.įigure 4. Wireshark's display filter offering suggestions based on what you type.įigure 3. If the display filter bar turns yellow, the expression has been accepted, but it will probably not work as intended.įigure 2. If the display filter bar turns green, the expression has been accepted and should work properly. While the display filter bar remains red, the expression is not yet accepted. If you type anything in the display filter, Wireshark offers a list of suggestions based on the text you have typed. Location of the display filter in Wireshark. This is where you type expressions to filter the frames, IP packets, or TCP segments that Wireshark displays from a pcap.įigure 1. Wireshark's display filter a bar located right above the column display section. Proper use of the Wireshark display filter can help people quickly find these indicators. Security professionals often document indicators related to Windows infection traffic such as URLs, domain names, IP addresses, protocols, and ports.

These indicators are often referred to as Indicators of Compromise (IOCs). Indicators consist of information derived from network traffic that relates to the infection. These infections can follow many different paths before the malware, usually a Windows executable file, infects a Windows host. This tutorial uses examples of Windows infection traffic from commodity malware distributed through mass-distribution methods like malicious spam (malspam) or web traffic.
