Wireshark is the reference tool for packet capture and protocol analysis. A CySA+ analyst uses it daily to investigate suspicious flows, decode application protocols, extract files from streams, and build IOCs from captured C2 traffic.
Why it matters:
- Over 3,000 protocol dissectors — HTTP, TLS, SMB, DNS, Kerberos, RDP, MQTT, industrial protocols (Modbus, S7).
- Display filters are precise and chainable:
tcp.port == 443 && tls.handshake.type == 1. - Follow Stream reconstructs an entire TCP/UDP conversation in a readable form.
- Export Objects pulls files transferred over HTTP/SMB/FTP straight from a PCAP — great for malware retrieval.
- Statistics → Conversations / IO Graphs / Expert Info highlight beaconing patterns and protocol anomalies.