Learn packet analysis with challenging Wireshark labs (+25 advanced PCAP case-studies) !

PCAP Search

From the PCAP list you search through all your files, public files, and files that you have read access to

PCAP search

You can search by PCAP ID. The PCAP ID uniquely identifies your PCAP in the system.

_id:ZmFzdC1vcGVuLnBjYXBu

By using the username field you can search for PCAPs uploaded by a certain user.

username: john

You can search files via their metadata. For example, meta information extracted from the PCAP. Metadata search allows you to use Elastic Search query strings to search through your PCAPs.

You can search for exact matches strings or date fields for ranges.

  • Original PCAP file name: origname:"fast-open.pcapng"
  • SHA1: sha1:"34e9e6c2839ff461b70f815515cb6c3cd1551fb3"
  • Data bit rate range: databitrate: [1000 TO *]
  • File size: filesize: [90000 TO *]

Bitrate Search

Filesize Search

By using wildcard search you can search in multiple fields at once using a prefix.

Wildcard Search

By using tagname you can search for PCAPs with a specific tag associated with them.

tagname: sharkfest2019

Indexed search ⚡️

Do an instant deep packet search through all your PCAPs at once

Indexed search leverages the index created for the PCAPs to search through the packets. Indexed search only supports field names that are indexed. You can use normal display filters to search through the PCAPs.

  • Certain IP adresses: ip.src == 1.1.1.1 or ip.dst == 1.1.1.1
  • All PCAPs with retransmissions: tcp.analysis.retransmission > 0
  • All PCAPs having ICMP packets: ip.proto == 1

The resulting PCAP list will include a column that shows how many of the packets in the PCAPs matched your query. To see which field names are indexed open the indicies view of the PCAP or the indexer profile settings page

Indexed Search

Caveats

Different PCAPs might be indexed with different indexer configurations. If a field was not index by the default indexing process, reindexing might be necessary.

Some display filters may have surprising results or may not work. In general protocol or field-existence is not indexed. This means that the following filters that work in the packet list, do not work in the PCAP list:

  • tcp
  • http
  • tcp.analysis.flags

In the PCAP list, you always need to compare to a value. The above filters may be rewritten as follows to get a similar result:

  • ip.proto == 6 or ipv6.next_header == 6
  • tcp.srcport == 80 or tcp.dstport == 80 or tcp.srcport == 443 or tcp.dstport == 443
  • tcp.analysis.flags == 1

Filters that contains special characters like : or \ may not work, you can try to substitute the character with a wildcard:

  • eth.src== "00\:10\:a4\:de\:b5\:d0"
  • eth.src == "00\:07\:50*"
  • ipv6.src == "fe80\:\:b2ea\:bcff\:fe45\:b870"