<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:cc="http://cyber.law.harvard.edu/rss/creativeCommonsRssModule.html">
    <channel>
        <title><![CDATA[Stories by Gavandeparmeshwar on Medium]]></title>
        <description><![CDATA[Stories by Gavandeparmeshwar on Medium]]></description>
        <link>https://medium.com/@gavandeparmeshwar100?source=rss-601a7b9cb8bd------2</link>
        <image>
            <url>https://cdn-images-1.medium.com/fit/c/150/150/0*-wJz1yMhTdxfmDTv</url>
            <title>Stories by Gavandeparmeshwar on Medium</title>
            <link>https://medium.com/@gavandeparmeshwar100?source=rss-601a7b9cb8bd------2</link>
        </image>
        <generator>Medium</generator>
        <lastBuildDate>Tue, 19 May 2026 19:06:34 GMT</lastBuildDate>
        <atom:link href="https://medium.com/@gavandeparmeshwar100/feed" rel="self" type="application/rss+xml"/>
        <webMaster><![CDATA[yourfriends@medium.com]]></webMaster>
        <atom:link href="http://medium.superfeedr.com" rel="hub"/>
        <item>
            <title><![CDATA[Tshark: The Basic]]></title>
            <link>https://medium.com/@gavandeparmeshwar100/tshark-the-basic-da9cf2e43de8?source=rss-601a7b9cb8bd------2</link>
            <guid isPermaLink="false">https://medium.com/p/da9cf2e43de8</guid>
            <category><![CDATA[tryhackme-writeup]]></category>
            <category><![CDATA[tryhackme-walkthrough]]></category>
            <category><![CDATA[tshark-tryhackme]]></category>
            <category><![CDATA[tshark-basic]]></category>
            <category><![CDATA[tshark-with-parmeshwar]]></category>
            <dc:creator><![CDATA[Gavandeparmeshwar]]></dc:creator>
            <pubDate>Fri, 23 May 2025 03:59:43 GMT</pubDate>
            <atom:updated>2025-05-23T03:59:43.717Z</atom:updated>
            <content:encoded><![CDATA[<p>TShark is an open-source command-line network traffic analyser. It is created by the Wireshark developers and has most of the features of Wireshark. It is commonly used as a command-line version of Wireshark.</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/344/0*ZOyrr10MyLj1ng83" /></figure><p><strong>Command-Line Packet Analysis Hints</strong></p><p>TShark is a text-based tool, and it is suitable for data carving, in-depth packet analysis, and automation with scripts. This strength and flexibility come out of the nature of the CLI tools, as the produced/processed data can be pipelined to additional tools. The most common tools used in packet analysis are listed below.</p><p>1.Find the task files on the Desktop in the “exercise-files” folder.</p><p>2. What is the “RIPEMD160” value?</p><p>Ans: 6ef5f0c165a1db4a3c1ad3116b0c5bcc0cf6b9ab7</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/752/1*A3eIpqaT8rFX_OjhdSyN1w.png" /></figure><p>3. What is the installed TShark version in the given VM?</p><p>Ans : Use command &gt; <strong>sudo tshark -v</strong></p><p>4. What is the number of available interfaces in the given VM?</p><p>Ans: use command &gt; <strong>sudo tshark -D</strong></p><p>Both Answers are present in below picture</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/702/1*duWn_I_j4o4O-eRW_2BNLQ.png" /></figure><p>5.What are the assigned TCP flags in the 29th packet?</p><p>For that I have used a command &gt; sudo tshark -r demo.pcapng -c 29 -V</p><p>Ans: PSH , ACK</p><p>I can find the answer without verbose mode also .</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/763/1*j3hHqnsme2q6h8sBHxjWaw.png" /></figure><p>6. What is the “Ack” value of the 25th packet?</p><p>Ans:12421</p><p>for this I used without verbose mode which direct necessary info in single line</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/940/1*MGftsoZtPTi1QWXs_l4Sqw.png" /></figure><p>Command&gt; sudo tshark -r demo.pcapng -c 25</p><p>7.What is the “Window size value” of the 9th packet?</p><p>Ans: 9660</p><figure><img alt="" src="https://cdn-images-1.medium.com/max/940/1*OsGoQWNob_qx-bAEIwPNfg.png" /></figure><p><strong>Capture Condition Parameters</strong></p><p>As a network sniffer and packet analyser, TShark can be configured to count packets and stop at a specific point or run in a loop structure. The most common parameters are explained below.</p><p><strong>Packet Filtering Parameters | Capture &amp; Display Filters</strong></p><p>There are two dimensions of packet filtering in TShark; live (capture) and post-capture (display) filtering. These two dimensions can be filtered with two different approaches; using a predefined syntax or Berkeley Packet Filters (BPF). TShark supports both, so you can use Wireshark filters and BPF to filter traffic. As mentioned earlier, TShark is a command-line version of Wireshark, so we will need to use different filters for capturing and filtering packets.</p><p>8.What is the number of packets with SYN bytes?</p><p>Ans : 2</p><p>I have used command &gt;<strong>tshark -r demo.pcapng -Y “tcp.flags.syn == 1” | wc -l</strong></p><p>9. What is the number of packets sent to the IP address “10.10.10.10”?</p><p>Ans: 7</p><p>I have used command &gt;<strong>tshark -r demo.pcapng -Y “ip.dst == 10.10.10.10” | wc -l</strong></p><p>10.What is the number of packets with ACK bytes?</p><p>Ans: 8</p><p><strong>I have used this command &gt; tshark -r demo.pcapng -Y “tcp.flags.ack == 1” | wc -l</strong></p><p>11. What is the number of packets with a “65.208.228.223” IP address?</p><p><strong>Command:</strong></p><p><strong>tshark -r demo.pcapng -Y “ip.addr == 65.208.228.223” | wc -l</strong></p><p><strong>Answer 15: </strong>34</p><p><strong>Question 16: </strong>What is the number of packets with a “TCP port 3371”?</p><p><strong>Command:</strong></p><p><strong>tshark -r demo.pcapng -Y “tcp.port == 3371” | wc -l</strong></p><p><strong>Answer 16: </strong>7</p><p><strong>Question 17: </strong>What is the number of packets with a “145.254.160.237” IP address as a source address?</p><p><strong>Command:</strong></p><p><strong>tshark -r demo.pcapng -Y “ip.src == 145.254.160.237” | wc -l</strong></p><p><strong>Answer 17: </strong>20</p><p>Rerun the previous query and look at the output.</p><p><strong>Question 18: </strong>What is the packet number of the “Duplicate” packet?</p><p><strong>Command:</strong></p><p><strong>tshark -r demo.pcapng -Y ‘ip.src == 145.254.160.237 and udp.analysis.duplicate’ -T fields -e frame.number</strong></p><p><strong>Answer 18: </strong>37.</p><img src="https://medium.com/_/stat?event=post.clientViewed&referrerSource=full_rss&postId=da9cf2e43de8" width="1" height="1" alt="">]]></content:encoded>
        </item>
    </channel>
</rss>