


It lets you capture packet data from a live network, or read packets from a previously saved capture file, either printing a decoded form of those packets to the standard output or writing the packets to a file. As such, TShark’s manual page’s website provides the following description of the tool: The first resource I usually check out when learning a new tool or technique is the creator’s github - particularly the README files - or website.

This site is just as much of a learning resource for me as it is for you. If you’re unfamiliar with what this is, go do the Wireshark room first! Task 1: Pre-ReqsĪs opposed to walkthrough posts created by others, I am not going to copy down what was written by the room’s author, m4lwhere (also, check out their site: plenty of really good resources). Due to this, if you are unfamiliar with Wireshark, do the Wireshark room first before proceeding to this room. Today’s post is a walkthrough of the TShark walkthrough on TryHackMe.īefore jumping in, a quick note: TShark is a tool that helps you perform network analysis, packet captures, etc., which is usually done through Wireshark.
