Home > Tutorials > Wireshark Tutorial for Beginners (Mac & Windows)

Wireshark Tutorial for Beginners (Mac & Windows)

This Wireshark tutorial for beginners shows you how to capture packets, filter out noise, and quickly understand what’s happening on your network on Mac or Windows—without the confusing, meaningless theory.

In other words, you’ll learn what to click, what it means, and what to look for when something feels slow, broken, or suspicious.

Important: Only capture traffic on networks and devices you own or have permission to analyze. Packet captures can contain sensitive data, so store PCAP files carefully.

Helpful next steps: If you don’t know your local IP yet, check your network settings first. You can also bookmark your main troubleshooting guide for later.

What you’ll learn in this Wireshark tutorial for beginners

  • How to install Wireshark (Mac + Windows)
  • Which network interface to capture from (Ethernet vs Wi-Fi)
  • How to capture a clean PCAP you can actually learn from
  • The fastest way to get a bird’s-eye view using Statistics → Conversations
  • Beginner Wireshark filters (HTTP, HTTPS/443, flagged packets, resets, SYN packets)
  • How to use Follow Stream to see what was exchanged
  • How coloring rules help you spot potential issues faster

Wireshark tutorial for beginners: Getting started

Install Wireshark (Mac and Windows)

Wireshark is free to download and use on both Mac and Windows. On macOS, the installer may prompt you to add an additional capture component during setup. Before you start capturing, skim any installer notes or readme files you see.

Pick the right interface (Ethernet vs Wi-Fi)

Next, choose which interface to capture from. Make sure the device you’re using is connected to the network you want to analyze.

For a clean beginner capture, Ethernet is usually the easiest. However, Wi-Fi often works great on Macs, while some Windows setups can require specific drivers or compatible hardware.

Wireshark tutorial for beginners showing network interface capture options (Ethernet vs Wi-Fi)
NIC Capture Options in Wireshark

Capture packets in Wireshark (beginner method)

When you double-click an interface (like Ethernet), Wireshark starts capturing immediately. To make your PCAP useful, generate the exact traffic you want to troubleshoot while the capture runs.

  1. Start the capture on the interface you’re actively using.
  2. Immediately reproduce the issue (open a specific website, stream a video, sign in to an app, etc.).
  3. Let it run long enough to capture the behavior (often 15–60 seconds for simple tests).
  4. Click the red Stop button (top-left).
  5. Save the PCAP if it matters, or close without saving if it was just practice.
Wireshark tutorial for beginners: starting a packet capture and stopping the capture
Starting a Packet Capture in Wireshark

Wireshark tutorial for beginners: Analyze a PCAP without getting overwhelmed

Understand packet rows (what you’re looking at)

Each row in Wireshark represents one packet. When your device loads a webpage, downloads a file, or syncs an app, it moves data across the network in packets.

Meanwhile, your capture will also include background noise (routers, smart devices, app updates, keep-alives). Because of that, filtering is the skill that makes Wireshark “click.”

Bird’s-eye view: Statistics → Conversations

For most beginners, the best starting point is Statistics → Conversations. This view summarizes “who talked to who” in your PCAP, so you can spot big transfers, long-running sessions, and unknown endpoints faster.

  • Address A ↔ Address B
  • Packets sent in each direction
  • Total bytes transferred
  • Conversation duration
Wireshark tutorial for beginners: using Statistics to view Conversations in a PCAP
Viewing All Conversations in a Wireshark Packet Capture (PCAP)

Right-click filtering (fastest way to drill down)

Next, right-click an IP address (in Conversations or in the packet list) and use Apply as Filter. This is the fastest way to focus on the traffic you actually care about—without memorizing display filter syntax.

Wireshark tutorial for beginners: right-click an IP and apply as filter from Conversations view
Right-Clicking to Apply a Filter from Conversation View in Wireshark

Wireshark filters for beginners (the ones that matter)

Filter 1: HTTP traffic (unencrypted)

Start with http. If the filter turns green, it’s valid. Then, use Follow Stream to see the full exchange for that specific flow.

  • Display filter: http
  • Next step: Right-click a packet → Follow → HTTP Stream
Wireshark tutorial for beginners: applying the HTTP display filter
Applying an HTTP Filter in Wireshark

Filter 2: HTTPS traffic (TCP port 443)

Most secure web traffic uses TCP port 443. Although you usually can’t read the encrypted payload, you can still learn a lot from endpoints, timing, and patterns.

  • Display filter: tcp.port == 443
Wireshark tutorial for beginners: filtering HTTPS traffic using tcp.port == 443
Filtering Secure Traffic on Port 443 in Wireshark

Quick note: In practice today, port 80 is typically HTTP and port 443 is typically HTTPS. That’s why “http” + Follow Stream can show readable data, while HTTPS focuses more on metadata and patterns.

Filter 3: Hide background protocol noise

To reduce clutter, remove common background protocols with:

!(arp or stp or lldp or cdp)

Filter 4: Find SYN packets (new TCP connections)

To highlight new connection attempts, use:

tcp.flags.syn == 1

Filter 5: Show Wireshark analysis flags

For a “show me the weird stuff” view, start with:

tcp.analysis.flags

Filter 6: Find TCP resets (RST packets)

If connections keep failing, check resets. This isn’t automatically “malware,” but it is often a useful troubleshooting clue:

tcp.flags.reset == 1

Wireshark beginner tip: Add custom filter buttons

To save time, create custom filter buttons for the filters you use repeatedly.

  1. Type a filter (example: tcp.port == 443).
  2. Click the + icon to the right of the filter toolbar.
  3. Name the button (example: HTTPS).
  4. Save it, then reuse it anytime.
Wireshark tutorial for beginners: creating custom display filter buttons
Creating a Custom Button to Quickly Filter Secure Traffic in Wireshark

Wireshark coloring rules (what the colors mean)

Wireshark’s coloring rules act like a built-in visual hint system. For example, certain colors often correlate with retransmissions, resets, or other patterns Wireshark thinks you should inspect. Review them via View → Coloring Rules.

Wireshark tutorial for beginners: viewing default coloring rules
A List of the Default Coloring Rules in Wireshark

Follow Stream in Wireshark (see what was exchanged)

After you filter down to relevant packets, right-click one and choose Follow → TCP Stream (or HTTP Stream when applicable). This compiles the conversation for that flow, which makes it much easier to understand what happened.

Wireshark tutorial for beginners: examining packet contents and following streams
Examining the Content of a Packet in Wireshark

Practical Wireshark training for beginners (safe PCAPs)

Practice with real PCAPs from Malware-Traffic-Analysis.net

If you want to improve fast, practice with known “real world” packet captures. This site provides PCAPs tied to specific incidents plus objectives, so you can investigate with structure and then compare your results to the provided analysis.

Tip: Start with Conversations, identify the main IPs involved, apply a filter, and then follow streams as needed.

Frequently Asked Questions

Is Wireshark safe to use as a beginner?

Yes—as long as you only capture traffic on networks and devices you own or have permission to analyze. Wireshark is a legitimate analysis tool, but packet captures can include sensitive information, so store PCAPs carefully.

What’s the best way to start analyzing a capture (PCAP) in Wireshark?

A fast Wireshark tutorial for beginners workflow is: Statistics → Conversations for a bird’s-eye view, then right-click an IP and Apply as Filter (A to/from any) to drill down. After that, use Follow Stream to view full exchanges for specific flows.

How do I find unencrypted traffic in Wireshark?

Use the display filter “http” to surface HTTP traffic. Then right-click a packet and choose Follow → HTTP Stream to see what was exchanged in that stream (when applicable).

What filter shows secure web traffic (HTTPS)?

Most HTTPS traffic uses TCP port 443. Use the display filter “tcp.port == 443” to focus on that traffic. While the payload is encrypted, you can still learn a lot from connection patterns and endpoints.

Why do I see red/black/colored lines in Wireshark?

Those are coloring rules. Wireshark highlights certain packet patterns it thinks may be worth investigating (retransmissions, resets, analysis flags, etc.). Review them in View → Coloring Rules.

Anson Alexander

Anson Alexander is a technical educator and problem-solver with over 320,000 YouTube subscribers and 60+ million views. He creates hands-on tutorials focused on real-world fixes for operating systems, software, and unsupported configurations, with an emphasis on solutions that go beyond official documentation.

View all posts