Packet Capture Lab

DATE // 05.13.2026
OS // Arch Linux
TOOLS // Wireshark
Network Analysis Wireshark DNS HTTP TCP/IP Traffic Analysis
In this lab I captured and analyzed live network traffic on my Arch Linux machine using Wireshark. I examined DNS queries, intercepted unencrypted HTTP traffic, and mapped outbound TCP connection attempts — demonstrating how much sensitive data flows across a network in plain text, and why tools like Wireshark are essential for both attackers and defenders.
01 //

Objective

The goal of this lab was to get hands-on experience with packet capture and network traffic analysis — a core skill for SOC analysts, pen testers, and anyone working in network security. Specifically I aimed to:

• Capture live traffic on a real network interface
• Use display filters to isolate specific protocol traffic
• Identify DNS queries and understand passive background traffic
• Intercept and read plaintext HTTP data
• Map outbound TCP connection attempts using SYN packet analysis

02 //

Environment & Setup

This lab was performed on a personal machine running Arch Linux. No special lab environment or VMs were required — all traffic captured was from the host machine's own network activity.

  terminal — installation
# Install Wireshark
user@arch:~$ sudo pacman -S wireshark-qt

# Add user to wireshark group (avoids running as root)
user@arch:~$ sudo usermod -aG wireshark $USER

# Launch Wireshark
user@arch:~$ wireshark

Adding my user to the wireshark group is an important security practice — it allows packet capture without running Wireshark as root, following the principle of least privilege.

03 //

Methodology

I followed a structured approach — selecting the active interface, capturing traffic while browsing, then applying display filters to isolate and analyze specific protocol traffic.

1
Interface Selection
Opened Wireshark and identified the active network interface by looking for the live activity graph. Double-clicked to begin capture.
2
Traffic Generation
Browsed several websites during capture to generate realistic traffic. Also visited http://neverssl.com intentionally to generate unencrypted HTTP traffic for analysis.
3
DNS Filter Analysis
Applied display filter dns to isolate all domain name lookup traffic. Examined query/response pairs and noted domains contacted.
4
HTTP Filter Analysis
Applied display filter http to isolate unencrypted traffic. Inspected the Hypertext Transfer Protocol layer of GET requests to read plaintext headers.
5
TCP SYN Packet Analysis
Applied filter tcp.flags.syn == 1 to map all outbound connection attempts and identify every server the machine contacted during the capture window.
6
Save Capture File
Saved capture as capture1.pcap for documentation and future reference.
04 //

Findings

Finding 1 — Passive Background DNS Traffic
Informational

Applying the dns filter revealed that the machine was making DNS lookups to domains I never explicitly visited. The most notable was hulu.vortex — a CDN endpoint contacted automatically by the Hulu app running in the background, with no user interaction.

Filter Used:dns
Domains Observed:duckduckgo.com, hulu.vortex (CDN)
Takeaway:Devices generate DNS traffic passively. Background apps constantly phone home.
DNS Filter Photo 1 DNS Filter Photo 2 description
Finding 2 — Plaintext HTTP Traffic Exposure
High

Filtering for http traffic and inspecting a GET request to neverssl.com revealed fully readable HTTP headers in the packet's Hypertext Transfer Protocol layer — including Host, User-Agent, and Cookie fields. This data was transmitted with zero encryption, meaning anyone on the same network could intercept and read it.

Filter Used:http
Target:http://neverssl.com (intentionally unencrypted)
Data Exposed:Host, User-Agent, Cookie headers in plaintext
Risk:Session hijacking, credential theft on shared networks
description
Finding 3 — Outbound Connection Mapping via TCP SYN
Informational

Filtering for TCP SYN packets revealed every server the machine attempted to connect to during the capture window. Even during a short session, numerous outbound connections were initiated — many from background processes rather than direct user action. This technique is useful for baselining normal behavior and detecting anomalous outbound connections.

Filter Used:tcp.flags.syn == 1
Takeaway:SYN filtering is a fast way to map all servers a host is talking to
SOC Use Case:Detecting C2 beaconing or unauthorized outbound connections
description
05 //

Remediation & Recommendations

Always use HTTPS. Never transmit sensitive data over plain HTTP. Modern browsers flag HTTP sites — heed those warnings. Website owners should enforce HTTPS and implement HSTS.
Avoid public/untrusted WiFi for sensitive activity. On a shared network, anyone can run a packet capture like this one. Use a VPN on public networks.
Audit background application traffic. Applications contact external servers without user knowledge. Regularly review what processes are making network connections using tools like ss or netstat.
Use DNS over HTTPS (DoH). Standard DNS queries are unencrypted and visible to anyone on the network. DoH encrypts DNS traffic, preventing passive DNS surveillance.
06 //

Conclusion

This lab demonstrated that even routine browsing generates a significant amount of observable network traffic — much of it from background processes the user never directly initiated. The most critical finding was the ability to read plaintext HTTP headers in full, highlighting why unencrypted protocols are a serious risk on shared networks.

From a defensive perspective, this lab reinforced the importance of protocol encryption, network baselining, and continuous traffic monitoring. Understanding what normal traffic looks like is the foundation for detecting what isn't normal — a core skill for any SOC analyst.

Tools like Wireshark are equally valuable to attackers and defenders. This lab gave me practical experience on the defender side — but understanding the attacker's view of the same data is what makes this knowledge actionable.

Packet Capture Display Filtering DNS Analysis HTTP Interception TCP Analysis Security Reporting