Lesson 26 of 60 intermediate

Packet Capture & Troubleshooting Flow

See the truth instead of guessing

Open interactive version (quiz + challenge)

Real-world analogy

A packet capture is CCTV footage for the network. If you trust only what users say, you’ll chase ghosts. If you watch the footage, you see exactly which car (packet) left, which intersection (hop) it died at, and which rule (firewall) blocked it.

What is it?

Packet capture turns ‘I think’ into ‘I observed.’ Used responsibly, it’s one of the single biggest differentiators between juniors who guess and juniors who win promotions.

Real-world relevance

An app team insists the firewall is dropping their API. You capture: SYN leaves the client, no response arrives. tracert dies two hops before the firewall. Not a firewall problem at all — a broken route. Evidence reframes the whole conversation.

Key points

Code example

// Evidence-driven network triage

Step 1 — confirm layer symptoms
  ipconfig, ping, tracert, nslookup, Test-NetConnection

Step 2 — capture at the client
  Wireshark on client NIC
  Filter: ip host <server> and tcp port <port>

Step 3 — capture at the server or mirror port
  tcpdump -i <iface> host <client> and port <port> -w out.pcap

Step 4 — compare
  - SYN seen at client and at server?
  - SYN/ACK returned?
  - RST (who sent it — client, firewall, or server)?
  - TLS handshake complete?

Step 5 — escalate with evidence
  "Attached pcap shows SYN from 10.1.1.10 reaches 10.2.2.20:443,
   RST originates from the firewall pair per IP in capture at hop X.
   Please verify rule XYZ."

Line-by-line walkthrough

  1. 1. Evidence-driven triage
  2. 2. Step 1 — confirm layer symptoms
  3. 3. Step 2 — client-side capture
  4. 4. Client Wireshark filter
  5. 5. Step 3 — server/mirror capture
  6. 6. tcpdump on the server
  7. 7. Step 4 — compare captures
  8. 8. SYN observed at both ends?
  9. 9. SYN/ACK returned?
  10. 10. Who sent the RST
  11. 11. TLS handshake completion
  12. 12. Step 5 — escalate with evidence
  13. 13. Example escalation message

Spot the bug

Ticket: 'HTTPS to portal fails intermittently.'
Junior reruns ping a few times, shrugs, and closes the ticket as 'no issue reproduced'.
Need a hint?
What tool would give you definitive evidence across intermittent failures?
Show answer
Run a time-bounded Wireshark/tcpdump with filters for the specific host and port. Correlate capture timestamps with user failure times. Share the PCAP with the firewall or app team. Ping alone does not diagnose TLS, application, or firewall state.

Explain like I'm 5

You can guess what’s wrong, or you can watch the security tape. The tape doesn’t lie, doesn’t get tired, and shows exactly where the criminal (packet) dropped the bag (connection).

Fun fact

Wireshark’s ancestor was called Ethereal and was created in 1998. It is now one of the most widely used network tools on earth — trusted by hobbyists, Fortune 500 SOCs, and government incident responders alike.

Hands-on challenge

Install Wireshark (free). Capture 30 seconds of your own traffic while opening a website. Find the TCP 3-way handshake and the TLS ClientHello. Screenshot them. This is interview-worthy evidence of hands-on work.

More resources

Open interactive version (quiz + challenge) ← Back to course: IT Jobs Bootcamp