Packet Capture & Troubleshooting Flow
See the truth instead of guessing
Open interactive version (quiz + challenge)Real-world analogy
A packet capture is CCTV footage for the network. If you trust only what users say, you’ll chase ghosts. If you watch the footage, you see exactly which car (packet) left, which intersection (hop) it died at, and which rule (firewall) blocked it.
What is it?
Packet capture turns ‘I think’ into ‘I observed.’ Used responsibly, it’s one of the single biggest differentiators between juniors who guess and juniors who win promotions.
Real-world relevance
An app team insists the firewall is dropping their API. You capture: SYN leaves the client, no response arrives. tracert dies two hops before the firewall. Not a firewall problem at all — a broken route. Evidence reframes the whole conversation.
Key points
- When to capture (and when not to) — Capture when: logs disagree with users, intermittent issues, vendor demands evidence, suspected performance issues. Don’t capture casually on production without approval — capture files contain sensitive data and network load.
- Wireshark basics — Pick the correct interface → capture with a filter (ip host 10.0.0.5 and port 443) → stop when you’ve seen the failure → save. Display filters narrow after capture; capture filters narrow during.
- Handshake you must recognize — TCP 3-way handshake: SYN → SYN/ACK → ACK. TLS handshake: ClientHello → ServerHello → certificates → keys → Finished. Missing pieces point to the layer at fault (network vs firewall vs TLS).
- Common patterns in captures — RST from firewall = policy drop. ICMP ‘unreachable’ = no route/ACL deny. Repeated SYNs with no SYN/ACK = path blocked before server. TLS alert = cert/name mismatch or cipher issue.
- tcpdump for servers — On Linux servers where Wireshark UI isn’t available: tcpdump -i eth0 -w capture.pcap host 10.0.0.5 and port 443. Copy to your laptop and open in Wireshark. Standard for senior-friendly evidence.
- Evidence-driven escalation — ‘Firewall team, here’s a 20-second pcap showing our SYN reaches 10.0.0.5:443 and we receive TCP RST within 2ms’ gets action in minutes. ‘App is broken, please help’ gets ignored for hours.
- Respect privacy and scope — Captures often contain credentials, tokens, personal data. Limit scope (host/port filters), store securely, share only with approved people, and delete after the case closes. In regulated environments, capture sensitivities are real.
- Baselines > snapshots — A single capture tells you what you saw. A baseline capture from a known-good time tells you what changed. If you can capture during peace, you’ll diagnose wars faster.
Code example
// Evidence-driven network triage
Step 1 — confirm layer symptoms
ipconfig, ping, tracert, nslookup, Test-NetConnection
Step 2 — capture at the client
Wireshark on client NIC
Filter: ip host <server> and tcp port <port>
Step 3 — capture at the server or mirror port
tcpdump -i <iface> host <client> and port <port> -w out.pcap
Step 4 — compare
- SYN seen at client and at server?
- SYN/ACK returned?
- RST (who sent it — client, firewall, or server)?
- TLS handshake complete?
Step 5 — escalate with evidence
"Attached pcap shows SYN from 10.1.1.10 reaches 10.2.2.20:443,
RST originates from the firewall pair per IP in capture at hop X.
Please verify rule XYZ."Line-by-line walkthrough
- 1. Evidence-driven triage
- 2. Step 1 — confirm layer symptoms
- 3. Step 2 — client-side capture
- 4. Client Wireshark filter
- 5. Step 3 — server/mirror capture
- 6. tcpdump on the server
- 7. Step 4 — compare captures
- 8. SYN observed at both ends?
- 9. SYN/ACK returned?
- 10. Who sent the RST
- 11. TLS handshake completion
- 12. Step 5 — escalate with evidence
- 13. Example escalation message
Spot the bug
Ticket: 'HTTPS to portal fails intermittently.'
Junior reruns ping a few times, shrugs, and closes the ticket as 'no issue reproduced'.Need a hint?
What tool would give you definitive evidence across intermittent failures?
Show answer
Run a time-bounded Wireshark/tcpdump with filters for the specific host and port. Correlate capture timestamps with user failure times. Share the PCAP with the firewall or app team. Ping alone does not diagnose TLS, application, or firewall state.
Explain like I'm 5
You can guess what’s wrong, or you can watch the security tape. The tape doesn’t lie, doesn’t get tired, and shows exactly where the criminal (packet) dropped the bag (connection).
Fun fact
Wireshark’s ancestor was called Ethereal and was created in 1998. It is now one of the most widely used network tools on earth — trusted by hobbyists, Fortune 500 SOCs, and government incident responders alike.
Hands-on challenge
Install Wireshark (free). Capture 30 seconds of your own traffic while opening a website. Find the TCP 3-way handshake and the TLS ClientHello. Screenshot them. This is interview-worthy evidence of hands-on work.
More resources
- Wireshark official site (Wireshark)
- tcpdump manual (tcpdump.org)
- Wireshark for beginners (Chris Greer)