- Lab
- Core Tech

TShark Automation and Encrypted Traffic Decryption
Master the fundamentals of network traffic analysis using TShark's powerful automation and decryption capabilities. You'll start by automating packet capture processes with capture and display filters, then extract specific packet fields into structured formats for analysis. From there, you'll decrypt HTTPS traffic using SSL/TLS key log files, analyze decrypted HTTP requests and responses, and extract sensitive information from encrypted communications. To finish off, you will demonstrate how to document and troubleshoot common decryption issues, all while working with real-world CarvedRock web application traffic essential for security investigations and troubleshooting. ### Final Outcome After completing the TShark automation and decryption lab, you will be able to: - Automate packet capture with TShark - Extract and export packet data in structured formats - Successfully decrypt HTTPS traffic using SSL/TLS keys - Analyze decrypted application-layer data - Extract sensitive information from encrypted traffic - Document and troubleshoot decryption processes

Path Info
Table of Contents
-
Challenge
Decrypt and Analyze Encrypted Network Traffic
You'll configure TShark to decrypt HTTPS traffic using a provided key log file. You'll analyze the decrypted HTTP requests and responses for application-layer details, and extract specific sensitive information from decrypted web traffic. You'll also document the decryption process and identify common reasons for decryption failure. By the end, you'll master the techniques needed to analyze encrypted traffic in production environments.
-
Challenge
Automate Packet Capture and Data Extraction Using TShark
You'll master TShark's automation capabilities by capturing live network traffic on specific interfaces, applying both capture and display filters, and extracting specific packet fields into structured formats. You'll verify the integrity of your captures using capinfos and prepare data for analysis. By the end, you'll understand how to use TShark for automated network monitoring and data extraction.
-
Challenge
The Last Objective
Welcome to the final objective! This is your last chance to experiment in the environment.
What's a lab?
Hands-on Labs are real environments created by industry experts to help you learn. These environments help you gain knowledge and experience, practice without compromising your system, test without risk, destroy without fear, and let you learn from your mistakes. Hands-on Labs: practice your skills before delivering in the real world.
Provided environment for hands-on practice
We will provide the credentials and environment necessary for you to practice right within your browser.
Guided walkthrough
Follow along with the author’s guided walkthrough and build something new in your provided environment!
Did you know?
On average, you retain 75% more of your learning if you get time for practice.