I build my own profiles for Wireshark when I
need to get more logic out of Wireshark, Some of these profiles are
published here for anyone to use. It will speed things up quite a
bit, when you analyse differet kinds of traffic. The profiles can be
used on all OS type systems where Wireshark can run.
JA3-JA3S
This will display all JA3 and JA3S and make them easy to find.

Radius
Related to all the fuss about
Blast Radius
attacks. I had to build a profile for Wireshark that gave me more
logic to into the Radius protocoll. With this I found a lot of
Brute-force attacks originating from Russian IP's. Something you
easily will miss with normal default profiles for Wireshark. You can
also spot 2FA auth with this and a lot more.

MQTT
MQTT is a communication protocol with features specifically targeted
at IoT solutions. It is also used by APT groups as C&C for malware.
I have made some basic filters for analysis of the MQTT traffic. The
below sample is based on a brute force attacks. I know that a lot of
OT/IOT devises are part of the
BIMP-BotNET

IEC-104
IEC-104 is a transmission protocols used for things like
controlling a powergrid.
When analysing this protocol i can recommend the documentation
TR-IEC104. Be aware that Wireshark do not interpet all element
types. So this is the best it can be for now.

IcedID TLS Inspection
Hunting for the malware framework IcedID
it is nessary to look for what names a certificate was issued with.
Quite often it it a self signed certificate with bogus names. like
this on with the name "localhost".

GQUIC or QUIC
Profile (Updated 21-11-2023)
Looking for information about QUIC ore GQUIC. The newest protocol
schould only be QUIC and was released in 2021 v.1. - GQUIC is
obsolete.

ICMP Profile
Hunting for ICMP tunneling is quite easy
with this Wireshark profile. Exampel of a pTunnel running below.

iSCSI profile
Hunting for iSCSI auth traffic and authentications. Easy to spot
with this profile

DHCP Profile
Often you will hunt for a rough DHCP server placed on your network.
This profile will make this very easy.
Optimized for Wiresharek 3.x versions.

DNS Profile
This will make DNS identification easy and bring DNS traffic to life
in Wireshark

SMB Profile
(Many updates for this profile as of 02-01-2020)
This will bring the analysis of SMB, SMB2 and SMB3 network traffic
to life in Wireshark. What you typically is looking for, is right
there... More information about MS implementation
here

DDOS profile (Updated 03-03-2022)
Based on my work for an ISP and the manage of Advanced DDOS
mitigation. This is based on known DDOS attacks. You can analyze 56
types of known DDOS attacks quite fast.

Magic numbers
profile
Based on file types and there magic numbers it is easy to look for
different file types in network traffic like exe files and so on,
hidden in network traffic.

Geolite2 databases for
Wireshark
Wireshark can do name resolution on captured traffic. For that you
need to sign up for Maxmind to get the free updated Maxmind
databases...Please do so.
You can get an older Maxmind databease from here.


ColarSoft Packet Replay
Colarsoft Packet Builder
Caploader
Moloch
Network Miner
Security Onion
SNORT IDS/IPS
SOF-ELK
SplitCap
Suricata IDS/IPS
TraceWrangler
Wazuh
Wireshark
Zeek
Port numbers
IPv4 Subnetting
Network Forensics and Analysis Poster
Poster Find Evidence
Poster Find Evil
Scapy
Security Onion
Sysmon
Tcpdump
VOIP Basics
Wireshark Display Filters
BPF
Filter syntax
Enum
Kibana
Netsh Trace
Nmap
nping
Nslookup SPF
OS TTL Fingerprint
Port list
PowerShell Commands
Local LAN NET bloks
SID
SMTP Relay Tjek
Google Tips
T-Shark
USB Boot Disk
Wireshark