Skip to main content
NEW · APP STORE Now on iOS · macOS · iPad Android & Windows soon GET IT
Prompts Network Traffic Analysis with TShark

agent security skill risk: medium

Network Traffic Analysis with TShark

The prompt describes steps to automate PCAP analysis using tshark and pyshark: extract protocol statistics and top talkers, detect suspicious flows, extract IOCs, analyze DNS traff…

SKILL 4 files · 2 folders

SKILL.md
---
name: performing-network-traffic-analysis-with-tshark
description: "Automate network traffic analysis using tshark and pyshark for protocol statistics, suspicious flow detection,"
---
# Performing Network Traffic Analysis with TShark

## Overview

This skill automates packet capture analysis using tshark (Wireshark CLI) and pyshark (Python wrapper). It extracts protocol distribution statistics, identifies suspicious network flows (port scans, beaconing, data exfiltration), extracts IOCs (IPs, domains, URLs), and detects DNS tunneling patterns from PCAP files.


## When to Use

- When conducting security assessments that involve performing network traffic analysis with tshark
- When following incident response procedures for related security events
- When performing scheduled security testing or auditing activities
- When validating security controls through hands-on testing

## Prerequisites

- tshark (Wireshark CLI) installed and in PATH
- Python 3.8+ with pyshark library
- PCAP or PCAPNG capture file for analysis

## Steps

1. **Extract Protocol Statistics** — Generate protocol hierarchy and conversation statistics from the capture
2. **Identify Top Talkers** — Rank source/destination IPs by volume and connection count
3. **Detect Suspicious Flows** — Flag port scanning patterns, unusual port usage, and high-frequency connections
4. **Extract Network IOCs** — Pull unique IPs, domains from DNS queries, and URLs from HTTP traffic
5. **Analyze DNS Traffic** — Detect DNS tunneling via high-entropy subdomain queries and excessive TXT records
6. **Generate Analysis Report** — Produce structured report with flow summaries and threat indicators

## Expected Output

- JSON report with protocol statistics and top talkers
- Suspicious flow detections with severity ratings
- Extracted IOCs (IPs, domains, URLs)
- DNS anomaly analysis results

REQUIRED CONTEXT

  • PCAP or PCAPNG capture file

OPTIONAL CONTEXT

  • tshark installed in PATH
  • Python 3.8+ with pyshark

TOOLS REQUIRED

  • tshark
  • pyshark

EXPECTED OUTPUT

Format
structured_report
Schema
bullet_list · JSON report with protocol statistics and top talkers, Suspicious flow detections with severity ratings, Extracted IOCs (IPs, domains, URLs), DNS anomaly analysis results
Constraints
  • JSON report with protocol statistics and top talkers
  • suspicious flow detections with severity ratings
  • extracted IOCs (IPs, domains, URLs)
  • DNS anomaly analysis results

SUCCESS CRITERIA

  • Extract Protocol Statistics
  • Identify Top Talkers
  • Detect Suspicious Flows
  • Extract Network IOCs
  • Analyze DNS Traffic
  • Generate Analysis Report

CAVEATS

Dependencies
  • tshark (Wireshark CLI) installed and in PATH
  • Python 3.8+ with pyshark library
  • PCAP or PCAPNG capture file for analysis
Missing context
  • Exact tshark or pyshark commands or code for each step
  • Precise JSON schema or structure for the report
Ambiguities
  • The description field is truncated after 'suspicious flow detection,'

QUALITY

OVERALL
0.65
CLARITY
0.75
SPECIFICITY
0.55
REUSABILITY
0.65
COMPLETENESS
0.70

IMPROVEMENT SUGGESTIONS

  • Complete the truncated description sentence
  • Add concrete command examples or pseudocode under each step

USAGE

Copy the prompt above and paste it into your AI of choice — Claude, ChatGPT, Gemini, or anywhere else you're working. Replace any placeholder sections with your own context, then ask for the output.

MORE FOR AGENT