{"id":170,"date":"2026-05-02T00:57:58","date_gmt":"2026-05-01T22:57:58","guid":{"rendered":"https:\/\/eryann.fr\/?p=170"},"modified":"2026-05-02T14:11:01","modified_gmt":"2026-05-02T12:11:01","slug":"fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies","status":"publish","type":"post","link":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\/","title":{"rendered":"Fiche wireshark : analyse du trafic r\u00e9seau et d\u00e9tection d\u2019anomalies"},"content":{"rendered":"\n<p>Pour les \u00e9tudiants en BTS CIEL ou SIO, <strong>Wireshark<\/strong> est un outil essentiel pour analyser le trafic r\u00e9seau.<br>Il permet de :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>observer les communications entre machines<\/li>\n\n\n\n<li>diagnostiquer un probl\u00e8me r\u00e9seau<\/li>\n\n\n\n<li>d\u00e9tecter des anomalies ou comportements suspects<\/li>\n\n\n\n<li>analyser des identifiants en clair (selon protocole)<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Commandes et filtres essentiels (bloc unique)<\/h2>\n\n\n\n<pre class=\"wp-block-code\"><code># =========================================================<br># FILTRES PAR PROTOCOLE<br># =========================================================<br><br>http<br>dns<br>tcp<br>udp<br>icmp<br>ftp<br>ssh<br><br># =========================================================<br># FILTRES PAR IP<br># =========================================================<br><br>ip.addr == 192.168.1.10<br>ip.src == 192.168.1.10<br>ip.dst == 192.168.1.1<br><br># =========================================================<br># FILTRES PAR MAC<br># =========================================================<br><br>eth.addr == 00:11:22:33:44:55<br>eth.src == 00:11:22:33:44:55<br>eth.dst == AA:BB:CC:DD:EE:FF<br><br># =========================================================<br># FILTRES PORT<br># =========================================================<br><br>tcp.port == 80<br>tcp.port == 22<br>udp.port == 53<br><br># =========================================================<br># FILTRES AVANCES<br># =========================================================<br><br>http.request<br>dns.query<br>tcp.flags.syn == 1<br>tcp.flags.reset == 1<br><br># =========================================================<br># COMBINAISONS<br># =========================================================<br><br>ip.addr == 192.168.1.10 &amp;&amp; tcp.port == 80<br>http &amp;&amp; ip.src == 192.168.1.10<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Explication d\u00e9taill\u00e9e<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. Fonctionnement de Wireshark<\/h3>\n\n\n\n<p>Wireshark capture les paquets r\u00e9seau et affiche :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>couche 2 \u2192 MAC<\/li>\n\n\n\n<li>couche 3 \u2192 IP<\/li>\n\n\n\n<li>couche 4 \u2192 TCP\/UDP<\/li>\n\n\n\n<li>couche 7 \u2192 protocole (HTTP, DNS\u2026)<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Suivi des communications (tr\u00e8s important)<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Suivre une session TCP<\/h3>\n\n\n\n<p>Dans Wireshark :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>clic droit sur un paquet<\/li>\n\n\n\n<li><strong>Follow \u2192 TCP Stream<\/strong><\/li>\n<\/ul>\n\n\n\n<p>Permet de voir :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>une conversation compl\u00e8te<\/li>\n\n\n\n<li>requ\u00eate + r\u00e9ponse<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Exemple HTTP<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>GET \/index.html HTTP\/1.1<br>Host: example.com<\/code><\/pre>\n\n\n\n<p>suivi complet :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>navigation web<\/li>\n\n\n\n<li>\u00e9changes client\/serveur<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Recherche de credentials (identifiants)<\/h2>\n\n\n\n<p> possible uniquement sur protocoles NON chiffr\u00e9s<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">HTTP (non s\u00e9curis\u00e9)<\/h3>\n\n\n\n<p>Filtre :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>http<\/code><\/pre>\n\n\n\n<p>Rechercher :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>username=admin&amp;password=1234<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">FTP<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>ftp<\/code><\/pre>\n\n\n\n<p>Exemple :<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>USER admin<br>PASS password123<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Telnet<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>telnet<\/code><\/pre>\n\n\n\n<p> identifiants en clair<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Important<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HTTPS \/ SSH \u2192 chiffr\u00e9s \u2192 non lisibles<\/li>\n\n\n\n<li>Wireshark montre seulement les m\u00e9tadonn\u00e9es<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Exemples de filtrage<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Filtrer un protocole<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>dns<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Filtrer une IP<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>ip.addr == 192.168.1.10<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Filtrer une communication pr\u00e9cise<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>ip.src == 192.168.1.10 &amp;&amp; tcp.port == 80<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Filtrer une MAC<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>eth.addr == 00:11:22:33:44:55<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Filtrer un scan r\u00e9seau<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>tcp.flags.syn == 1 &amp;&amp; tcp.flags.ack == 0<\/code><\/pre>\n\n\n\n<p> d\u00e9tecte tentative de scan (nmap)<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Filtrer erreurs r\u00e9seau<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>tcp.flags.reset == 1<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Cas pratiques<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">Cas 1 : probl\u00e8me DNS<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>dns<\/code><\/pre>\n\n\n\n<p> v\u00e9rifier :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>requ\u00eate<\/li>\n\n\n\n<li>r\u00e9ponse<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Cas 2 : lenteur r\u00e9seau<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>tcp.analysis.retransmission<\/code><\/pre>\n\n\n\n<p> d\u00e9tecte :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>pertes de paquets<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Cas 3 : brute force<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>tcp.flags.syn == 1<\/code><\/pre>\n\n\n\n<p> nombreuses connexions = attaque<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Cas 4 : communication suspecte<\/h3>\n\n\n\n<pre class=\"wp-block-code\"><code>ip.addr == 192.168.1.50<\/code><\/pre>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Bonnes pratiques<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>capturer uniquement ce qui est n\u00e9cessaire<\/li>\n\n\n\n<li>utiliser des filtres pour r\u00e9duire le bruit<\/li>\n\n\n\n<li>analyser couche par couche<\/li>\n\n\n\n<li>ne jamais analyser un r\u00e9seau sans autorisation<\/li>\n\n\n\n<li>sauvegarder les captures (.pcap)<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">R\u00e9capitulatif des \u00e9l\u00e9ments importants<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><th>\u00c9l\u00e9ment<\/th><th>R\u00f4le<\/th><\/tr><\/thead><tbody><tr><td>Capture<\/td><td>analyse trafic<\/td><\/tr><tr><td>Filtres<\/td><td>ciblage<\/td><\/tr><tr><td>Follow TCP Stream<\/td><td>voir conversation<\/td><\/tr><tr><td>Protocoles<\/td><td>compr\u00e9hension des \u00e9changes<\/td><\/tr><tr><td>PCAP<\/td><td>sauvegarde<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Wireshark permet :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>d\u2019analyser pr\u00e9cis\u00e9ment le r\u00e9seau<\/li>\n\n\n\n<li>de comprendre les communications<\/li>\n\n\n\n<li>de d\u00e9tecter des anomalies<\/li>\n<\/ul>\n\n\n\n<p>C\u2019est un outil cl\u00e9 en :<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>administration r\u00e9seau<\/li>\n\n\n\n<li>cybers\u00e9curit\u00e9<\/li>\n\n\n\n<li>forensic<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<p><audio autoplay=\"\"><\/audio><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pour les \u00e9tudiants en BTS CIEL ou SIO, Wireshark est un outil essentiel pour analyser le trafic r\u00e9seau.Il permet de : Commandes et filtres essentiels (bloc unique) Explication d\u00e9taill\u00e9e 1. Fonctionnement de Wireshark Wireshark capture les paquets r\u00e9seau et affiche : Suivi des communications (tr\u00e8s important) Suivre une session TCP Dans Wireshark : Permet de [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[10],"tags":[],"class_list":["post-170","post","type-post","status-publish","format-standard","hentry","category-reseau"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fiche wireshark : analyse du trafic r\u00e9seau et d\u00e9tection d\u2019anomalies - Eryann Breizh SecOps<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eryann.fr\/index.php\/reseau\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fiche wireshark : analyse du trafic r\u00e9seau et d\u00e9tection d\u2019anomalies - Eryann Breizh SecOps\" \/>\n<meta property=\"og:description\" content=\"Pour les \u00e9tudiants en BTS CIEL ou SIO, Wireshark est un outil essentiel pour analyser le trafic r\u00e9seau.Il permet de : Commandes et filtres essentiels (bloc unique) Explication d\u00e9taill\u00e9e 1. Fonctionnement de Wireshark Wireshark capture les paquets r\u00e9seau et affiche : Suivi des communications (tr\u00e8s important) Suivre une session TCP Dans Wireshark : Permet de [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eryann.fr\/index.php\/reseau\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\/\" \/>\n<meta property=\"og:site_name\" content=\"Eryann Breizh SecOps\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-01T22:57:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-02T12:11:01+00:00\" \/>\n<meta name=\"author\" content=\"wpadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wpadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/reseau\\\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/reseau\\\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\\\/\"},\"author\":{\"name\":\"wpadmin\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/person\\\/d2ee98d2385cd045ed4fe1c07ca320b5\"},\"headline\":\"Fiche wireshark : analyse du trafic r\u00e9seau et d\u00e9tection d\u2019anomalies\",\"datePublished\":\"2026-05-01T22:57:58+00:00\",\"dateModified\":\"2026-05-02T12:11:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/reseau\\\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\\\/\"},\"wordCount\":322,\"publisher\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\"},\"articleSection\":[\"R\u00e9seau\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/reseau\\\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\\\/\",\"url\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/reseau\\\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\\\/\",\"name\":\"Fiche wireshark : analyse du trafic r\u00e9seau et d\u00e9tection d\u2019anomalies - Eryann Breizh SecOps\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#website\"},\"datePublished\":\"2026-05-01T22:57:58+00:00\",\"dateModified\":\"2026-05-02T12:11:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/reseau\\\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eryann.fr\\\/index.php\\\/reseau\\\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/reseau\\\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/eryann.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fiche wireshark : analyse du trafic r\u00e9seau et d\u00e9tection d\u2019anomalies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#website\",\"url\":\"https:\\\/\\\/eryann.fr\\\/\",\"name\":\"Eryann Breizh SecOps\",\"description\":\"Fiches techniques &amp; labs en syst\u00e8mes et r\u00e9seaux poor les \u00e9tudiants en BTS CEIL ET SIO\",\"publisher\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eryann.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#organization\",\"name\":\"Breizh Sec Ops\",\"url\":\"https:\\\/\\\/eryann.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png\",\"contentUrl\":\"https:\\\/\\\/eryann.fr\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png\",\"width\":1246,\"height\":229,\"caption\":\"Breizh Sec Ops\"},\"image\":{\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eryann.fr\\\/#\\\/schema\\\/person\\\/d2ee98d2385cd045ed4fe1c07ca320b5\",\"name\":\"wpadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g\",\"caption\":\"wpadmin\"},\"sameAs\":[\"https:\\\/\\\/eryann.fr\"],\"url\":\"https:\\\/\\\/eryann.fr\\\/index.php\\\/author\\\/wpadmin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fiche wireshark : analyse du trafic r\u00e9seau et d\u00e9tection d\u2019anomalies - Eryann Breizh SecOps","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\/","og_locale":"fr_FR","og_type":"article","og_title":"Fiche wireshark : analyse du trafic r\u00e9seau et d\u00e9tection d\u2019anomalies - Eryann Breizh SecOps","og_description":"Pour les \u00e9tudiants en BTS CIEL ou SIO, Wireshark est un outil essentiel pour analyser le trafic r\u00e9seau.Il permet de : Commandes et filtres essentiels (bloc unique) Explication d\u00e9taill\u00e9e 1. Fonctionnement de Wireshark Wireshark capture les paquets r\u00e9seau et affiche : Suivi des communications (tr\u00e8s important) Suivre une session TCP Dans Wireshark : Permet de [&hellip;]","og_url":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\/","og_site_name":"Eryann Breizh SecOps","article_published_time":"2026-05-01T22:57:58+00:00","article_modified_time":"2026-05-02T12:11:01+00:00","author":"wpadmin","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"wpadmin","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\/#article","isPartOf":{"@id":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\/"},"author":{"name":"wpadmin","@id":"https:\/\/eryann.fr\/#\/schema\/person\/d2ee98d2385cd045ed4fe1c07ca320b5"},"headline":"Fiche wireshark : analyse du trafic r\u00e9seau et d\u00e9tection d\u2019anomalies","datePublished":"2026-05-01T22:57:58+00:00","dateModified":"2026-05-02T12:11:01+00:00","mainEntityOfPage":{"@id":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\/"},"wordCount":322,"publisher":{"@id":"https:\/\/eryann.fr\/#organization"},"articleSection":["R\u00e9seau"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\/","url":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\/","name":"Fiche wireshark : analyse du trafic r\u00e9seau et d\u00e9tection d\u2019anomalies - Eryann Breizh SecOps","isPartOf":{"@id":"https:\/\/eryann.fr\/#website"},"datePublished":"2026-05-01T22:57:58+00:00","dateModified":"2026-05-02T12:11:01+00:00","breadcrumb":{"@id":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eryann.fr\/index.php\/reseau\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/eryann.fr\/index.php\/reseau\/fiche-wireshark-analyse-du-trafic-reseau-et-detection-danomalies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/eryann.fr\/"},{"@type":"ListItem","position":2,"name":"Fiche wireshark : analyse du trafic r\u00e9seau et d\u00e9tection d\u2019anomalies"}]},{"@type":"WebSite","@id":"https:\/\/eryann.fr\/#website","url":"https:\/\/eryann.fr\/","name":"Eryann Breizh SecOps","description":"Fiches techniques &amp; labs en syst\u00e8mes et r\u00e9seaux poor les \u00e9tudiants en BTS CEIL ET SIO","publisher":{"@id":"https:\/\/eryann.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eryann.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/eryann.fr\/#organization","name":"Breizh Sec Ops","url":"https:\/\/eryann.fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/eryann.fr\/#\/schema\/logo\/image\/","url":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png","contentUrl":"https:\/\/eryann.fr\/wp-content\/uploads\/2026\/05\/cropped-088112b9-fd28-4b18-b02d-4d9dded3e900-e1777846396685.png","width":1246,"height":229,"caption":"Breizh Sec Ops"},"image":{"@id":"https:\/\/eryann.fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eryann.fr\/#\/schema\/person\/d2ee98d2385cd045ed4fe1c07ca320b5","name":"wpadmin","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d71b4031c3d015de3ca68c137413277e548b331b07db0acf781b9379b798eb3e?s=96&d=mm&r=g","caption":"wpadmin"},"sameAs":["https:\/\/eryann.fr"],"url":"https:\/\/eryann.fr\/index.php\/author\/wpadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/comments?post=170"}],"version-history":[{"count":1,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/170\/revisions"}],"predecessor-version":[{"id":171,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/posts\/170\/revisions\/171"}],"wp:attachment":[{"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/media?parent=170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/categories?post=170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eryann.fr\/index.php\/wp-json\/wp\/v2\/tags?post=170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}