
Alternatively, users can filter for ports commonly used in SMTP traffic (i.e., 25, 587 and 465). SMTP traffic can be filtered in Wireshark using the built-in smtp filter. For example, a Google mail server can be reached by using Telnet to connect to gmail-smtp-in.l. on port 25. Google and other services maintain SMTP mail servers, allowing users to interact with them programmatically. Whether you use an email server hosted on-premises or a webmail service like Gmail or O365, there is a decent chance that SMTP is being used somewhere behind the scenes. However, port 465 was historically used for encrypted SMTP and some implementations use this. The officially accepted way to use TLS with SMTP is to use port 25 and send a STARTTLS message to indicate the beginning of TLS usage.

As a result, SMTP traffic can be encrypted using Transport Layer Security (TLS). To do this, click View > Name Resolution and select “Resolve Network Addresses.However, using traffic that is easily readable by eavesdroppers is not a good idea for email. The details of the highlighted packet are displayed in the two lower panes in the Wireshark interface.Ī simple way to make reading the trace easier is to have Wireshark provide meaningful names for the source and destination IP addresses of the packets. The packets are presented in time order, and color coded according to the protocol of the packet. If Wireshark isn’t capturing packets, this icon will be gray.Ĭlicking the red square icon will stop the data capture so you can analyze the packets captured in the trace. This gives you the opportunity to save or discard the captured packets, and restart the trace. Shark fin with circular arrow: If this is green, clicking it will stop the currently running trace.If Wireshark isn’t capturing packets, this icon will be gray.


