This is where you type expressions to filter the frames, IP packets, or TCP segments that Wireshark displays from a pcap. Wireshark's display filter a bar located right above the column display section. Once you get the results, you can just quickly search by using CTRL+F for the word Credentials. After the failure and trying out another TCP port, it turned out to be TCP port 81 although Wireshark still recognizes it as HTTP. You can see the results from the filter built by Wireshark correspondingly with my written clues showing that I try to connect on TCP port 80 and get a TCP RST. Now that you have displayed all HTTP, the easiest way to do this is to right click, then on Conversation Filter choose IPv4. You will notice that all the packets in the list only show HTTP for the protocol and see some traffic, including local IP going out to a public IP as well as some local IPs. By doing so, allows you to narrow down to the exact protocol you need. In order to display packets using the HTTP protocol, just simply type "http" in the Display Filter Toolbar. To start this analysis, have the trace file open and set the filter to display HTTP. Like with any trace files, there's going to be more than one way to do this and no correct single methodology. And after connecting, I login to the device.I then tried again with the correct TCP port number.If you manage to find the correct IP pair, you will see me unsuccessfully try to connect on TCP port 80.The protocol I used was HTTP but not TCP port 80.The trace file includes me surfing "cnn.com" as well as accessing a local device.What is the login and the password I used? All the clues you need will be in this trace.pcapng file ( click to download) and the point below: