When testing new protocol implementations, VTun can be used to build large virtual networks with multiple hops and paths using a limited amount of hardware. However, it is often necessary to capture and analyse generated traffic to ensure that the protocol is functioning as designed. Capturing tunnelled network traffic results in capturing the tunneling IP/UDP packets and requires an effort to decode and extract the encapsulated IP packets. In this paper we present a patch for Wireshark version 0.99.7 that can automatically decode and further process VTun encapsulated packets to allow deeper inspection into the IP packets being carried within the tunnel.