Home Operation and Maintenance Windows Operation and Maintenance Use of wireshark packet capture capture filter

Use of wireshark packet capture capture filter

Dec 08, 2020 am 10:51 AM
wireshark

I won’t say much about what wireshark is. In short, it is a powerful packet capture tool. We often use it to capture some data packets and then analyze these data packets. Of course, most of us want to capture specific data packets and filter those unwanted data packets. Next, let’s take a look at the use of wireshark’s capture filter.

The syntax of the capture filter

The syntax of the capture filter adopts BPF syntax. If you want to know what BPF syntax is, you can do it yourself Google. To put it more simply, Wireshark's capture filter uses some qualifiers, such as (host/src/port), and qualified values, and then combines expressions through logical operators.

A simple filter is given below, which is used to specify to capture only data packets from a specific IP

host 47.***.***.16
Copy after login

Commonly used qualifiers are divided into the following three categories:

  • Type: such as host/net/port

  • Direction: such as src/dst

  • Protocol: such as ip /tcp/udp/http/https

The logical operators include the following

  • and operators&&

  • or operator||

  • Not operator!

Next, we will demonstrate how to use capture filters from several aspects.

Address filter

Address filter is the most commonly used in our daily life, used to specify data from a specific IP or host name Bag. In addition, you can also specify the MAC address and IPv6 address.

Let’s demonstrate it through several cases:

Limit IPv4 address

host 192.168.1.111
Copy after login

Limit address and direction: that is, limit Source address, only capture packets from a specific ip

src host 192.168.1.111
Copy after login

Limited MAC address

ether host 00:0c:29:84:5b:d0
Copy after login

Port filter

Port filters are also commonly used daily, such as only capturing data on port 80 or only capturing data packets on port 22, etc.

Capture the data packets whose destination port is port 80

src port 80
Copy after login

Do not capture the data packets of port 22

!port 22
Copy after login

Protocol filter

is used to limit the protocol. This limited protocol is not hierarchical. It can be the application layer protocol http, https, ftp, dns, or transmission. layer protocols tcp, udp or ip layer ip protocol, icmp, etc.

Only capture icmp protocol packets

icmp
Copy after login

Finally, let’s get a slightly more complex comprehensive example. Filters that limit IP, direction and port at the same time are as follows

host 192.168.1.111 && dst port 80
Copy after login

Related recommendations: "Windows Operation and Maintenance"

The above is the detailed content of Use of wireshark packet capture capture filter. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)