Wireshark如果要显示所有发送到和接收到某IP的数据包,显示过滤器命令怎么写? 如何在wireshark中抓包过滤返回内容包含某字符串的数据

[\u9ad8\u5206\u60ac\u8d4f]wireshark\u6355\u6349\u963f\u91cc\u65fa\u65fa\u6570\u636e\u5305

\u5b9e\u65f6\u6355\u6349\u6570\u636e\u5305\u65f6Wireshar\u7684\u7279\u8272\u4e4b\u4e00
Wiershark\u6355\u6349\u5f15\u64ce\u5177\u5907\u4ee5\u4e0b\u7279\u70b9
\u652f\u6301\u591a\u79cd\u7f51\u7edc\u63a5\u53e3\u7684\u6355\u6349(\u4ee5\u592a\u7f51\uff0c\u4ee4\u724c\u73af\u7f51\uff0cATM...)
\u652f\u6301\u591a\u79cd\u673a\u5236\u89e6\u53d1\u505c\u6b62\u6355\u6349\uff0c\u4f8b\u5982\uff1a\u6355\u6349\u6587\u4ef6\u7684\u5927\u5c0f\uff0c\u6355\u6349\u6301\u7eed\u65f6\u95f4\uff0c\u6355\u6349\u5230\u5305\u7684\u6570\u91cf...
\u6355\u6349\u65f6\u540c\u65f6\u663e\u793a\u5305\u89e3\u7801\u8be6\u60c5
\u8bbe\u7f6e\u8fc7\u6ee4\uff0c\u51cf\u5c11\u6355\u6349\u5230\u5305\u7684\u5bb9\u91cf\u3002\u89c1\u7b2c 4.8 \u8282 \u201c\u6355\u6349\u65f6\u8fc7\u6ee4\u201d
\u957f\u65f6\u95f4\u6355\u6349\u65f6\uff0c\u53ef\u4ee5\u8bbe\u7f6e\u751f\u6210\u591a\u4e2a\u6587\u4ef6\u3002\u5bf9\u4e8e\u7279\u522b\u957f\u65f6\u95f4\u7684\u6355\u6349\uff0c\u53ef\u4ee5\u8bbe\u7f6e\u6355\u6349\u6587\u4ef6\u5927\u5c0f\u7f5a\u503c\uff0c\u8bbe\u7f6e\u4ec5\u4fdd\u7559\u6700\u540e\u7684N\u4e2a\u6587\u4ef6\u7b49\u624b\u6bb5\u3002\u89c1\u7b2c 4.6 \u8282 \u201c\u6355\u6349\u6587\u4ef6\u683c\u5f0f\u3001\u6a21\u5f0f\u8bbe\u7f6e\u201d
Wireshark\u6355\u6349\u5f15\u64ce\u5728\u4ee5\u4e0b\u51e0\u4e2a\u65b9\u9762\u5c1a\u6709\u4e0d\u8db3
\u4ece\u591a\u4e2a\u7f51\u7edc\u63a5\u53e3\u540c\u65f6\u5b9e\u65f6\u6355\u6349\uff0c(\u4f46\u662f\u60a8\u53ef\u4ee5\u5f00\u59cb\u591a\u4e2a\u5e94\u7528\u7a0b\u5e8f\u5b9e\u4f53\uff0c\u6355\u6349\u540e\u8fdb\u884c\u6587\u4ef6\u5408\u5e76)
\u6839\u636e\u6355\u6349\u5230\u7684\u6570\u636e\u505c\u6b62\u6355\u6349(\u6216\u5176\u4ed6\u64cd\u4f5c)
4.2. \u51c6\u5907\u5de5\u4f5c
\u7b2c\u4e00\u6b21\u8bbe\u7f6eWireshark\u6355\u6349\u5305\u53ef\u80fd\u4f1a\u9047\u5230\u4e00\u4e9b\u5c0f\u9ebb\u70e6
\u8fd9\u91cc\u6709\u4e00\u4e9b\u5e38\u89c1\u9700\u8981\u6ce8\u610f\u7684\u5730\u65b9
\u4f60\u5fc5\u987b\u62e5\u6709root/Administrator\u7279\u6743\u4ee5\u5f00\u59cb\u6355\u6349[12]
\u5fc5\u987b\u9009\u62e9\u6b63\u786e\u7684\u7f51\u7edc\u63a5\u53e3\u6355\u6349\u6570\u636e
\u5982\u679c\u60a8\u60f3\u6355\u6349\u67d0\u5904\u7684\u901a\u4fe1\uff0c\u4f60\u5fc5\u987b\u4f5c\u51fa\u51b3\u5b9a\uff1a\u5728\u4ec0\u4e48\u5730\u65b9\u53ef\u4ee5\u6355\u6349\u5230
\u2026\u2026\u4ee5\u53ca\u8bb8\u591a
\u5982\u679c\u4f60\u78b0\u5230\u8bbe\u7f6e\u95ee\u9898\uff0c\u5efa\u8bae\u770b\u770b\u524d\u9762\u7684\u90a3\u4e2a\u5411\u5bfc\uff0c\u6216\u8bb8\u4f1a\u6709\u6240\u5e2e\u52a9
4.3. \u5f00\u59cb\u6355\u6349
\u53ef\u4ee5\u4f7f\u7528\u4e0b\u4efb\u4e00\u65b9\u5f0f\u5f00\u59cb\u6355\u6349\u5305
\u4f7f\u7528\u6253\u5f00\u6355\u6349\u63a5\u53e3\u5bf9\u8bdd\u6846\uff0c\u6d4f\u89c8\u53ef\u7528\u7684\u672c\u5730\u7f51\u7edc\u63a5\u53e3\uff0c\u89c1\u56fe 4.1 \u201c"Capture Interfaces"\u6355\u6349\u63a5\u53e3\u5bf9\u8bdd\u6846\u201d,
\u9009\u62e9\u60a8\u9700\u8981\u8fdb\u884c\u6355\u6349\u7684\u63a5\u53e3\u542f\u52a8\u6355\u6349
\u4f60\u4e5f\u53ef\u4ee5\u4f7f\u7528"\u6355\u6349\u9009\u9879"\u6309\u94ae\u542f\u52a8\u5bf9\u8bdd\u6846\u5f00\u59cb\u6355\u6349\uff0c\u89c1\u56fe 4.2 \u201c"Capture Option/\u6355\u6349\u9009\u9879"\u5bf9\u8bdd\u6846\u201d
\u5982\u679c\u60a8\u524d\u6b21\u6355\u6349\u65f6\u7684\u8bbe\u7f6e\u548c\u73b0\u5728\u7684\u8981\u6c42\u4e00\u6837\uff0c\u60a8\u53ef\u4ee5\u70b9\u51fb"\u5f00\u59cb\u6355\u6349"\u6309\u94ae\u6216\u8005\u662f\u83dc\u5355\u9879\u7acb\u5373\u5f00\u59cb\u672c\u6b21\u6355\u6349\u3002
\u5982\u679c\u4f60\u5df2\u7ecf\u77e5\u9053\u6355\u6349\u63a5\u53e3\u7684\u540d\u79f0\uff0c\u53ef\u4ee5\u4f7f\u7528\u5982\u4e0b\u547d\u4ee4\u4ece\u547d\u4ee4\u884c\u5f00\u59cb\u6355\u6349\uff1a
wireshark -i eth0 -k
\u4e0a\u8ff0\u547d\u4ee4\u4f1a\u4eceeht0\u63a5\u53e3\u5f00\u59cb\u6355\u6349\uff0c\u6709\u5173\u547d\u4ee4\u884c\u7684\u4ecb\u7ecd\u53c2\u89c1\u7b2c 9.2 \u8282 \u201c\u4ece\u547d\u4ee4\u884c\u542f\u52a8Wireshark\u201d
4.4. \u6355\u6349\u63a5\u53e3\u5bf9\u8bdd\u6846
\u5982\u679c\u60a8\u4ece\u6355\u6349\u83dc\u5355\u9009\u62e9"Interface..."\uff0c\u5c06\u4f1a\u5f39\u51fa\u5982\u56fe 4.1 \u201c"Capture Interfaces"\u6355\u6349\u63a5\u53e3\u5bf9\u8bdd\u6846\u201d\u6240\u793a\u7684\u5bf9\u8bdd\u6846
\u56fe 4.1. "Capture Interfaces"\u6355\u6349\u63a5\u53e3\u5bf9\u8bdd\u6846

\u63cf\u8ff0
\u4ece\u64cd\u4f5c\u7cfb\u7edf\u83b7\u53d6\u7684\u63a5\u53e3\u4fe1\u606f
IP
Wireshark\u80fd\u89e3\u6790\u7684\u7b2c\u4e00\u4e2aIP\u5730\u5740\uff0c\u5982\u679c\u63a5\u53e3\u672a\u83b7\u5f97IP\u5730\u5740\uff08\u5982\uff0c\u4e0d\u5b58\u5728\u53ef\u7528\u7684DHCP\u670d\u52a1\u5668)\uff0c\u5c06\u4f1a\u663e\u793a"Unkow",\u5982\u679c\u6709\u8d85\u8fc7\u4e00\u4e2aIP\u7684\uff0c\u53ea\u663e\u793a\u7b2c\u4e00\u4e2a(\u65e0\u6cd5\u786e\u5b9a\u54ea\u4e00\u4e2a\u4f1a\u663e\u793a).
Packets
\u6253\u5f00\u8be5\u7a97\u53e3\u540e\uff0c\u4ece\u6b64\u63a5\u53e3\u6355\u6349\u5230\u7684\u5305\u7684\u6570\u76ee\u3002\u5982\u679c\u4e00\u76f4\u6ca1\u6709\u63a5\u6536\u5230\u5305\uff0c\u5219\u4f1a\u663e\u793a\u4e3a\u7070\u5ea6
Packets/s
\u6700\u8fd1\u4e00\u79d2\u6355\u6349\u5230\u5305\u7684\u6570\u76ee\u3002\u5982\u679c\u6700\u8fd1\u4e00\u79d2\u6ca1\u6709\u6355\u6349\u5230\u5305\uff0c\u5c06\u4f1a\u662f\u7070\u5ea6\u663e\u793a
Stop
\u505c\u6b62\u5f53\u524d\u8fd0\u884c\u7684\u6355\u6349
Capture
\u4ece\u9009\u62e9\u7684\u63a5\u53e3\u7acb\u5373\u5f00\u59cb\u6355\u6349\uff0c\u4f7f\u7528\u6700\u540e\u4e00\u6b21\u6355\u6349\u7684\u8bbe\u7f6e\u3002
Options
\u6253\u5f00\u8be5\u63a5\u53e3\u7684\u6355\u6349\u9009\u9879\u5bf9\u8bdd\u6846,\u89c1 \u7b2c 4.5 \u8282 \u201c\u6355\u6349\u9009\u9879\u5bf9\u8bdd\u6846\u201d
Details(\u4ec5Win32\u7cfb\u7edf)
\u6253\u5f00\u5bf9\u8bdd\u6846\u663e\u793a\u63a5\u53e3\u7684\u8be6\u7ec6\u4fe1\u606f
Close
\u5173\u95ed\u5bf9\u8bdd\u6846
4.5. \u6355\u6349\u9009\u9879\u5bf9\u8bdd\u6846
\u5982\u679c\u60a8\u4ece\u6355\u6349\u83dc\u5355\u9009\u62e9"start..."\u6309\u94ae(\u6216\u8005\u4ece\u4e3b\u5de5\u5177\u680f\u9009\u62e9\u5bf9\u5e94\u7684\u9879\u76ee),Wireshark\u5f39\u51fa"Capture Option/\u6355\u6349\u9009\u9879"\u5bf9\u8bdd\u6846\u3002\u5982\u56fe 4.2 \u201c"Capture Option/\u6355\u6349\u9009\u9879"\u5bf9\u8bdd\u6846\u201d\u6240\u793a
\u56fe 4.2. "Capture Option/\u6355\u6349\u9009\u9879"\u5bf9\u8bdd\u6846

\u4f60\u53ef\u4ee5\u7528\u5bf9\u8bdd\u6846\u4e2d\u7684\u5982\u4e0b\u5b57\u6bb5\u8fdb\u884c\u8bbe\u7f6e
4.5.1. \u6355\u6349\u6862
Interface
\u8be5\u5b57\u6bb5\u6307\u5b9a\u4f60\u60f3\u7528\u4e8e\u8fdb\u884c\u6355\u6349\u7684\u501f\u53e3\u3002\u4e00\u6b21\u53ea\u80fd\u4f7f\u7528\u4e00\u4e2a\u63a5\u53e3\u3002\u8fd9\u662f\u4e00\u4e2a\u4e0b\u62c9\u5217\u8868\uff0c\u7b80\u5355\u70b9\u51fb\u53f3\u4fa7\u7684\u6309\u94ae\uff0c\u9009\u62e9\u4f60\u60f3\u8981\u4f7f\u7528\u7684\u63a5\u53e3\u3002\u9ed8\u8ba4\u7b2c\u4e00\u662f\u652f\u6301\u6355\u6349\u7684non-loopback(\u975e\u73af\u56de)\u63a5\u53e3\uff0c\u5982\u679c\u6ca1\u6709\u8fd9\u6837\u7684\u63a5\u53e3\uff0c\u7b2c\u4e00\u4e2a\u5c06\u662f\u73af\u56de\u63a5\u53e3\u3002\u5728\u67d0\u4e9b\u7cfb\u7edf\u4e2d\uff0c\u56de\u501f\u53e3\u4e0d\u652f\u6301\u6355\u6349\u5305(windows\u5e73\u53f0\u4e0b\u7684\u73af\u56de\u63a5\u53e3\u5c31\u4e0d\u652f\u6301\u3002)
\u5728\u547d\u4ee4\u884c\u4f7f\u7528-i \u53c2\u6570\u53ef\u4ee5\u66ff\u4ee3\u8be5\u9009\u9879
IP address
\u8868\u793a\u9009\u62e9\u63a5\u53e3\u7684IP\u5730\u5740\u3002\u5982\u679c\u7cfb\u7edf\u672a\u6307\u5b9aIP\u5730\u5740\uff0c\u5c06\u4f1a\u663e\u793a\u4e3a"unknown"
Link-layer header type
\u9664\u975e\u4f60\u6709\u4e9b\u7279\u6b8a\u5e94\u7528\uff0c\u5c3d\u91cf\u4fdd\u6301\u6b64\u9009\u9879\u9ed8\u8ba4\u3002\u60f3\u4e86\u89e3\u66f4\u591a\u8be6\u60c5\uff0c\u89c1 \u7b2c 4.7 \u8282 \u201c\u94fe\u8def\u5c42\u5305\u5934\u7c7b\u578b\u201d
Buffer size: n megabyte(s)
\u8f93\u5165\u7528\u4e8e\u6355\u6349\u7684\u7f13\u5c42\u5927\u5c0f\u3002\u8be5\u9009\u9879\u662f\u8bbe\u7f6e\u5199\u5165\u6570\u636e\u5230\u78c1\u76d8\u524d\u4fdd\u7559\u5728\u6838\u5fc3\u7f13\u5b58\u4e2d\u6355\u6349\u6570\u636e\u7684\u5927\u5c0f\uff0c\u5982\u679c\u4f60\u53d1\u73b0\u4e22\u5305\u3002\u5c1d\u8bd5\u589e\u5927\u8be5\u503c\u3002
Capture packets in promiscuous mode
\u6307\u5b9aWireshark\u6355\u6349\u5305\u65f6\uff0c\u8bbe\u7f6e\u63a5\u53e3\u4e3a\u6742\u6536\u6a21\u5f0f(\u6709\u4e9b\u4eba\u7ffb\u8bd1\u4e3a\u6df7\u6742\u6a21\u5f0f)\u3002\u5982\u679c\u4f60\u672a\u6307\u5b9a\u8be5\u9009\u9879\uff0cWireshark \u5c06\u53ea\u80fd\u6355\u6349\u8fdb\u51fa\u4f60\u7535\u8111\u7684\u6570\u636e\u5305(\u4e0d\u80fd\u6355\u6349\u6574\u4e2a\u5c40\u57df\u7f51\u6bb5\u7684\u5305)[13]
Limit each packet to n bytes
\u6307\u5b9a\u6355\u6349\u8fc7\u7a0b\u4e2d\uff0c\u6bcf\u4e2a\u5305\u7684\u6700\u5927\u5b57\u8282\u6570\u3002\u5728\u67d0\u4e9b\u5730\u65b9\u88ab\u79f0\u4e3a\u3002"snaplen".[14]\u5982\u679c\u7981\u6b62\u8be5\u9009\u9879\uff0c\u9ed8\u8ba4\u503c\u4e3a65535\uff0c\u8fd9\u9002\u7528\u4e8e\u5927\u591a\u6570\u534f\u8bae\uff0c\u4e0b\u9762\u662f\u4e00\u4e9b\u5927\u591a\u6570\u60c5\u51b5\u4e0b\u90fd\u9002\u7528\u7684\u89c4\u5219(\u8fd9\u91cc\u53c8\u51fa\u73b0\u4e86\u62c7\u6307\u89c4\u5219\uff0c\u7b2c\u4e00\u7ae0\uff0c\u7cfb\u7edf\u9700\u6c42\u65f6\u63d0\u5230\u8fc7\u3002\u8fd9\u91cc\u6743\u4e14\u7ffb\u8bd1\u4f5c\u666e\u9002\u800c\u975e\u7edd\u5bf9\u7684\u89c4\u5219))
\u00b7 \u5982\u679c\u4f60\u4e0d\u786e\u5b9a\uff0c\u5c3d\u91cf\u4fdd\u6301\u9ed8\u8ba4\u503c
\u00b7 \u5982\u679c\u4f60\u4e0d\u9700\u8981\u5305\u4e2d\u7684\u6240\u6709\u6570\u636e\u3002\u4f8b\u5982\uff1a\u5982\u679c\u60a8\u4ec5\u9700\u8981\u94fe\u8def\u5c42\u3001IP\u548cTCP\u5305\u5934\uff0c\u60a8\u53ef\u80fd\u60f3\u8981\u9009\u62e9\u4e00\u4e2a\u8f83\u5c0f\u7684\u5feb\u7167\u957f\u5ea6\u3002\u8fd9\u6837\u53ea\u9700\u8981\u8f83\u5c11\u7684cpu\u5360\u7528\u65f6\u95f4\u7528\u4e8e\u590d\u5236\u5305\uff0c\u5305\u9700\u8981\u7684\u7f13\u5b58\u4e5f\u8f83\u5c11\u3002\u5982\u6b64\u5728\u7e41\u5fd9\u7f51\u7edc\u4e2d\u6355\u6349\u65f6\u4e22\u5931\u7684\u5305\u4e5f\u53ef\u80fd\u4f1a\u76f8\u5e94\u5c11\u4e00\u70b9\u3002
\u00b7 \u5982\u679c\u4f60\u6ca1\u6709\u6355\u6349\u5305\u4e2d\u7684\u6240\u6709\u6570\u636e(\u9002\u7528snpaplen\u622a\u65ad\u4e86\u5305)\uff0c\u4f60\u53ef\u80fd\u4f1a\u53d1\u73b0\u6709\u65f6\u5019\u4f60\u60f3\u8981\u7684\u5305\u4e2d\u7684\u6570\u636e\u90e8\u5206\u88ab\u622a\u65ad\u4e22\u5f03\u4e86\u3002\u6216\u8005\u56e0\u4e3a\u7f3a\u5c11\u91cd\u8981\u7684\u90e8\u5206\uff0c\u60f3\u5bf9\u67d0\u4e9b\u5305\u8fdb\u884c\u91cd\u7ec4\u800c\u53d1\u73b0\u5931\u8d25\u3002
Capture Filter
\u6307\u5b9a\u6355\u6349\u8fc7\u6ee4\u3002\u6355\u6349\u8fc7\u6ee4\u5668\u5c06\u4f1a\u5728\u6709\u7b2c 4.8 \u8282 \u201c\u6355\u6349\u65f6\u8fc7\u6ee4\u201d\u8be6\u7ec6\u4ecb\u7ecd\uff0c\u9ed8\u8ba4\u60c5\u51b5\u4e0b\u662f\u7a7a\u7684\u3002
\u540c\u6837\u4f60\u4e5f\u53ef\u4ee5\u70b9\u51fb\u6355\u6349\u6309\u94ae\uff0c\u901a\u8fc7\u5f39\u51fa\u7684\u6355\u6349\u8fc7\u6ee4\u5bf9\u8bdd\u6846\u521b\u5efa\u6216\u9009\u62e9\u4e00\u4e2a\u8fc7\u6ee4\u5668\uff0c\u8be6\u89c1\u7b2c 6.6 \u8282 \u201c\u5b9a\u4e49\uff0c\u4fdd\u5b58\u8fc7\u6ee4\u5668\u201d
4.5.2. \u6349\u6570\u636e\u5e27\u4e3a\u6587\u4ef6\u3002
\u6355\u6349\u6587\u4ef6\u8bbe\u7f6e\u7684\u4f7f\u7528\u65b9\u6cd5\u7684\u8be6\u7ec6\u4ecb\u7ecd\u89c1\u7b2c 4.6 \u8282 \u201c\u6355\u6349\u6587\u4ef6\u683c\u5f0f\u3001\u6a21\u5f0f\u8bbe\u7f6e\u201d
File
\u6307\u5b9a\u5c06\u7528\u4e8e\u6355\u6349\u7684\u6587\u4ef6\u540d\u3002\u8be5\u5b57\u6bb5\u9ed8\u8ba4\u662f\u7a7a\u767d\u3002\u5982\u679c\u4fdd\u6301\u7a7a\u767d\uff0c\u6355\u6349\u6570\u636e\u5c06\u4f1a\u5b58\u50a8\u5728\u4e34\u65f6\u6587\u4ef6\u5939\u3002\u8be6\u89c1\u7b2c 4.6 \u8282 \u201c\u6355\u6349\u6587\u4ef6\u683c\u5f0f\u3001\u6a21\u5f0f\u8bbe\u7f6e\u201d
\u4f60\u53ef\u4ee5\u70b9\u51fb\u53f3\u4fa7\u7684\u6309\u94ae\u6253\u5f00\u6d4f\u89c8\u7a97\u53e3\u8bbe\u7f6e\u6587\u4ef6\u5b58\u50a8\u4f4d\u7f6e
Use multiple files
\u5982\u679c\u6307\u5b9a\u6761\u4ef6\u8fbe\u5230\u4e34\u754c\u503c\uff0cWireshark\u5c06\u4f1a\u81ea\u52a8\u751f\u6210\u4e00\u4e2a\u65b0\u6587\u4ef6\uff0c\u800c\u4e0d\u662f\u9002\u7528\u5355\u72ec\u6587\u4ef6\u3002
Next file every n megabyte(s)
\u4ec5\u9002\u7528\u9009\u4e2dUse multiple files,\u5982\u679c\u6355\u6349\u6587\u4ef6\u5bb9\u91cf\u8fbe\u5230\u6307\u5b9a\u503c\uff0c\u5c06\u4f1a\u751f\u6210\u5207\u6362\u5230\u65b0\u6587\u4ef6
Next file every n minutes(s)
\u4ec5\u9002\u7528\u9009\u4e2dUse multiple files,\u5982\u679c\u6355\u6349\u6587\u4ef6\u6301\u7eed\u65f6\u95f4\u8fbe\u5230\u6307\u5b9a\u503c\uff0c\u5c06\u4f1a\u5207\u6362\u5230\u65b0\u6587\u4ef6\u3002
Ring buffer with n files
\u4ec5\u9002\u7528\u9009\u4e2dUse multiple files,\u4ec5\u751f\u6210\u5236\u5b9a\u6570\u76ee\u7684\u6587\u4ef6\u3002
Stop caputure after n file(s)
\u4ec5\u9002\u7528\u9009\u4e2dUse multiple files,\u5f53\u751f\u6210\u6307\u5b9a\u6570\u76ee\u6587\u4ef6\u65f6\uff0c\u5728\u751f\u6210\u4e0b\u4e00\u4e2a\u6587\u4ef6\u65f6\u505c\u6b62\u6355\u6349(\u751f\u6210n\u4e2a\u8fd8\u662fn+1\u4e2a\u6587\u4ef6?)
4.5.3. \u505c\u6b62\u6355\u6349\u6862
... after n packet(s)
\u5728\u6355\u6349\u5230\u6307\u5b9a\u6570\u76ee\u6570\u636e\u5305\u540e\u505c\u6b62\u6355\u6349
... after n megabytes(s)
\u5728\u6355\u6349\u5230\u6307\u5b9a\u5bb9\u91cf\u7684\u6570\u636e(byte(s)/kilobyte(s)/megabyte(s)/gigabyte(s) )\u540e\u505c\u6b62\u6355\u6349\u3002\u5982\u679c\u6ca1\u6709\u9002\u7528"user multiple files",\u8be5\u9009\u9879\u5c06\u662f\u7070\u8272
... after n minute(s)
\u5728\u8fbe\u5230\u6307\u5b9a\u65f6\u95f4\u540e\u505c\u6b62\u6355\u6349
4.5.4. \u663e\u793a\u6862\u9009\u9879
Update list of packets in real time
\u5728\u5305\u5217\u8868\u9762\u677f\u5b9e\u65f6\u66f4\u65b0\u6355\u6349\u6570\u636e\u3002\u5982\u679c\u672a\u9009\u5b9a\u8be5\u9009\u9879\uff0c\u5728Wireshark\u6355\u6349\u7ed3\u675f\u4e4b\u524d\u5c06\u4e0d\u80fd\u663e\u793a\u6570\u636e\u3002\u5982\u679c\u9009\u4e2d\u8be5\u9009\u9879\uff0cWireshark\u5c06\u751f\u6210\u4e24\u4e2a\u72ec\u7acb\u7684\u8fdb\u7a0b\uff0c\u901a\u8fc7\u6355\u6349\u8fdb\u7a0b\u4f20\u8f93\u6570\u636e\u7ed9\u663e\u793a\u8fdb\u7a0b\u3002
Automatic scrolling in live capture
\u6307\u5b9aWireshark\u5728\u6709\u6570\u636e\u8fdb\u5165\u65f6\u5b9e\u65f6\u6eda\u52a8\u5305\u5217\u8868\u9762\u677f\uff0c\u8fd9\u6837\u60a8\u5c06\u4e00\u76f4\u80fd\u770b\u5230\u6700\u8fd1\u7684\u5305\u3002\u53cd\u4e4b\uff0c\u5219\u6700\u65b0\u6570\u636e\u5305\u4f1a\u88ab\u653e\u7f6e\u5728\u884c\u672b\uff0c\u4f46\u4e0d\u4f1a\u81ea\u52a8\u6eda\u52a8\u9762\u677f\u3002\u5982\u679c\u672a\u8bbe\u7f6e"update list of packets in real time",\u8be5\u9009\u9879\u5c06\u662f\u7070\u8272\u4e0d\u53ef\u9009\u7684\u3002
Hide capture info dialog
\u9009\u4e2d\u8be5\u9009\u9879\uff0c\u5c06\u4f1a\u9690\u85cf\u6355\u6349\u4fe1\u606f\u5bf9\u8bdd\u6846
4.5.5. \u540d\u79f0\u89e3\u6790\u8bbe\u7f6e
Enable MAC name resolution
\u8bbe\u7f6e\u662f\u5426\u8ba9Wireshark\u7ffb\u8bd1MAC\u5730\u5740\u4e3a\u540d\u79f0\uff0c\u89c1\u7b2c 7.6 \u8282 \u201c\u540d\u79f0\u89e3\u6790\u201d
Enable network name resolution
\u662f\u5426\u5141\u8bb8Wireshark\u5bf9\u7f51\u7edc\u5730\u5740\u8fdb\u884c\u89e3\u6790\uff0c\u89c1\u7b2c 7.6 \u8282 \u201c\u540d\u79f0\u89e3\u6790\u201d
4.5.6. \u6309\u94ae
\u8fdb\u884c\u5b8c\u4e0a\u8ff0\u8bbe\u7f6e\u4ee5\u540e\uff0c\u4f60\u53ef\u4ee5\u70b9\u51fbstart\u6309\u94ae\u8fdb\u884c\u6355\u6349,\u4e5f\u53ef\u4ee5\u70b9\u51fbCancel\u9000\u51fa\u6355\u6349.
\u5f00\u59cb\u6355\u6349\u4ee5\u540e\uff0c\u5728\u4f60\u6536\u96c6\u5230\u8db3\u591f\u7684\u6570\u636e\u65f6\u4f60\u53ef\u4ee5\u505c\u6b62\u6355\u6349\u3002\u89c1\u7b2c 4.9 \u8282 \u201c\u5728\u6355\u6349\u8fc7\u7a0b\u4e2d\u201d
4.6. \u6355\u6349\u6587\u4ef6\u683c\u5f0f\u3001\u6a21\u5f0f\u8bbe\u7f6e
\u5728 \u6355\u6349\u65f6\uff0clibpcap \u6355\u6349\u5f15\u64ce(linux\u73af\u5883\u4e0b)\u4f1a\u6293\u53d6\u6765\u81ea\u7f51\u5361\u7684\u5305\u5b58\u653e\u5728(\u76f8\u5bf9\u6765\u8bf4)\u8f83\u5c0f\u7684\u6838\u5fc3\u7f13\u5b58\u5185\u3002\u8fd9\u4e9b\u6570\u636e\u7531Wireshark\u8bfb\u53d6\u5e76\u4fdd\u5b58\u5230\u7528\u6237\u6307\u5b9a\u7684\u6355\u6349\u6587\u4ef6\u4e2d\u3002
\u4fdd\u5b58\u5305\u6570\u636e\u5230\u6355\u6349\u6587\u4ef6\u65f6\uff0c\u53ef\u91c7\u7528\u5dee\u5f02\u6a21\u5f0f\u64cd\u4f5c\u3002
\u8868 4.1. \u6355\u6349\u6587\u4ef6\u6a21\u5f0f\u9009\u9879


"File"\u9009\u9879

"Use multiple files"\u9009\u9879

"Ring buffer with n files"\u9009\u9879

Mode

\u6700\u7ec8\u6587\u4ef6\u547d\u540d\u65b9\u5f0f



-

-

-

Single temporary file

etherXXXXXX (where XXXXXX \u662f\u4e00\u4e2a\u72ec\u7acb\u503c)



foo.cap

-

-

Single named file

foo.cap



foo.cap

x

-

Multiple files,continuous

foo_00001_20040205110102.cap, foo_00002_20040205110102.cap, ...



foo.cap

x

x

Multiple files,ring buffer

foo_00001_20040205110102.cap, foo_00002_20040205110102.cap, ...


Single temporary file
\u5c06\u4f1a\u521b\u5efa\u5e76\u4f7f\u7528\u4e00\u4e2a\u4e34\u65f6\u6587\u4ef6(\u9ed8\u8ba4\u9009\u9879).\u6355\u6349\u6587\u4ef6\u7ed3\u675f\u540e\uff0c\u8be5\u6587\u4ef6\u53ef\u4ee5\u7531\u7528\u6237\u6307\u5b9a\u6587\u4ef6\u540d\u3002
Single named file
\u4f7f\u7528\u5355\u72ec\u6587\u4ef6\uff0c\u5982\u679c\u4f60\u60f3\u653e\u5230\u6307\u5b9a\u76ee\u5f55\uff0c\u9009\u62e9\u6b64\u6a21\u5f0f
Multiple files,continuous
\u4e0esingle name file\u6a21\u5f0f\u7c7b\u4f3c\uff0c\u4e0d\u540c\u70b9\u5728\u4e8e\uff0c\u5f53\u6355\u6349\u8fbe\u5230\u591a\u6587\u4ef6\u5207\u6362\u4e34\u754c\u6761\u4ef6\u65f6\u4e4b\u4e00\u65f6\uff0c\u4f1a\u521b\u5efa\u4e00\u4e2a\u65b0\u6587\u4ef6\u7528\u4e8e\u6355\u6349
Multiple files,ring buffer
\u4e0e"multiple files continuous"\u6a21\u5f0f\u7c7b\u4f3c\uff0c\u4e0d\u540c\u4e4b\u5904\u5728\u4e8e\uff0c\u521b\u5efa\u7684\u6587\u4ef6\u6570\u76ee\u56fa\u5b9a\u3002\u5f53\u8fbe\u5230ring buffer with n\u503c\u65f6\uff0c\u4f1a\u66ff\u6362\u6389\u7b2c\u4e00\u4e2a\u6587\u4ef6\u5f00\u59cb\u6355\u6349\uff0c\u5982\u6b64\u5faa\u73af\u5f80\u590d\u3002
\u8be5\u6a21\u5f0f\u53ef\u4ee5\u9650\u5236\u6700\u5927\u78c1\u76d8\u7a7a\u95f4\u4f7f\u7528\u91cf\uff0c\u5373\u4f7f\u672a\u9650\u5236\u6355\u6349\u6570\u636e\u8f93\u5165\uff0c\u4e5f\u53ea\u80fd\u4fdd\u7559\u6700\u540e\u51e0\u4e2a\u6355\u6349\u6570\u636e\u3002
4.7. \u94fe\u8def\u5c42\u5305\u5934\u7c7b\u578b
\u5728\u901a\u5e38\u60c5\u51b5\u4e0b\uff0c\u4f60\u4e0d\u9700\u8981\u9009\u62e9\u94fe\u8def\u5c42\u5305\u5934\u7c7b\u578b\u3002\u4e0b\u9762\u7684\u6bb5\u843d\u63cf\u8ff0\u4e86\u4f8b\u5916\u7684\u60c5\u51b5\uff0c\u6b64\u65f6\u9009\u62e9\u5305\u5934\u7c7b\u578b\u662f\u6709\u5fc5\u8981\u7684\uff0c\u6240\u4ee5\u4f60\u9700\u8981\u77e5\u9053\u600e\u4e48\u505a\uff1a
\u5982\u679c\u4f60\u5728\u67d0\u79cd\u7248\u672cBSD\u64cd\u4f5c\u7cfb\u7edf\u4e0b\u4ece\u67d0\u79cd802.11 \u8bbe\u5907(\u65e0\u7ebf\u5c40\u57df\u7f51\u8bbe\u5907)\u6355\u6349\u6570\u636e\uff0c\u53ef\u80fd\u9700\u8981\u5728"802.11"\u548c"Ethernet"\u4e2d\u505a\u51fa\u9009\u62e9\u3002"Ethernet"\u5c06\u4f1a\u5bfc\u81f4\u6355\u6349\u5230\u7684\u5305\u5e26\u6709\u4f2a\u4ee5\u592a\u7f51\u5e27\u5934(\u4e0d\u77e5\u9053\u662f\u4e0d\u662f\u5e94\u8be5\u53eb\u4f2a\u9996\u90e8\u66f4\u51c6\u786e\u4e9b);"802.11"\u5c06\u4f1a\u5bfc\u81f4\u4ed6\u4eec\u5e26\u6709802.11\u5e27\u5934\u3002\u5982\u679c\u6355\u6349\u65f6\u7684\u5e94\u7528\u7a0b\u5e8f\u4e0d\u652f\u6301"802.11\u5e27\u5934"\uff0c\u4f60\u9700\u8981\u9009\u62e9"802.11"
\u5982\u679c\u4f60\u4f7f\u7528Endace DAG card(\u67d0\u79cd\u7f51\u7edc\u76d1\u89c6\u5361)\u8fde\u63a5\u5230\u540c\u6b65\u4e32\u53e3\u7ebf(\u8bd1\u8005\u6ce8\uff1aE\u6587\u4e3asynchronous serial line\uff0c\u6743\u4e14\u7ffb\u8bd1\u4f5c\u524d\u6587\u5427\uff0c\u672a\u63a5\u89e6\u8fc7\u6b64\u5361\u3001\u672a\u719f\u7a14\u6b64\u7ebf\u540d\u79f0)\uff0c\u53ef\u80fd\u4f1a\u51fa\u73b0"PPP over serial" \u6216 "Cisco HDLC"(\u81ea\u5df1google\u53bb)\u4f9b\u9009\u62e9\u3002\u6839\u636e\u4f60\u81ea\u5df1\u7684\u60c5\u51b5\u9009\u62e9\u4e8c\u8005\u4e2d\u7684\u4e00\u4e2a\u3002
\u5982\u679c\u4f60\u4f7f\u7528Endace DAG card(\u540c\u4e0a)\u8fde\u63a5\u5230ATM\u7f51\u7edc\uff0c\u5c06\u4f1a\u63d0\u4f9b"RFC 1483 IP-over-ATM"\u3001"Sun raw ATM"\u4f9b\u9009\u62e9\u3002\u5982\u679c\u6355\u6349\u7684\u901a\u4fe1\u662fRFC 1483\u5c01\u88c5IP(RFC 1483 LLC-encapsulated IP,\u4e0d\u7ffb\u8bd1\u4e3a\u5999)\uff0c\u6216\u8005\u9700\u8981\u5728\u4e0d\u652f\u6301SunATM\u5e27\u5934\u7684\u5e94\u7528\u7a0b\u5e8f\u4e0b\u6355\u6349\uff0c\u9009\u62e9\u524d\u8005\u3002\u53cd\u4e4b\u9009\u62e9\u540e\u8005\u3002
\u5982\u679c\u4f60\u5728\u4ee5\u592a\u7f51\u6355\u6349\uff0c\u5c06\u4f1a\u63d0\u4f9b"Ethernet"\u3001"DOCSIS"\u4f9b\u9009\u62e9\uff0c\u5982\u679c\u60a8\u662f\u5728Cisco Cable Modem Termination System(CMTS\u662f\u601d\u79d1\u540c\u8f74\u7535\u7f06\u7ec8\u7aef\u8c03\u5236\u89e3\u8c03\u7cfb\u7edf\uff1f)\u4e0b\u6355\u6349\u6570\u636e\u3002\u5b83\u4f1a\u5c06DOCSIS(\u540c\u8f74\u7535\u7f06\u6570\u636e\u670d\u52a1\u63a5\u53e3)\u901a\u4fe1\u653e\u7f6e\u5230\u4ee5\u592a\u7f51\u4e2d\uff0c\u4f9b\u6355\u6349\u3002\u6b64\u65f6\u9700\u8981\u9009\u62e9"DOCSIS",\u53cd\u4e4b\u5219\u53cd\u4e4b\u3002
4.8. \u6355\u6349\u65f6\u8fc7\u6ee4
Wireshark\u4f7f\u7528libpcap\u8fc7\u6ee4\u8bed\u53e5\u8fdb\u884c\u6355\u6349\u8fc7\u6ee4(what about winpcap?)\u3002\u5728tcpdump\u4e3b\u9875\u6709\u4ecb\u7ecd\uff0c\u4f46\u8fd9\u4e9b\u53ea\u662f\u8fc7\u4e8e\u6666\u6da9\u96be\u61c2\uff0c\u6240\u4ee5\u8fd9\u91cc\u505a\u5c0f\u5e45\u5ea6\u8bb2\u89e3\u3002
\u5728Wireshark\u6355\u6349\u9009\u9879\u5bf9\u8bdd(\u89c1\u56fe 4.2 \u201c"Capture Option/\u6355\u6349\u9009\u9879"\u5bf9\u8bdd\u6846\u201d)\u6846\u8f93\u5165\u6355\u6349\u8fc7\u6ee4\u5b57\u6bb5\u3002\u4e0b\u9762\u7684\u8bed\u53e5\u6709\u70b9\u7c7b\u4f3c\u4e8etcpdump\u6355\u6349\u8fc7\u6ee4\u8bed\u8a00\u3002\u5728tcpdump\u4e3b\u9875http://www.tcpdump.org/tcpdump_man.html\u53ef\u4ee5\u770b\u5230tcpdump\u8868\u8fbe\u5f0f\u9009\u9879\u4ecb\u7ecd\u3002
\u6355\u6349\u8fc7\u6ee4\u7684\u5f62\u5f0f\u4e3a\uff1a\u548c\u53d6\u503c(and/or)\u8fdb\u884c\u8fdb\u884c\u57fa\u672c\u5355\u5143\u8fde\u63a5\uff0c\u52a0\u4e0a\u53ef\u9009\u7684\uff0c\u9ad8\u6709\u9650\u7ea7\u7684not:
[not] primitive [and|or [not] primitive ...]
\u4f8b 4.1. \u6355\u6349\u6765\u81ea\u7279\u5b9a\u4e3b\u673a\u7684telnet\u534f\u8bae
tcp port 23 and host 10.0.0.5
\u672c\u4f8b\u6355\u6349\u6765\u81ea\u6216\u6307\u5411\u4e3b\u673a10.0.0.5\u7684Telnet \u901a\u4fe1\uff0c\u5c55\u793a\u4e86\u5982\u4f55\u7528and\u8fde\u63a5\u4e24\u4e2a\u57fa\u672c\u5355\u5143\u3002\u53e6\u5916\u4e00\u4e2a\u4f8b\u5b50\u4f8b 4.2 \u201c\u6355\u6349\u6240\u6709\u4e0d\u662f\u6765\u81ea10.0.0.5\u7684telnet \u901a\u4fe1\u201d\u5c55\u793a\u5982\u4f55\u6355\u6349\u6240\u6709\u4e0d\u662f\u6765\u81ea10.0.0.5\u7684telnet \u901a\u4fe1\u3002
\u4f8b 4.2. \u6355\u6349\u6240\u6709\u4e0d\u662f\u6765\u81ea10.0.0.5\u7684telnet \u901a\u4fe1
tcp host 23 and not src host 10.0.0.5
\u6b64\u5904\u7b14\u8005\u5efa\u8bae\u589e\u52a0\u66f4\u591a\u8303\u4f8b\u3002\u4f46\u662f\u5e76\u6ca1\u6709\u6dfb\u52a0\u3002
\u4e00\u4e2a\u57fa\u672c\u5355\u5143\u901a\u5e38\u662f\u4e0b\u9762\u4e2d\u7684\u4e00\u4e2a
[src|dst] host
\u6b64\u57fa\u672c\u5355\u5143\u5141\u8bb8\u4f60\u8fc7\u6ee4\u4e3b\u673aip\u5730\u5740\u6216\u540d\u79f0\u3002\u4f60\u53ef\u4ee5\u4f18\u5148\u6307\u5b9asrc|dst\u5173\u952e\u8bcd\u6765\u6307\u5b9a\u4f60\u5173\u6ce8\u7684\u662f\u6e90\u5730\u5740\u8fd8\u662f\u76ee\u6807\u5730\u5740\u3002\u5982\u679c\u672a\u6307\u5b9a\uff0c\u5219\u6307\u5b9a\u7684\u5730\u5740\u51fa\u73b0\u5728\u6e90\u5730\u5740\u6216\u76ee\u6807\u5730\u5740\u4e2d\u7684\u5305\u4f1a\u88ab\u6293\u53d6\u3002
ether [src|dst] host
\u6b64\u5355\u5143\u5141\u8bb8\u4f60\u8fc7\u6ee4\u4e3b\u673a\u4ee5\u592a\u7f51\u5730\u5740\u3002\u4f60\u53ef\u4ee5\u4f18\u5148\u6307\u5b9a\u5173\u952e\u8bcdsrc|dst\u5728\u5173\u952e\u8bcdether\u548chost\u4e4b\u95f4\uff0c\u6765\u786e\u5b9a\u4f60\u5173\u6ce8\u7684\u662f\u6e90\u5730\u5740\u8fd8\u662f\u76ee\u6807\u5730\u5740\u3002\u5982\u679c\u672a\u6307\u5b9a\uff0c\u540c\u4e0a\u3002
gateway host
\u8fc7\u6ee4\u901a\u8fc7\u6307\u5b9ahost\u4f5c\u4e3a\u7f51\u5173\u7684\u5305\u3002\u8fd9\u5c31\u662f\u6307\u90a3\u4e9b\u4ee5\u592a\u7f51\u6e90\u5730\u5740\u6216\u76ee\u6807\u5730\u5740\u662fhost\uff0c\u4f46\u6e90ip\u5730\u5740\u548c\u76ee\u6807ip\u5730\u5740\u90fd\u4e0d\u662fhost\u7684\u5305
[src|dst] net [{mask}|{len }]
\u901a\u8fc7\u7f51\u7edc\u53f7\u8fdb\u884c\u8fc7\u6ee4\u3002\u4f60\u53ef\u4ee5\u9009\u62e9\u4f18\u5148\u6307\u5b9asrc|dst\u6765\u786e\u5b9a\u4f60\u611f\u5174\u8da3\u7684\u662f\u6e90\u7f51\u7edc\u8fd8\u662f\u76ee\u6807\u7f51\u7edc\u3002\u5982\u679c\u4e24\u4e2a\u90fd\u6ca1\u6307\u5b9a\u3002\u6307\u5b9a\u7f51\u7edc\u51fa\u73b0\u5728\u6e90\u8fd8\u662f\u76ee\u6807\u7f51\u7edc\u7684\u90fd\u4f1a\u88ab\u9009\u62e9\u3002\u53e6\u5916\uff0c\u4f60\u53ef\u4ee5\u9009\u62e9\u5b50\u7f51\u63a9\u7801\u6216\u8005CIDR(\u65e0\u7c7b\u522b\u57df\u5f62\u5f0f)\u3002
[tcp|udp] [src|dst] port <port]
\u8fc7\u6ee4tcp,udp\u53ca\u7aef\u53e3\u53f7\u3002\u53ef\u4ee5\u4f7f\u7528src|dst\u548ctcp|udp\u5173\u952e\u8bcd\u6765\u786e\u5b9a\u6765\u81ea\u6e90\u8fd8\u662f\u76ee\u6807\uff0ctcp\u534f\u8bae\u8fd8\u662fudp\u534f\u8bae\u3002tcp|udp\u5fc5\u987b\u51fa\u73b0\u5728src|dst\u4e4b\u524d\u3002
less|greater
\u9009\u62e9\u957f\u5ea6\u7b26\u5408\u8981\u6c42\u7684\u5305\u3002\uff08\u5927\u4e8e\u7b49\u4e8e\u6216\u5c0f\u4e8e\u7b49\u4e8e\uff09
ip|ether proto
\u9009\u62e9\u6709\u6307\u5b9a\u7684\u534f\u8bae\u5728\u4ee5\u592a\u7f51\u5c42\u6216\u662fip\u5c42\u7684\u5305
ether|ip broadcast|multicast
\u9009\u62e9\u4ee5\u592a\u7f51/ip\u5c42\u7684\u5e7f\u64ad\u6216\u591a\u64ad
relop
\u521b\u5efa\u4e00\u4e2a\u590d\u6742\u8fc7\u6ee4\u8868\u8fbe\u5f0f\uff0c\u6765\u9009\u62e9\u5305\u7684\u5b57\u8282\u6216\u5b57\u8282\u8303\u56f4\u7b26\u5408\u8981\u6c42\u7684\u5305\u3002\u8bf7\u53c2\u8003http://www.tcpdump.org/tcpdump_man.html
4.8.1. \u81ea\u52a8\u8fc7\u6ee4\u8fdc\u7a0b\u901a\u4fe1
\u5982\u679cWireshark\u662f\u4f7f\u7528\u8fdc\u7a0b\u8fde\u63a5\u7684\u4e3b\u673a\u8fd0\u884c\u7684(\u4f8b\u5982\u4f7f\u7528SSH,X11 Window\u8f93\u51fa\uff0c\u7ec8\u7aef\u670d\u52a1\u5668)\uff0c\u8fdc\u7a0b\u8fde\u63a5\u5fc5\u987b\u901a\u8fc7\u7f51\u7edc\u4f20\u8f93\uff0c\u4f1a\u5728\u4f60\u771f\u6b63\u611f\u5174\u8da3\u7684\u901a\u4fe1\u4e2d\u4ea7\u751f\u5927\u91cf\u6570\u636e\u5305(\u901a\u5e38\u4e5f\u662f\u4e0d\u91cd\u8981\u7684)
\u60f3\u8981\u907f\u514d\u8fd9\u79cd\u60c5\u51b5\uff0cwireshark\u53ef\u4ee5\u8bbe\u7f6e\u4e3a\u5982\u679c\u53d1\u73b0\u6709\u8fdc\u7a0b\u8fde\u63a5(\u901a\u8fc7\u5bdf\u770b\u6307\u5b9a\u7684\u73af\u5883\u53d8\u91cf)\uff0c\u81ea\u52a8\u521b\u5efa\u4e00\u4e2a\u8fc7\u6ee4\u5668\u6765\u5339\u914d\u8fd9\u79cd\u8fde\u63a5\u3002\u4ee5\u907f\u514d\u6355\u6349Wireshark\u6355\u6349\u8fdc\u7a0b\u8fde\u63a5\u901a\u4fe1\u3002
\u4e0b\u5217\u73af\u5883\u53d8\u91cf\u53ef\u4ee5\u8fdb\u884c\u5206\u6790
SSH\u2014\u2014CONNECTION(ssh)

SSH_CLIENT (ssh)

REMOTEHOST (tcsh, others?)

DISPLAY (x11)
[remote name]:
SESSIONNAME (terminal server)

4.9. \u5728\u6355\u6349\u8fc7\u7a0b\u4e2d
\u6355\u6349\u65f6\uff0c\u4f1a\u51fa\u73b0\u4e0b\u9762\u7684\u5bf9\u8bdd\u6846
\u56fe 4.3. \u6355\u6349\u4fe1\u606f\u5bf9\u8bdd\u6846

\u4e0a\u8ff0\u5bf9\u8bdd\u6846\u4f1a\u5411\u4f60\u663e\u793a\u6355\u6349\u5230\u5305\u7684\u6570\u76ee\uff0c\u6355\u6349\u6301\u7eed\u65f6\u95f4\u3002\u9009\u62e9\u7684\u88ab\u7edf\u8ba1\u7684\u534f\u8bae\u65e0\u6cd5\u66f4\u6539(\u4ec0\u4e48\u9e1f\u610f\u601d\uff1f)
4.9.1. \u505c\u6b62\u6355\u6349
\u8fd0\u884c\u4e2d\u7684\u6355\u6349\u7ebf\u7a0b\u53ef\u4ee5\u7528\u4e0b\u5217\u65b9\u6cd5\u505c\u6b62\uff1a
\u4f7f\u7528\u6355\u6349\u4fe1\u606f\u5bf9\u8bdd\u6846\u4e0a\u7684"stop"\u6309\u94ae\u505c\u6b62\u3002
\u4f7f\u7528\u83dc\u5355\u9879"Capture/ Stop"
\u4f7f\u7528\u5de5\u5177\u680f\u9879" Stop"
\u4f7f\u7528\u5feb\u6377\u952e:Ctrl+E
\u5982\u679c\u8bbe\u7f6e\u4e86\u89e6\u53d1\u505c\u6b62\u7684\u6761\u4ef6\uff0c\u6355\u6349\u8fbe\u5230\u6761\u4ef6\u65f6\u4f1a\u81ea\u52a8\u505c\u6b62\u3002
4.9.2. \u91cd\u65b0\u542f\u52a8\u6355\u6349
\u8fd0\u884c\u4e2d\u7684\u6355\u6349\u8fdb\u7a0b\u53ef\u4ee5\u88ab\u91cd\u65b0\u542f\u52a8\u3002\u8fd9\u5c06\u4f1a\u79fb\u51fa\u4e0a\u6b21\u6355\u6349\u7684\u6240\u6709\u5305\u3002\u5982\u679c\u4f60\u6355\u6349\u5230\u4e00\u4e9b\u4f60\u4e0d\u611f\u5174\u8da3\u7684\u5305\uff0c\u4f60\u4e0d\u60f3\u4fdd\u7559\u5b83\uff0c\u8fd9\u4e2a\u529f\u80fd\u5341\u5206\u6709\u7528\u3002
\u91cd\u65b0\u542f\u52a8\u662f\u4e00\u9879\u65b9\u4fbf\u7684\u529f\u80fd\uff0c\u7c7b\u4f3c\u4e8e\u505c\u6b62\u6355\u6349\u540e\uff0c\u5728\u5f88\u77ed\u7684\u65f6\u95f4\u5185\u7acb\u5373\u5f00\u59cb\u6355\u6349\u3002\u4ee5\u4e0b\u4e24\u79cd\u65b9\u5f0f\u53ef\u4ee5\u5b9e\u73b0\u91cd\u65b0\u542f\u52a8\u6355\u6349:
\u4f7f\u7528\u83dc\u5355\u9879"Capture/ Restart"
\u4f7f\u7528\u5de5\u5177\u680f\u9879" Restart"
[12] \u8bb0\u5f97\u5728Windows\u5b89\u88c5\u90a3\u4e00\u8282\u5c42\u63d0\u5230\u5982\u679c\u4f5c\u4e3a\u670d\u52a1\u542f\u52a8\u53ef\u4ee5\u907f\u514d\u975e\u7ba1\u7406\u5458\u65e0\u6cd5\u8fdb\u884c\u6355\u6349\uff0c\u4e0d\u77e5\u9053\u4e8c\u8005\u80fd\u5426\u76f8\u4e92\u5370\u8bc1\u3002
[13] \u7f51\u5361\u5728\u5c40\u57df\u7f51\u5185\u4f1a\u63a5\u5230\u5f88\u591a\u4e0d\u5c5e\u4e8e\u81ea\u5df1\u7684\u5305\uff0c\u9ed8\u8ba4\u60c5\u51b5\u4e0b\uff0c\u7f51\u5361\u4f1a\u4e0d\u5bf9\u8fd9\u4e9b\u5305\u8fdb\u884c\u5904\u7406\u3002\u8c8c\u4f3c\u8bbe\u7f6e\u4e3a\u6742\u6536\u6a21\u5f0f\uff0cWireshak\u4f1a\u76d1\u542c\u6240\u6709\u7684\u5305\uff0c\u4f46\u5e76\u4e0d\u4f5c\u51fa\u76f8\u5e94\u3002
[14] \u7c97\u7565\u67e5\u4e86\u4e00\u4e0b,\u672a\u627e\u5230\u8be5\u8bcd\u7684\u5408\u9002\u7ffb\u8bd1,\u591a\u89c1\u4e8eWinpcap\u7684\u63cf\u8ff0\uff0c\u5982\u679c\u628a\u8be5\u5355\u8bcd\u62c6\u5206\uff0csnap:\u5355\u5143\uff0c\u5feb\u7167\uff0clen:\u957f\u5ea6\uff0c\u4f3c\u4e4e\u5c31\u662f\u5355\u4f4d\u957f\u5ea6\uff0c\u5355\u5143\u5927\u5c0f\u7684\u610f\u601d\u3002\u5728\u770b\u770b\u8be5\u6bb5\u4e0b\u9762\u7b2c\u4e8c\u4e2a\u5982\u679c\u4e2d\u63d0\u5230\u7684snapshot length,snaplen\u5e94\u8be5\u662f\u4e8c\u8005\u7684\u7b80\u5199\u5f62\u5f0f\uff0c\u5feb\u7167\u957f\u5ea6

1)\u5982\u679c\u662f\u4e00\u4e9b\u5df2\u7ecf\u6709\u63d2\u4ef6\u53ef\u4ee5\u63d0\u53d6\u7684\u6570\u636e\uff0c\u53ef\u4ee5\u76f4\u63a5\u4f7f\u7528\uff0c\u6bd4\u5982voip\u5206\u6790\u8fd9\u5757\u5c31\u53ef\u4ee5\u76f4\u63a5\u5bfc\u51faG711\u7684\u97f3\u9891\u7801\u6d41\uff0c\u751a\u81f3\u76f4\u63a5\u64ad\u653e
2)\u5982\u679cwireshark\u8fd8\u6ca1\u6709\u63d2\u4ef6\u652f\u6301\uff0c\u81ea\u5df1\u5199\u4ee3\u7801\u652f\u6301\uff0c\u6bd4\u5982\u7528lua\u63d2\u4ef6\uff0c\u6216\u8005\u76f4\u63a5\u7528winpcap \u5f00\u53d1\u5305\u6765\u64cd\u7eb5\u622a\u5305\u5904\u7406\u3002

过滤器规则中就没有host这个说法,过滤器都不认的。你可以看下过滤器的使用规则。至于ip.addr == 192.168.3.23,表达的是只显示源ip地址或者目的ip地址是192.168.3.23的所有数据包。wireshark捕捉的本身就是经过该网卡的所有数据包。

ip.addr == x.x.x.x

  • Wireshark浠嬬粛銆乄ireshark浣跨敤鏁欑▼
    绛旓細锛5锛変娇鐢ㄧ潃鑹茶鍒欍傞氬父浣跨敤鏄剧ず杩囨护鍣ㄨ繃婊ゅ悗鐨勬暟鎹紝閮芥槸鏈夌敤鐨勬暟鎹寘銆濡傛灉鎯虫洿鍔犵獊鍑虹殑鏄剧ず鏌愪釜浼氳瘽锛屽彲浠ヤ娇鐢ㄧ潃鑹茶鍒欓珮浜樉绀恒傦紙6锛夋瀯寤哄浘琛ㄣ傚鏋滄兂瑕佹洿鏄庢樉鐨勭湅鍑轰竴涓綉缁滀腑鏁版嵁鐨勫彉鍖栨儏鍐碉紝浣跨敤鍥捐〃鐨勫舰寮忓彲浠ュ緢鏂逛究鐨勫睍鐜版暟鎹垎甯冩儏鍐点傦紙7锛夐噸缁勬暟鎹Wireshark 鐨勯噸缁勫姛鑳斤紝鍙互閲嶇粍涓涓細璇濅腑...
  • Wireshark鎶撳寘鏁欑▼
    绛旓細灏佸寘璇︾粏淇℃伅 1.杩欓噷鏄剧ず鐨勬槸鍦ㄥ皝鍖呭垪琛ㄤ腑琚変腑椤圭洰鐨勮缁嗕俊鎭備俊鎭寜鐓т笉鍚岀殑OSIlayer杩涜浜嗗垎缁勶紝鎮ㄥ彲浠ュ睍寮姣忎釜椤圭洰鏌ョ湅銆 2.ps锛wireshark浼氱敤涓嶉毦锛岄毦鐨勬槸浼氱湅鎳傝繖浜涘寘锛濡傛灉瀵硅繖浜涘寘澶翠俊鎭笉浜嗚В鐨勫彲浠ヨ嚜宸卞幓鏌ユ煡璧勬枡锛16杩涘埗鏁版嵁 1.鈥滆В鏋愬櫒鈥濆湪Wireshark涓篃琚彨鍋氣16杩涘埗鏁版嵁鏌ョ湅闈㈡澘鈥濄傝繖...
  • 濡傛灉鎴戜滑鎯冲彧鐪媓ttp鎻愪氦鏁版嵁鎬庝箞杈撳叆绛涢夊懡浠?
    绛旓細1銆侀鍏堬紝瑕佽wireshark鏄剧ず鍖呭惈GET璇锋眰鐨勬墍鏈塇TTP鏁版嵁鍖呫2銆佸叾娆★紝璁Wireshark鏄剧ず鎵鏈塇TTP璇锋眰鏁版嵁鍖咃紝鏄剧ず杩囨护鍣ㄧ殑鍐欐硶涓篽ttp.request銆3銆佺劧鍚庯紝鏄剧ず鎵鏈塇TTP鍝嶅簲鏁版嵁鍖咃紝绛涢夈4銆佹渶鍚庯紝閫夋嫨鍙湅http鎻愪氦鏁版嵁鍗冲彲銆
  • wireshark濡備綍鏄剧ず鎸囧畾澶у皬鐨勬暟鎹寘??
    绛旓細濡傛灉鐢ㄥ抚鐨勮瘽锛屽氨鏄痜rame.len==125 濡傛灉鏄叾浠栧崗璁殑锛屽彲浠ラ変腑鏌愪釜鍗忚鐨勯暱搴﹀瓧娈碉紝鐒跺悗灏辩煡閬撹瀛楁鍙粈涔堝悕瀛椾簡銆傜敤 瀛楁鍚==125 灏卞彲浠ヤ簡銆傜敤 Filter Expression瀵硅瘽妗嗗緢鏂逛究鐨勩傚氨鏄wireshark绗笁琛 filter缂栬緫妗嗗悗闈㈢殑閭d釜 Expresion... 鎸夐挳 ...
  • wireshark涓轰粈涔鏄剧ず鏈湴涓绘満瀹為檯MAC鍦板潃鑰屼笉鏄繙绋嬩富鏈哄疄闄匨AC鍦板潃_鐧...
    绛旓細鎵浠wireshark鍙鏄剧ず杩滅▼涓绘満鐨刬p鍦板潃鑰屼笉鏄剧ず杩滅▼涓绘満鐨勫疄闄匨AC鍦板潃銆侻AC鍦板潃鏄瘡涓綉鍗$嫭鏈夌殑涓涓韩浠借瘉锛屾槸鐗╃悊鎬х殑涓滆タ锛屼笉鍙兘浼氬彉鐨勩濡傛灉姣忔寮鏈哄悗MAC鍦板潃涓嶄竴dao鏍凤紝鑲畾鏄蒋浠堕棶棰樻垨鑰匒RP鐥呮瘨浼犲亣MAC鍦板潃銆傛瘡寮犵綉鍗$殑MAC鍦板潃閮芥槸鍞竴缁戝畾涓嶅彲鏇存敼鐨勶紝涔熷氨鏄墿鐞嗗湴鍧銆怭hysical Address銆...
  • wireshark骞挎挱甯у湪鍝噷鐪
    绛旓細5. 鍦ㄨ繃婊ゆ爮涓緭鍏ヤ互涓嬬殑杩囨护琛ㄨ揪寮忥細eth.dst == ff:ff:ff:ff:ff:ff 杩欎釜杩囨护琛ㄨ揪寮忕敤浜庣瓫閫夊嚭鐩爣鐗╃悊鍦板潃锛圖estination MAC Address锛変负鍏1锛坒f:ff:ff:ff:ff:ff锛夌殑鏁版嵁鍖咃紝鍗冲箍鎾抚銆6. 鎸変笅鍥炶溅閿垨鐐瑰嚮鈥滃簲鐢ㄢ濇寜閽簲鐢ㄨ繃婊ゅ櫒銆7. 鐜板湪锛Wireshark绐楀彛涓彧浼鏄剧ず骞挎挱甯э紝鍏朵粬鐨勬暟鎹寘...
  • wireshark濡備綍鍙繚瀛鏄剧ず杩囨护鍣ㄧ瓫閫夌殑閮ㄥ垎鎶ユ枃?闈炲父鐫鎬,鍦ㄨ繖绛夌潃_鐧...
    绛旓細1銆佺洿鎺ユ墦寮wireshark鐨勭浉鍏崇獥鍙o紝浼氱湅鍒板悇绉嶆潅鍖呯殑鎶ユ枃銆2銆佽繖涓椂鍊濡傛灉娌¢棶棰橈紝灏辩户缁夋嫨Capture骞剁偣鍑籓ptions杩涜璺宠浆銆3銆佷笅涓姝ュ脊鍑烘柊鐨勫璇濇锛岄渶瑕佹牴鎹疄闄呮儏鍐电‘瀹氬浘绀虹殑鍙傛暟銆4銆佽繖鏍蜂竴鏉ヤ細鍙繚瀛鏄剧ず杩囨护鍣ㄧ瓫閫夌殑閮ㄥ垎鎶ユ枃锛屽嵆鍙揪鍒扮洰鐨勪簡銆
  • Wireshark涓嬫柟绗竴涓獥鍙鏄剧ず浜嗘暟鎹寘鐨勪粈涔堜俊鎭?
    绛旓細鍥涙潯淇℃伅鍒嗗埆浠h〃锛氫簩灞傛暟鎹唴瀹逛俊鎭佷簩灞侻AC鍦板潃淇℃伅銆佷笁灞侷P鍦板潃淇℃伅銆佸洓灞備紶杈撶鍙d俊鎭 1銆佸瑕佸垎鏋愭暟鎹唴瀹瑰鐢ㄦ埛鍚嶄笌瀵嗙爜锛屽氨鍦ㄧ1鏉′俊鎭噷鎵俱傚彲浠ユ崟鎹変竴涓婽elnet淇℃伅灏辩煡閬撲簡銆2銆佹煡鐪嬫崟鎹夊埌鐨勪俊鎭噷鏈夋病鏈夋劅鍏磋叮鐨勫簲鐢ㄦ祦閲忥紝灏卞湪绗洓鏉′紶杈撳眰淇℃伅鏌ョ湅锛屽鍥惧彲鐭ョ敤鎴锋鍦ㄨ闂畨鍏ㄧ綉椤点3銆佺浜...
  • 鏈夋病鏈夊ぇ绁炰細鐢wireshark杞欢,鑳芥暀涓嬫垜鍚
    绛旓細5.浣跨敤鐫鑹茶鍒 閫氬父浣跨敤鏄剧ず杩囨护鍣ㄨ繃婊ゅ悗鐨勬暟鎹紝閮芥槸鏈夌敤鐨勬暟鎹寘銆濡傛灉鎯虫洿鍔犵獊鍑虹殑鏄剧ず鏌愪釜浼氳瘽锛屽彲浠ヤ娇鐢ㄧ潃鑹茶鍒欓珮浜樉绀恒6.鏋勫缓鍥捐〃 濡傛灉鐢ㄦ埛鎯宠鏇存槑鏄剧殑鐪嬪嚭涓涓綉缁滀腑鏁版嵁鐨勫彉鍖栨儏鍐碉紝浣跨敤鍥捐〃鐨勫舰寮忓彲浠ュ緢鏂逛究鐨勫睍鐜版暟鎹垎甯冩儏鍐点7.閲嶇粍鏁版嵁 Wireshark鐨勯噸缁勫姛鑳斤紝鍙互閲嶇粍涓涓細璇濅腑涓嶅悓鏁版嵁...
  • wireshark娴侀噺鍥炬庝箞鐪
    绛旓細璇ユ祦閲忓浘涓昏閫氳繃瑙傚療绾挎潯鐨勮蛋鍚戝拰绮楃粏鏉ュ垽鏂綉缁滄祦閲忕殑鍙樺寲銆Wireshark娴侀噺鍥句腑鐨勬í杞翠唬琛ㄦ椂闂达紝绾佃酱浠h〃缃戠粶娴侀噺锛岀嚎鏉$殑璧板悜琛ㄧず缃戠粶娴侀噺鐨勫彉鍖栵紝绾挎潯鐨勭矖缁嗚〃绀烘祦閲忕殑澶氬皯銆俉ireshark鏄竴娆剧綉缁滃崗璁垎鏋愬櫒锛屽彲浠ユ崟鑾风綉缁滄暟鎹寘骞鏄剧ず璇︾粏淇℃伅銆傛祦閲忓浘鏄疻ireshark涓殑涓涓姛鑳斤紝鍙互鐩磋鍦板睍绀虹綉缁滄祦閲忕殑鍙樺寲...
  • 扩展阅读:wireshark手机版下载 ... wireshark找不到本地接口 ... wireshark图解教程 ... wireshark legacy ... wireshark抓取icmp ... wireshark怎么不显示接口 ... wireshark过滤器使用教程 ... wireshark识别不到接口 ... wireshark以太网接口 ...

    本站交流只代表网友个人观点,与本站立场无关
    欢迎反馈与建议,请联系电邮
    2024© 车视网