Home > Operation and Maintenance > Safety > How to understand Wireshark filtering rules and filtering options

How to understand Wireshark filtering rules and filtering options

WBOY
Release: 2023-05-22 11:19:05
forward
1716 people have browsed it

 ip.addr == 192.168.6.1
 Filter out the packets containing 192.168.6.1

 ip.src == 192.168.43.137
 Filter out the source IP address Packets with the target IP address of 192.168.43.137

 ip.dst == 192.168.43.137
 Filter out the packets with the destination IP address of 192.168.43.137

 tcp.port == 80
 Filter out the 80 port number containing tcp

 tcp.src == 80
 Filter out the 80 port number of the source tcp

 tcp .dstport == 80
 Filter out the 80 port number of the target tcp

 eth.addr == 68:17:29:2f:c4:2f
 Filter out the included mac Address

 eth.src == 68:17:29:2f:c4:2f
 Filter out the source mac address

 eth.dst == 68:17 :29:2f:c4:2f
 Filter out the target mac address

 arp
 Filter out the arp protocol

 and and
 or or
 not non
 ( ) brackets
 tcp or http and (not http)

Save only the specified message
How to understand Wireshark filtering rules and filtering options
Save only Four messages 9, 10, 11, 12

The above is the detailed content of How to understand Wireshark filtering rules and filtering options. For more information, please follow other related articles on the PHP Chinese website!

Related labels:
source:yisu.com
Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Popular Tutorials
More>
Latest Downloads
More>
Web Effects
Website Source Code
Website Materials
Front End Template