- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 207字
- 2021-07-02 23:30:59
Wireshark filter cheat sheet
This will only show packets containing the selected IP address. This can be either the source or the destination IP:
ip.addr ==x.x.x.x
This will show the communication between two IP addresses, which can be from the direction of the source or the destination:
ip.addr ==x.x.x.x && ip.addr ==x.x.x.x
You could also just type in the name of the protocol that you want to see:
http or dns
This filter will only show the TCP packets that are passing through the specified port number:
tcp.port==xxx
You may further specify the details of this filtering option to narrow your search of the TCP packets:
tcp.flags.reset==1
To identify certain types of web traffic, such as requests that are being made to certain websites on the network, enter the following:
http.request
Put an exclamation in front followed by the initial parentheses:
!(arp or icmp or dns)
tcp contains searches for exact criteria in the converted ASCII of every TCP packet captured:
tcp contains xxx
This will show direct communication between an assigned source IP and a specified assigned destination IP:
ip.src==x.x.x.x and ip.dst==x.x.x.x
You can input multiple protocols together by typing in or and using the || symbol:
smb || nbns || dcerpc || nbss || dns
- DevSecOps敏捷安全
- 計算機網絡安全技術(第6版·慕課版)
- Rootkit和Bootkit:現代惡意軟件逆向分析和下一代威脅
- 網絡安全應急管理與技術實踐
- Practical Network Scanning
- 黑客攻防入門秘笈
- Kali Linux Network Scanning Cookbook(Second Edition)
- 局域網交換機安全
- End to End GUI Development with Qt5
- INSTANT Apple Configurator How-to
- 信息技術基礎:提高篇·實驗與習題
- VMware vCloud Security
- 數字政府網絡安全合規性建設指南:密碼應用與數據安全
- Real-World SRE
- CTF網絡安全競賽入門教程