- Applied Network Security
- Arthur Salmon Warun Levesque Michael McLafferty
- 207字
- 2021-07-02 23:30:59
Wireshark filter cheat sheet
This will only show packets containing the selected IP address. This can be either the source or the destination IP:
ip.addr ==x.x.x.x
This will show the communication between two IP addresses, which can be from the direction of the source or the destination:
ip.addr ==x.x.x.x && ip.addr ==x.x.x.x
You could also just type in the name of the protocol that you want to see:
http or dns
This filter will only show the TCP packets that are passing through the specified port number:
tcp.port==xxx
You may further specify the details of this filtering option to narrow your search of the TCP packets:
tcp.flags.reset==1
To identify certain types of web traffic, such as requests that are being made to certain websites on the network, enter the following:
http.request
Put an exclamation in front followed by the initial parentheses:
!(arp or icmp or dns)
tcp contains searches for exact criteria in the converted ASCII of every TCP packet captured:
tcp contains xxx
This will show direct communication between an assigned source IP and a specified assigned destination IP:
ip.src==x.x.x.x and ip.dst==x.x.x.x
You can input multiple protocols together by typing in or and using the || symbol:
smb || nbns || dcerpc || nbss || dns
- 工業(yè)互聯(lián)網(wǎng)安全防護(hù)與展望
- Kali Linux CTF Blueprints
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級(jí)版)
- 零信任網(wǎng)絡(luò):在不可信網(wǎng)絡(luò)中構(gòu)建安全系統(tǒng)
- 電子支付的規(guī)制結(jié)構(gòu)配置研究
- 暗戰(zhàn)亮劍:黑客滲透與防御全程實(shí)錄
- INSTANT Windows PowerShell
- Learning Devise for Rails
- 局域網(wǎng)交換機(jī)安全
- API安全技術(shù)與實(shí)戰(zhàn)
- 博弈論與數(shù)據(jù)安全
- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- 網(wǎng)絡(luò)空間安全:拒絕服務(wù)攻擊檢測(cè)與防御
- 云計(jì)算安全:關(guān)鍵技術(shù)、原理及應(yīng)用
- 計(jì)算機(jī)系統(tǒng)與網(wǎng)絡(luò)安全研究