Wireshark - 0.99.5 Betriebsanweisung

Stöbern Sie online oder laden Sie Betriebsanweisung nach Software Wireshark - 0.99.5 herunter. Wireshark - 0.99.5 User Guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 223
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Wireshark User's Guide

Wireshark User's Guide21443 for Wireshark 0.99.5Ulf Lamping,Richard Sharpe, NS Computer Software and Services P/LEd Warnicke,

Seite 2

3. AcknowledgementsThe authors would like to thank the whole Wireshark team for their assistance. In particular, the au-thors would like to thank:• Ge

Seite 3

5.4. Merging capture filesSometimes you need to merge several capture files into one. For example this can be useful, if youhave captured simultaneous

Seite 4 - Table of Contents

Figure 5.8. "Merge" - new GTKversionUnix/Linux: GTK version >= 2.4This is the common Gimp/GNOME file opendialog - plus some Wireshark ext

Seite 5

5.5. File SetsWhen using the "Multiple Files" option while doing a capture (see: Section 4.6, “Capture files andfile modes”), the capture da

Seite 6

Each line contains information about a file of the file set:• Filename the name of the file. If you click on the filename (or the radio button left to

Seite 7

5.6. Exporting dataWireshark provides several ways and formats to export packet data. This section describes generalways to export data from Wireshark

Seite 8 - 1. Foreword

Tip!You can easily convert PostScript files to PDF files using ghostscript. For example:export to a file named foo.ps and then call: ps2pdf foo.psFigu

Seite 9

Export packet data into PSML. This is an XML based format including only the packet summary.The PSML file specification is available at: http://www.nb

Seite 10 - 3. Acknowledgements

• Export to file: frame chooses the file to export the packet data to.• The Packet Range frame is described in Section 5.8, “The Packet Range frame”.T

Seite 11 - 4. About this document

• Name: the filename to export the packet data to.• The Save in folder: field lets you select the folder to save to (from some predefined folders).• B

Seite 12 - #usersguide

Columns:• Packet num: The packet number in which this object was found. In some cases, there can bemultiple objects in the same packet.• Hostname: The

Seite 13

4. About this documentThis book was originally developed by Richard Sharpe with funds provided from the WiresharkFund. It was updated by Ed Warnicke a

Seite 14

5.7. Printing packetsTo print packets, select the "Print..." menu item from the File menu. When you do this, Wiresharkpops up the Print dial

Seite 15 - Chapter 1. Introduction

Note!These Print command fields are not available on windowsplatforms.This field specifies the command to use for printing. It is typically lpr.You wo

Seite 16 - 1.1.7. Open Source Software

5.8. The Packet Range frameThe packet range frame is a part of various output related dialog boxes. It provides options to selectwhich packets should

Seite 17 - 1.1.8. What Wireshark is not

5.9. The Packet Format frameThe packet format frame is a part of various output related dialog boxes. It provides options to selectwhich parts of a pa

Seite 18 - 1.2. System Requirements

File Input / Output and Printing100

Seite 19 - 1.2.3. Unix / Linux

Chapter 6. Working with capturedpackets6.1. Viewing packets you have capturedOnce you have captured some packets, or you have opened a previously save

Seite 20 - 1.3. Where to get Wireshark?

Figure 6.2. Viewing a packet in a separate windowWorking with captured packets102

Seite 21

6.2. Pop-up menusYou can bring up a pop-up menu over either the "Packet List", "Packet Details" or "Packet Bytes"pane by

Seite 22 - Wireshark

Item Identical to mainmenu's item:Descriptionterformation from the selected packet. E.g. the IP menu entrywill set a filter to show the traffic b

Seite 23 - 1.6.4. Mailing Lists

6.2.2. Pop-up menu of the "Packet Details" paneFigure 6.4. Pop-up menu of the "Packet Details" paneThe following table gives an ov

Seite 24 - 1.6.5. Reporting Problems

5. Where to get the latest copy of thisdocument?The latest copy of this documentation can always be found at: http:/ / www.wireshark.org/ docs/#usersg

Seite 25

Item Identical to mainmenu's item:DescriptionCopy/ Bytes(Offset Hex Text)-Copy the packet bytes to the clipboard in hexdump-likeformat; similar t

Seite 26 - Introduction

Item Identical to mainmenu's item:Descriptionences...The menu item takes you to the properties dialog and se-lects the page corresponding to the

Seite 27

6.3. Filtering packets while viewingWireshark has two filtering languages: One used when capturing packets, and one used when dis-playing packets. In

Seite 28 - Download all required files!

As you might have noticed, only packets of the TCP protocol are displayed now (e.g. packets 1-10are hidden). The packet numbering will remain as befor

Seite 29

6.4. Building display filter expressionsWireshark provides a simple but powerful display filter language that you can build quite complexfilter expres

Seite 30

English C-like Description and examplege>=Greater than or equal toframe.pkt_len ge 0x100le<=Less than or equal toframe.pkt_len <= 0x20In addi

Seite 31

You can combine filter expressions in Wireshark using the logical operators shown in Table 6.5,“Display Filter Logical Operations”Table 6.5. Display F

Seite 32

English C-like Description and exampleeth.src[2] == 83The example above uses the n format to specify a single range. In this casethe element in the se

Seite 33

6.5. The "Filter Expression" dialog boxWhen you are accustomed to Wireshark's filtering system and know what labels you wish to use iny

Seite 34

Value You may enter an appropriate value in the Value text box. The Valuewill also indicate the type of value for the field name you have selected(lik

Seite 35 - 2.8.1. Install Wireshark

6. Providing feedback about this documentShould you have any feedback about this document, please send them to the authors through wire-shark-dev[AT]w

Seite 36 - 2.8.1.4. Command line options

6.6. Defining and saving filtersYou can define filters with Wireshark and give them labels for later use. This can save time in re-membering and retyp

Seite 37 - 2.8.5. Uninstall Wireshark

New This button adds a new filter to the list of filters. The currently enteredvalues from Filter name and Filter string will be used. If any of these

Seite 38 - 2.8.6. Uninstall WinPcap

6.7. Finding packetsYou can easily find packets once you have captured some packets or have read in a previously savedcapture file. Simply select the

Seite 39

You can choose the direction to be searched for:• UpSearch upwards in the packet list (decreasing packet numbers).• DownSearch downwards in the packet

Seite 40 - Chapter 3. User Interface

6.8. Go to a specific packetYou can easily jump to specific packets with one of the menu items in the Go menu.6.8.1. The "Go Back" commandGo

Seite 41 - 3.2. Start Wireshark

6.9. Marking packetsYou can mark packets in the "Packet List" pane. A marked packet will be shown with black back-ground, regardless of the

Seite 42 - 3.3. The Main window

6.10. Time display formats and timereferencesWhile packets are captured, each packet is timestamped. These timestamps will be saved to the cap-ture fi

Seite 43 - 3.3.1. Main Window Navigation

Note!Time referencing will only be useful, if the time display format is set to "SecondsSince Beginning of Capture". If one of the other tim

Seite 44 - 3.4. The Menu

Working with captured packets124

Seite 45 - Table 3.2. File menu items

Chapter 7. Advanced Topics7.1. IntroductionIn this chapter some of the advanced features of Wireshark will be described.125

Seite 46

Prefacexiv

Seite 47

7.2. Following TCP streamsIf you are working with TCP based protocols it can be very helpful to see the data from a TCPstream in the way that the appl

Seite 48 - Table 3.3. Edit menu items

length) and CRNL conversions?The stream content won't be updated while doing a live capture. To get the latest content you'll haveto reopen

Seite 49

7.3. Time StampsTime stamps, their precisions and all that can be quite confusing. This section will provide you withinformation about what's goi

Seite 50 - Table 3.4. View menu items

inaccurate.Conclusion: don't use USB connected NIC's when you need precise time stamp accur-acy! (XXX - are there any such NIC's that s

Seite 51

7.4. Time ZonesIf you travel across the planet, time zones can be confusing. If you get a capture file from some-where around the world time zones can

Seite 52

7.4.1. Set your computer's time correct!If you work with people around the world, it's very helpful to set your computer's time and tim

Seite 53

Table 7.1. Time zone examples for UTC arrival times (without DST)Los Angeles New York Madrid London Berlin TokyoCaptureFile (UTC)10:00 10:00 10:00 10:

Seite 54 - 3.8. The "Go" menu

7.5. Packet Reassembling7.5.1. What is it?Network protocols often need to transport large chunks of data, which are complete in itself, e.g.when trans

Seite 55

2. the higher level protocol (e.g., HTTP) must use the reassembly mechanism to reassemble frag-mented protocol data. This too can often be enabled or

Seite 56 - Table 3.6. Capture menu items

7.6. Name ResolutionName resolution tries to resolve some of the numerical address values into a human readable format.There are two possible ways to

Seite 57

Chapter 1. Introduction1.1. What is Wireshark?Wireshark is a network packet analyzer. A network packet analyzer will try to capture networkpackets and

Seite 58 - Table 3.7. Analyze menu items

7.6.3. IP name resolution (network layer)Try to resolve an IP address (e.g. 216.239.37.99) to something more "human readable".DNS/ADNS name

Seite 59

7.7. ChecksumsSeveral network protocols use checksums to ensure data integrity.Tip!Applying checksums as described here is also known as redundancy ch

Seite 60

7.7.2. Checksum offloadingThe checksum calculation might be done by the network driver, protocol driver or even in hardware.For example: The Ethernet

Seite 61

Advanced Topics139

Seite 62 - Table 3.9. Help menu items

Chapter 8. Statistics8.1. IntroductionWireshark provides a wide range of network statistics.These statistics range from general information about the

Seite 63

8.2. The "Summary" windowGeneral statistics about the current capture file.Figure 8.1. The "Summary" windowStatistics141

Seite 64

• File general information about the capture file.• Time the timestamps when the first and the last packet were capturing (and the time betweenthem).•

Seite 65

8.3. The "Protocol Hierarchy" windowThe protocol hierarchy of the captured packets.Figure 8.2. The "Protocol Hierarchy" windowThis

Seite 66

Note!Packets will usually contain multiple protocols, so more than one protocol will becounted for each packet. Example: In the screenshot IP has 99,1

Seite 67

8.4. EndpointsStatistics of the endpoints captured.Tip!If you are looking for a feature other network tools call a hostlist, here is the rightplace to

Seite 68

Figure 1.1. Wireshark captures packets and allows you to examine theircontent.1.1.3. Live capture from many different network mediaWireshark can captu

Seite 69

For each supported protocol, a tab is shown in this window. The tab labels shows the number of en-dpoints captured (e.g. the tab label "Ethernet:

Seite 70

8.5. ConversationsStatistics of the captured conversations.8.5.1. What is a Conversation?A network conversation is the traffic between two specific en

Seite 71 - 3.18. The Statusbar

8.6. The "IO Graphs" windowUser configurable graph of the captured network packets.You can define up to five differently colored graphs.Figu

Seite 72 - User Interface

• Unit the unit for the y direction (Packets/Tick, Bytes/Tick, Bits/Tick, Advanced...)• Scale the scale for the y unit (10,20,50,100,200,500,...)XXX -

Seite 73 - 4.1. Introduction

8.7. Service Response TimeThe service response time is the time between a request and the corresponding response. This in-formation is available for m

Seite 74 - 4.2. Prerequisites

Figure 8.7. The "DCE-RPC Statistic for ..." windowEach row corresponds to a method of the interface selected (so the EPM interface in versio

Seite 75 - 4.3. Start Capturing

8.8. The protocol specific statistics windowsThe protocol specific statistics windows display detailed information of specific protocols and mightbe d

Seite 76

Statistics153

Seite 77 - Capturing Live Network Data

Chapter 9. Customizing Wireshark9.1. IntroductionWireshark's default behaviour will usually suit your needs pretty well. However, as you becomemo

Seite 78 - 4.5.1. Capture frame

9.2. Start Wireshark from the command lineYou can start Wireshark from the command line, but it can also be started from most Window man-agers as well

Seite 79

Wireshark is an open source software project, and is released under the GNU General Public Li-cence (GPL). You can freely use Wireshark on any number

Seite 80 - 4.5.3. Stop Capture... frame

writing to the next file, until it fills up the last file, at whichpoint it'll discard the data in the first file (unless 0 is spe-cified, in whi

Seite 81 - 4.5.6. Buttons

Network interface names should match one of the names lis-ted in wireshark -D (described above); a number, as reportedby wireshark -D, can also be use

Seite 82

Tip!You can get a list of all available preferencestrings from the preferences file, see Ap-pendix A, Files and Folders.-p Don't put the interfac

Seite 83

-y <capture link type> If a capture is started from the command line with -k, set thedata link type to use while capturing packets. The values r

Seite 84 - 4.7. Link-layer header type

9.3. Packet colorizationA very useful mechanism available in Wireshark is packet colorization. You can set-up Wiresharkso that it will colorize packet

Seite 85

In the Edit Color dialog box, simply enter a name for the color filter, and enter a filter string in theFilter text field. Figure 9.2, “The "Edit

Seite 86

Figure 9.4, “Using color filters with Wireshark” shows an example of several color filters beingused in Wireshark. You may not like the color choices,

Seite 87

9.4. Control Protocol dissectionThe user can control how protocols are dissected.Each protocol has its own dissector, so dissecting a complete packet

Seite 88

To disable or enable a protocol, simply click on it using the mouse or press the space bar when theprotocol is highlighted.Warning!You have to use the

Seite 89

5. Apply Apply the changes and keep the dialog box open.6. Save Save the settings to the disabled_protos, see Appendix A, Files and Folders for detail

Seite 90

1.2. System RequirementsWhat you'll need to get Wireshark up and running ...1.2.1. General Remarks• The values below are the minimum requirements

Seite 91 - Printing

5. OK Apply the currently selected decode and close the dialog box.6. Apply Apply the currently selected decode and keep the dialog box open.7. Cancel

Seite 92 - 5.2. Open capture files

9.5. PreferencesThere are a number of preferences you can set. Simply select the Preferences... menu item from theEdit menu, and Wireshark will pop up

Seite 93

9.6. User TableThe User Table editor is used for managing various tables in wireshark. It's main dialog works verysimilarly to that of Section 9.

Seite 94 - 5.2.2. Input File Formats

9.7. Display Filter MacrosDisplay Filter Macos are a mechanism to create shortcuts for complex filters. For example defininga display filter macro nam

Seite 95

9.8. Tektronics K12xx/15 RF5 protocols TableThe Tektronix's K12xx/15 rf5 file format uses helper files (*.stk) to identify the various protocolst

Seite 96 - 5.3. Saving captured packets

9.9. User DLTs protocol tableWhen a pcap file uses one of the user DLTs (147 to 162) wireshark uses this table to know whichprotocol(s) to use for eac

Seite 97

9.10. SNMP users TableWireshark uses this table to verify auhentication and to decrypt encrypted SNMPv3 packets.This table is handled by an Section 9.

Seite 99

Appendix A. Files and FoldersA.1. Capture FilesTo understand which information will remain available after the captured packets are saved to a cap-tur

Seite 100 - 5.4. Merging capture files

• time references set with "Edit/Time Reference"• the current display filter• ...Files and Folders175

Seite 101

• Windows NT 4.0 will no longer work with Wireshark. The last known version to work wasWireshark 0.99.4 (which includes WinPcap 3.1), you still can ge

Seite 102 - 5.5. File Sets

A.2. Configuration Files and FoldersWireshark uses a number of files and folders while it is running. Some of these reside in the person-al configurat

Seite 103

File/Folder Description Unix/LinuxfoldersWindows folders$HOME/.wireshark/pluginstemp Temporary files. Environment:TMPDIREnvironment: TMPDIR or TEMPWin

Seite 104 - 5.6. Exporting data

"<filter name>" <filter string>The settings from this file are read in at program start andwritten to disk when you press the Sa

Seite 105 - File" dialog box

hosts Wireshark uses the files listed in Table A.1, “Configurationfiles and folders overview” to translate IPv4 and IPv6 ad-dresses into names.This fi

Seite 106

A.3. Windows foldersHere you will find some details about the folders used in Wireshark on different Windows versions.As already mentioned, you can fi

Seite 107

able will be set by the windows installer.Vista XXX - could someone give information about this?XP/2000 C:\Documents and Settings\<username>\Loc

Seite 108

Files and Folders182

Seite 109

Appendix B. Protocols and ProtocolFieldsWireshark distinguishes between protocols (e.g. tcp) and protocol fields (e.g. tcp.port).A comprehensive list

Seite 110 - 5.7. Printing packets

Appendix C. Wireshark MessagesWireshark provides you with additional information generated out of the plain packet data or it mayneed to indicate diss

Seite 111

C.2. Packet Details MessagesThese messages might appear in the packet details.C.2.1. [Response in frame: 123]The current packet is the request of a de

Seite 112 - 5.8. The Packet Range frame

Wireshark User's Guide: 21443for Wireshark 0.99.5by Ulf Lamping, Richard Sharpe, and Ed WarnickeCopyright © 2004-2007 Ulf Lamping Richard Sharpe

Seite 113 - 5.9. The Packet Format frame

1.3. Where to get Wireshark?You can get the latest copy of the program from the Wireshark website: ht-tp://www.wireshark.org/download.html. The websit

Seite 114

Wireshark Messages186

Seite 115

Appendix D. Related command linetoolsD.1. IntroductionBeside the Wireshark GUI application, there are some command line tools, which can be helpful fo

Seite 116 - Working with captured packets

D.2. tshark: Terminal-based WiresharkTShark is a terminal oriented version of Wireshark designed for capturing and displaying packetswhen an interacti

Seite 117 - 6.2. Pop-up menus

D.3. tcpdump: Capturing with tcpdump forviewing with WiresharkThere are occasions when you want to capture packets using tcpdump rather than wireshark

Seite 118

D.4. dumpcap: Capturing with dumpcap forviewing with WiresharkDumpcap is a network traffic dump tool. It lets you capture packet data from a live netw

Seite 119

D.5. capinfos: Print information aboutcapture filesIncluded with Wireshark is a small utility called capinfos, which is a command-line utility to prin

Seite 120

D.6. editcap: Edit capture filesIncluded with Wireshark is a small utility called editcap, which is a command-line utility for work-ing with capture f

Seite 121

rawip - Raw IParcnet - ARCNETarcnet_linux - Linux ARCNETatm-rfc1483 - RFC 1483 ATMlinux-atm-clip - Linux ATM CLIPlapb - LAPBatm-pdus - ATM PDUsatm-pdu

Seite 122

Where each option has the following meaning:-r This option specifies that the frames listed should be kept, notdeleted. The default is to delete the l

Seite 123

D.7. mergecap: Merging multiple capture filesinto oneMergecap is a program that combines multiple saved capture files into a single output file specif

Seite 124 - 6.4.2. Comparing values

1.4. A brief history of WiresharkIn late 1997, Gerald Combs needed a tool for tracking down networking problems and wanted tolearn more about networki

Seite 125 - 6.4.3. Combining expressions

atm-pdus - ATM PDUsatm-pdus-untruncated - ATM PDUs - untruncatednull - NULLascend - Lucent/Ascend access equipmentisdn - ISDNip-over-fc - RFC 2625 IP-

Seite 126

-s Sets the snapshot length to use when writing the data.-w Sets the output filename.-T Sets the packet encapsulation type of the output capture file.

Seite 127 - 6.4.4. A common mistake

D.8. text2pcap: Converting ASCII hexdumpsto network capturesThere may be some occasions when you wish to convert a hex dump of some network traffic in

Seite 128

-h : Display this help message-d : Generate detailed debug of parser states-o hex|oct : Parse offsets as (h)ex or (o)ctal. Default is hex-l typenum :

Seite 129

and destination UDP ports for the packet in decimal. Use this optionif your dump is the UDP payload of a packet but does not includeany UDP, IP or Eth

Seite 130 - Warning!

D.9. idl2wrs: Creating dissectors fromCORBA IDL filesIn an ideal world idl2wrs would be mentioned in the users guide in passing and documented in thed

Seite 131

Procedure for converting a CORBA idl file into a Wireshark dissector1. To write the C code to stdout.idl2wrs <your file.idl>eg:idl2wrs echo.idl2

Seite 132 - 6.7. Finding packets

4. More I am sure :-)D.9.5. LimitationsSee the TODO list inside packet-giop.cD.9.6. Notes1. The "-p ./" option passed to omniidl indicates t

Seite 133

Related command line tools204

Seite 134 - 6.8. Go to a specific packet

Appendix E. This Document's License(GPL)As with the original licence and documentation distributed with Wireshark, this document iscovered by the

Seite 135 - 6.9. Marking packets

1.5. Development and maintenance ofWiresharkWireshark was initially developed by Gerald Combs. Ongoing development and maintenance ofWireshark is hand

Seite 136

either verbatim or with modifications and/or translated into anotherlanguage. (Hereinafter, translation is included without limitation inthe term &quo

Seite 137

The source code for a work means the preferred form of the work formaking modifications to it. For an executable work, complete sourcecode means all t

Seite 138

Each version is given a distinguishing version number. If the Programspecifies a version number of this License which applies to it and "anylater

Seite 139 - Chapter 7. Advanced Topics

Yoyodyne, Inc., hereby disclaims all copyright interest in the program`Gnomovision' (which makes passes at compilers) written by James Hacker.<

Seite 140 - 7.2. Following TCP streams

1.6. Reporting problems and getting helpIf you have problems, or need help with Wireshark, there are several places that may be of interestto you (wel

Seite 141

1.6.5. Reporting ProblemsNote!Before reporting any problems, please make sure you have installed the latest versionof Wireshark.When reporting problem

Seite 142 - 7.3. Time Stamps

the D key together) will cause gdb to exit. This will leave you with a file calledbt.txt in the current directory. Include the file with your bug repo

Seite 144 - 7.4. Time Zones

Chapter 2. Building and InstallingWireshark2.1. IntroductionAs with all things, there must be a beginning, and so it is with Wireshark. To use Wiresha

Seite 145

2.2. Obtaining the source and binarydistributionsYou can obtain both source and binary distributions from the Wireshark web site: ht-tp://www.wireshar

Seite 146

2.3. Before you build Wireshark under UNIXBefore you build Wireshark from sources, or install a binary package, you must ensure that youhave the follo

Seite 148

Example 2.2. Building and installing libpcapgzip -dc libpcap-0.9.4.tar.Z | tar xvf -<much output removed>cd libpcap-0.9.4./configure<much out

Seite 149 - 7.6. Name Resolution

2.4. Building Wireshark from source underUNIXUse the following general steps if you are building Wireshark from source under a UNIX operatingsystem:1.

Seite 150

2.5. Installing the binaries under UNIXIn general, installing the binary under your version of UNIX will be specific to the installation meth-ods used

Seite 151 - 7.7. Checksums

2.6. Troubleshooting during the install onUnixA number of errors can occur during the installation process. Some hints on solving these areprovided he

Seite 152 - 7.7.2. Checksum offloading

2.7. Building from source under WindowsIt is recommended to use the binary installer for Windows, until you want to start developing Wire-shark on the

Seite 153

2.8. Installing Wireshark under WindowsIn this section we explore installing Wireshark under Windows from the binary packages.2.8.1. Install Wireshark

Seite 154 - Chapter 8. Statistics

• Capinfos - Capinfos is a program that provides information on capture files.User's Guide - Local installation of the User's Guide. The Hel

Seite 155 - Statistics

stall, otherwise use defaults / user settings.• /D sets the default installation directory ($INSTDIR), overriding InstallDir and InstallDir-RegKey. It

Seite 156

You can uninstall Wireshark the usual way, using the "Add or Remove Programs" option inside theControl Panel. Select the "Wireshark&quo

Seite 157

Building and Installing Wireshark25

Seite 158

Table of ContentsPreface ... viii1. Foreword

Seite 159 - 8.4. Endpoints

Chapter 3. User Interface3.1. IntroductionBy now you have installed Wireshark and are most likely keen to get started capturing your firstpackets. In

Seite 160

3.2. Start WiresharkYou can start Wireshark from your shell or window manager.Tip!When starting Wireshark it's possible to specify optional setti

Seite 161 - 8.5. Conversations

3.3. The Main windowLets look at Wireshark's user interface. Figure 3.1, “The Main window” shows Wireshark as youwould usually see it after some

Seite 162

7. The statusbar (see Section 3.18, “The Statusbar”) shows some detailed information about thecurrent program state and the captured data.Tip!The layo

Seite 163

3.4. The MenuThe Wireshark menu sits on top of the Wireshark window. An example is shown in Figure 3.2, “TheMenu”.Note!Menu items will be greyed out i

Seite 164 - 8.7. Service Response Time

3.5. The "File" menuThe Wireshark file menu contains the fields shown in Table 3.2, “File menu items”.Figure 3.3. The "File" MenuT

Seite 165

Menu Item Accelerator Description------Save Ctrl+SThis menu item saves the current capture. If you have not seta default capture file name (perhaps wi

Seite 166

Menu Item Accelerator DescriptionExport > as"PSML" file...This menu item allows you to export the (or some) of thepackets in the capture

Seite 167

3.6. The "Edit" menuThe Wireshark Edit menu contains the fields shown in Table 3.3, “Edit menu items”.Figure 3.4. The "Edit" MenuT

Seite 168 - 9.1. Introduction

Menu Item Accelerator DescriptionSection 6.9, “Marking packets” for details.Find NextMarkShift+Ctrl+NFind the next marked packet.Find PreviousMarkShif

Seite 169

3.5. The "File" menu ...313.6. The "Edit" menu .

Seite 170

3.7. The "View" menuThe Wireshark View menu contains the fields shown in Table 3.4, “View menu items”.Figure 3.5. The "View" MenuT

Seite 171

Menu Item Accelerator DescriptionPacket BytesThis menu item hides or shows the packet bytes pane, seeSection 3.17, “The "Packet Bytes" pane”

Seite 172

Menu Item Accelerator Description...seconds: 0...precision of one second, decisecond, centisecond, milli-second, microsecond or nanosecond, see Secti

Seite 173

Menu Item Accelerator Descriptionpanded when you display a packet. This menu item expandsall subtrees in all packets in the capture.Collapse AllThis m

Seite 174 - 9.3. Packet colorization

3.8. The "Go" menuThe Wireshark Go menu contains the fields shown in Table 3.5, “Go menu items”.Figure 3.6. The "Go" MenuTable 3.5

Seite 175

Menu Item Accelerator Descriptionmove to the previous packet even if the packet list doesn'thave keyboard focus.Next Packet Ctrl+DownMove to the

Seite 176

3.9. The "Capture" menuThe Wireshark Capture menu contains the fields shown in Table 3.6, “Capture menu items”.Figure 3.7. The "Capture

Seite 177

Menu Item Accelerator DescriptionCapture Fil-ters...This menu item brings up a dialog box that allows you to cre-ate and edit capture filters. You can

Seite 178

3.10. The "Analyze" menuThe Wireshark Analyze menu contains the fields shown in Table 3.7, “Analyze menu items”.Figure 3.8. The "Analyz

Seite 179 - 9.4.2. User Specified Decodes

Menu Item Accelerator DescriptionFirewall ACLRulesThis allows you to create command-line ACL rules for manydifferent firewall products, including Cisc

Seite 180

6.4. Building display filter expressions ... 1106.4.1. Display filter fields ...

Seite 181 - 9.5. Preferences

3.11. The "Statistics" menuThe Wireshark Statistics menu contains the fields shown in Table 3.8, “Statistics menu items”.Figure 3.9. The &qu

Seite 182 - 9.6. User Table

Menu Item Accelerator Description------ConversationListDisplay a list of conversations, obsoleted by the combinedwindow of Conversations above, see Se

Seite 183 - 9.7. Display Filter Macros

3.12. The "Help" menuThe Wireshark Help menu contains the fields shown in Table 3.9, “Help menu items”.Figure 3.10. The "Help" Men

Seite 184

Note!Calling a Web browser might be unsupported in your version of Wireshark. If this isthe case, the corresponding menu items will be hidden.Note!If

Seite 185 - 9.9. User DLTs protocol table

3.13. The "Main" toolbarThe main toolbar provides quick access to frequently used items from the menu. This toolbar cannotbe customized by t

Seite 186 - 9.10. SNMP users Table

ToolbarIconToolbar Item CorrespondingMenu ItemDescriptionClose File/CloseThis item closes the current capture. If you havenot saved the capture, you w

Seite 187 - Customizing Wireshark

ToolbarIconToolbar Item CorrespondingMenu ItemDescriptionMore detail on this subject is provided in Sec-tion 6.6, “Defining and saving filters”.Displa

Seite 188 - Appendix A. Files and Folders

3.14. The "Filter" toolbarThe filter toolbar lets you quickly edit and apply display filters. More information on display filtersis availabl

Seite 189 - Files and Folders

3.15. The "Packet List" paneThe packet list pane displays all the packets in the current capture file.Figure 3.13. The "Packet List&quo

Seite 190

3.16. The "Packet Details" paneThe packet details pane shows the current packet (selected in the "Packet List" pane) in a more de-

Seite 191 - Unix/Linux folders

9.3. Packet colorization ... 1609.4. Control Protocol dissection ...

Seite 192

3.17. The "Packet Bytes" paneThe packet bytes pane shows the data of the current packet (selected in the "Packet List" pane) in ah

Seite 193

3.18. The StatusbarThe statusbar displays informational messages.In general, the left side will show context related information, while the right side

Seite 195

Chapter 4. Capturing Live NetworkData4.1. IntroductionCapturing live network data is one of the major features of Wireshark.The Wireshark capture engi

Seite 196

4.2. PrerequisitesSetting up Wireshark to capture packets for the first time can be tricky.Tip!A comprehensive guide "How To setup a Capture"

Seite 197

4.3. Start CapturingOne of the following methods can be used to start capturing packets with Wireshark:• You can get an overview of the available loca

Seite 198 - C.1. Packet List Messages

4.4. The "Capture Interfaces" dialog boxWhen you select "Interfaces..." from the Capture menu, Wireshark pops up the "Capture

Seite 199 - C.2. Packet Details Messages

Capturing Live Network Data63

Seite 200 - Wireshark Messages

4.5. The "Capture Options" dialog boxWhen you select Start... from the Capture menu (or use the corresponding item in the "Main" t

Seite 201 - D.1. Introduction

drop-down list, so simply click on the button on the righthand side and select the interface you want. It defaults to thefirst non-loopback interface

Seite 202 - Related command line tools

Preface1. ForewordWireshark is one of those programs that many network managers would love to be able to use, butthey are often prevented from getting

Seite 203

CPU time is required for copying packets, less bufferspace is required for packets, and thus perhaps fewerpackets will be dropped if traffic is very h

Seite 204

... after n minute(s) Stop capturing after the given number ofsecond(s)/minutes(s)/hours(s)/days(s) have elapsed.4.5.4. Display Options frameUpdate li

Seite 205

4.6. Capture files and file modesWhile capturing, the underlying libpcap capturing engine will grab the packets from the networkcard and keep the pack

Seite 206

Single named file A single capture file will be used. If you want to place thenew capture file to a specific folder, choose this mode.Multiple files,

Seite 207

4.7. Link-layer header typeIn the usual case, you won't have to choose this link-layer header type. The following paragraphsdescribe the exceptio

Seite 208

4.8. Filtering while capturingWireshark uses the libpcap filter language for capture filters. This is explained in the tcpdump manpage, which can be h

Seite 209

present, packets where the specified address appears in eitherthe source or destination address will be selected.gateway host <host> This primit

Seite 210

DISPLAY (x11) [remote name]:<display num>SESSIONNAME (terminal server) <remote name>Capturing Live Network Data73

Seite 211

4.9. While a Capture is running ...While a capture is running, the following dialog box is shown:Figure 4.3. The "Capture Info" dialog boxTh

Seite 212

Note!The Capture Info dialog box might be hidden, if the option "Hide capture infodialog" is used.2. Using the menu item "Capture/ Stop

Seite 213

2. Who should read this document?The intended audience of this book is anyone using Wireshark.This book will explain all the basics and also some of t

Seite 214

Capturing Live Network Data76

Seite 215 - CORBA IDL files

Chapter 5. File Input / Output andPrinting5.1. IntroductionThis chapter will describe input and output of capture data.• Open/Import capture files in

Seite 216 - D.9.4. TODO

5.2. Open capture filesWireshark can read in previously saved capture files. To read them, simply select the menu or tool-bar item: "File/ Open&q

Seite 217 - D.9.6. Notes

Save a lot of time on huge capture files!You can change the display filter and name resolution settings later while viewing thepackets. However, for h

Seite 218

Figure 5.3. "Open" - old GTK versionWindows (GTK1 installed)This is the file open dialog of former Gimp/GNOME versions - plus some Wireshark

Seite 219

• the output from VMS's TCPIPtrace/TCPtrace/UCX$TRACE utilities• the text output from the DBS Etherwatch VMS utility• Visual Networks' Visua

Seite 220

5.3. Saving captured packetsYou can save captured packets simply by using the Save As... menu item from the File menu underWireshark. You can choose w

Seite 221

Figure 5.6. "Save" - old GTK versionUnix/Linux: GTK version < 2.4 / MicrosoftWindows (GTK1 installed)This is the file save dialog of form

Seite 222

3. Select the range of the packets to be saved, see Section 5.8, “The Packet Range frame”4. Specify the format of the saved capture file by clicking o

Seite 223

Third party protocol analyzers may require specific fileextensions!Other protocol analyzers than Wireshark may require that the file has a certain fil

Kommentare zu diesen Handbüchern

Keine Kommentare