The ideal access environment for wireshark is a hub, but there are basically no pure hubs on the market now. Most of the so-called hubs on the market are small switches and the like. As we all know, the traffic of the switch router is sent to the destination port, that is, the destination port will only receive data packets sent to itself, while the hub is broadcast and sends data packets to all ports in the entire broadcast domain, so on the hub Packet capture is ideal.
Wireshark can use filtering when capturing packets, and only capture the data packets you want to capture. You can also set no filtering, and then all data packets on the network will be captured. In the data packets captured by wireshark, data packets of different protocols are highlighted in different colors, and the color displayed for each protocol can be manually changed by selecting coloring rules in the view of the main menu.
After opening wireshark, select the interface in capture in the main menu (or select the first icon among the icons under the main menu), and select a more active network connection (network card) in the pop-up dialog box ), and finally select start. When you want to stop capturing packets, you only need to select the stop option in capture, or the stop icon under the main menu. Then the captured data packets can be analyzed.
If you only need to view one or two types of data packets, you can filter the captured data packets, which makes it very convenient to view data packets of a specific protocol. For example: enter tcp in the input field of filter:, then the captured data packets will only display the tcp protocol.
Finally, we can also save the captured packet results, so that we can re-check the packet capture results next time.
(The wireshark I use is 1.10.5)
The above is the detailed content of How to use wireshark simply. For more information, please follow other related articles on the PHP Chinese website!

This article examines operational security audit system procurement. It details typical categories (hardware, software, services), budget allocation (CAPEX, OPEX, project, training, contingency), and suitable government contracting vehicles (GSA Sch

This article explores the roles and required skills of DevOps, security, and IT operations engineers. It details the daily tasks, career paths, and necessary technical and soft skills for each, highlighting the increasing importance of automation, c

This article details crucial security responsibilities for DevOps engineers, system administrators, IT operations staff, and maintenance personnel. It emphasizes integrating security into all stages of the SDLC (DevOps), implementing robust access c

This article contrasts Operations Security (OpSec) and Network Security (NetSec) audit systems. OpSec focuses on internal processes, data access, and employee behavior, while NetSec centers on network infrastructure and communication security. Key

This article examines DevSecOps, integrating security into the software development lifecycle. It details a DevOps security engineer's multifaceted role, encompassing security architecture, automation, vulnerability management, and incident response

This article examines essential skills for a successful security operations career. It highlights the need for technical expertise (network security, SIEM, cloud platforms), analytical skills (data analysis, threat intelligence), and soft skills (co

DevOps enhances operational security by automating security checks within CI/CD pipelines, utilizing Infrastructure as Code for improved control, and fostering collaboration between development and security teams. This approach accelerates vulnerabi

This article details operational and maintenance (O&M) security, emphasizing vulnerability management, access control, security monitoring, data protection, and physical security. Key responsibilities and mitigation strategies, including proacti


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

SublimeText3 Linux new version
SublimeText3 Linux latest version

Notepad++7.3.1
Easy-to-use and free code editor

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

Zend Studio 13.0.1
Powerful PHP integrated development environment
