Home >Operation and Maintenance >Safety >How to understand Wireshark filtering rules and filtering options

How to understand Wireshark filtering rules and filtering options

WBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWB
WBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBOYWBforward
2023-05-22 11:19:051763browse

 ip.addr == 192.168.6.1
 Filter out the packets containing 192.168.6.1

 ip.src == 192.168.43.137
 Filter out the source IP address Packets with the target IP address of 192.168.43.137

 ip.dst == 192.168.43.137
 Filter out the packets with the destination IP address of 192.168.43.137

 tcp.port == 80
 Filter out the 80 port number containing tcp

 tcp.src == 80
 Filter out the 80 port number of the source tcp

 tcp .dstport == 80
 Filter out the 80 port number of the target tcp

 eth.addr == 68:17:29:2f:c4:2f
 Filter out the included mac Address

 eth.src == 68:17:29:2f:c4:2f
 Filter out the source mac address

 eth.dst == 68:17 :29:2f:c4:2f
 Filter out the target mac address

 arp
 Filter out the arp protocol

 and and
 or or
 not non
 ( ) brackets
 tcp or http and (not http)

Save only the specified message
How to understand Wireshark filtering rules and filtering options
Save only Four messages 9, 10, 11, 12

The above is the detailed content of How to understand Wireshark filtering rules and filtering options. For more information, please follow other related articles on the PHP Chinese website!

Statement:
This article is reproduced at:yisu.com. If there is any infringement, please contact admin@php.cn delete