AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
![]() Here, I listed only the Wired network interfaces. ![]() Now to start capturing packets, just select the interface (in my case interface ens33) and click on the Start capturing packets icon as marked in the screenshot below. You can also double click on the interface that you want to capture packets to and from to start capturing packets on that particular interface. You can also capture packets to and from multiple interfaces at the same time. Just press and hold and click on the interfaces that you want to capture packets to and from and then click on the Start capturing packets icon as marked in the screenshot below. I am capturing packets on the ens33 wired network interface as you can see in the screenshot below. I pinged from the terminal and as you can see, many packets were captured. Now you can click on a packet to select it. Selecting a packet would show many information about that packet. As you can see, information about different layers of TCP/IP Protocol is listed. You can also see the RAW data of that particular packet. You can also click on the arrows to expand packet data for a particular TCP/IP Protocol Layer. ![]() On a busy network thousands or millions of packets will be captured each second. So the list will be so long that it will be nearly impossible to scroll through the list and search for certain type of packet. The good thing is, in Wireshark, you can filter the packets and see only the packets that you need. To filter packets, you can directly type in the filter expression in the textbox as marked in the screenshot below.
0 Comments
Read More
Leave a Reply. |