To see all interfaces:
tshark -D to see all interfaces Capture packets in any mode
tshark -i any Capture packets in specific mode
tshark -i interface_name/ID number To see some packets after capture
tshark -i interface_name To save packets in a file -w :
tshark -i interface_name -w file_name.pcap To set a count to capture packets :
tshark -i interface_name -c 20 -w file_name.pcap To view the saved file:
tshark -r filter_name.pcap | lessTo see the details of any specific packets:
tshark -r file_name.pcap -c 1 -V Options to export packets:
tshark -T x You can use any options by using the commands
tshark -r filter_name.pcap -T option_name example:
tshark -r test.pcap -T psml | less To save the listed data in a file:
tshark -r test.pcap -T psml > test.psml To use any specific capture filter
tshark -i interface_name -f "filter_name" -w filter_name.pcap example:
tshark -i interface_name -f "tcp port 80" -w tcp.pcap Display filters works on already captured packets.
tshark -r file_name.pcap -Y ' filter expression ' example:
tshark -r tcp.pcap -Y 'http.request.method == "GET" ' save packets
tshark -i interface_name -w file_name.pcap output the saved file in pdml
tshark -r file_name.pcap -T pdml | less Save it xml formate
tshark -r file_name.pcap -T pdml > file_name.xml /usr/share/wireshark/ contains one utility pdml2html which help us to convert pdml file to html but we also need one more utility
sudo apt install xsltproc After installing write the final command to convert to pcap file into html
xsltproc /usr/share/wireshark/pdml2html.xsl file_name.xml > file_name.html This commands list all help for statistics:
tshark -z help and for protocol hierarchy we need io-phs
tshark -r file_name.pcap -z io.phs Above command fill show the protocol hierarchy but it will go through all the regular traffic if you directly want to see it and avoid traffic use -q
tshark -r file_name.pcap -g -z io.phs tshark -r file_name.pcap -q -z io.phs,filter_name example:
tshark -r file_name.pcap -g -z io.phs,ip tshark -r file_name.pcap -g -z io.phs,http tshark -r file_name.pcap -q -z endpoints,name example :
tshark -r file_name.pcap -q -z endpoints,wlan Converstations helps to tie relationship between endpoints.
tshark -r file_name.pcap -q -z conv,name In Wireshark we use expert information it shows problem and warnings :
tshark -r file_name.pcap -q -z expert tshark -i interface_name -w file_name.pcap -b filesize:(enter size you want ) -b files:(enter number you want ) example:
tshark -i wlan0 -w ring.pcap -b filesize:1 -b files:10 FOR INSTALLATION PROCESS AND DETAILED THEORY click here
AUTHOR - ERROR

