SlideShare una empresa de Scribd logo
1 de 28
Ethereal/WireShark Tutorial Yen-Cheng Chen IM, NCNU April, 2006
Introduction ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WireShark ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
2 1 3 List available capture interfaces Start a capture Stop the capture
   menu    main toolbar    filter toolbar    packet list pane    packet details pane    packet bytes pane    status bar ipconfig /renew
packet list pane
Sort by source
packet details pane
packet bytes pane
 
 
Filter
 
 
1 2 3 4
1 2
ip.src eq 10.10.13.137  and  ip.dst eq 163.22.20.16 ip.src == 10.10.13.137  ||  ip.src == 163.22.20.16 http && ( ip.src == 10.10.13.137 || ip.src == 163.22.20.16) ! (ip.dst == 10.10.13.137) ip.src == 10.10.13.137  &&  ip.dst == 163.22.20.16 Filter Expression
 
 
 
(ip.dst == 10.10.13.137) && (ip.src == 163.22.20.16)
Follow TCP Stream
 
 
Export
No.  Time  Source  Destination  Protocol Info 31 6.058434  10.10.13.137  163.22.20.16  HTTP  GET /~ycchen/nm/ HTTP/1.1 Frame 31 (613 bytes on wire, 613 bytes captured) Ethernet II, Src: AsustekC_6a:ea:8d (00:13:d4:6a:ea:8d), Dst: 10.10.13.254 (00:02:ba:ab:74:2b) Internet Protocol, Src: 10.10.13.137 (10.10.13.137), Dst: 163.22.20.16 (163.22.20.16) Transmission Control Protocol, Src Port: 1822 (1822), Dst Port: http (80), Seq: 1, Ack: 1, Len: 559 Source port: 1822 (1822) Destination port: http (80) Sequence number: 1  (relative sequence number) Next sequence number: 560  (relative sequence number) Acknowledgement number: 1  (relative ack number) Header length: 20 bytes Flags: 0x0018 (PSH, ACK) Window size: 17520 Checksum: 0xf4f3 [correct] Hypertext Transfer Protocol
Capture Options
Assignments ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNetwax Lab
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunkingNetwax Lab
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Netwax Lab
 
IPv6 for Pentesters
IPv6 for PentestersIPv6 for Pentesters
IPv6 for Pentesterscamsec
 
In depth understanding network security
In depth understanding network securityIn depth understanding network security
In depth understanding network securityThanawan Tuamyim
 
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...Андрей Шорин
 
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...Ontico
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iiiNetwax Lab
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiNetwax Lab
 
Server-side Intelligent Switching using vyatta
Server-side Intelligent Switching using vyattaServer-side Intelligent Switching using vyatta
Server-side Intelligent Switching using vyattaNaoto MATSUMOTO
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionNetwax Lab
 
Strongswan ipsec vpn_linux_strongswan_ip
Strongswan ipsec vpn_linux_strongswan_ipStrongswan ipsec vpn_linux_strongswan_ip
Strongswan ipsec vpn_linux_strongswan_ipHary HarysMatta
 
Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeNetwax Lab
 
SAS (Secure Active Switch)
SAS (Secure Active Switch)SAS (Secure Active Switch)
SAS (Secure Active Switch)Security Date
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Netwax Lab
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupCyber Security Alliance
 

La actualidad más candente (20)

Nxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asaNxll14 cut through-proxy on asa
Nxll14 cut through-proxy on asa
 
Nxll10 v lan and trunking
Nxll10 v lan and trunkingNxll10 v lan and trunking
Nxll10 v lan and trunking
 
Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)Nxll19 vrrp (virtual router redundancy protocol)
Nxll19 vrrp (virtual router redundancy protocol)
 
IPv6 for Pentesters
IPv6 for PentestersIPv6 for Pentesters
IPv6 for Pentesters
 
In depth understanding network security
In depth understanding network securityIn depth understanding network security
In depth understanding network security
 
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
 
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
Как HeadHunter удалось безопасно нарушить RFC 793 (TCP) и обойти сетевые лову...
 
Nxll23 i pv6
Nxll23 i pv6Nxll23 i pv6
Nxll23 i pv6
 
Nxll28 ospf iii
Nxll28 ospf iiiNxll28 ospf iii
Nxll28 ospf iii
 
Hacking the swisscom modem
Hacking the swisscom modemHacking the swisscom modem
Hacking the swisscom modem
 
Eincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iiiEincop Netwax Lab: EIGRP iii
Eincop Netwax Lab: EIGRP iii
 
Server-side Intelligent Switching using vyatta
Server-side Intelligent Switching using vyattaServer-side Intelligent Switching using vyatta
Server-side Intelligent Switching using vyatta
 
Eincop Netwax Lab: Redistribution
Eincop Netwax Lab: RedistributionEincop Netwax Lab: Redistribution
Eincop Netwax Lab: Redistribution
 
Nxll26 bgp ii
Nxll26 bgp iiNxll26 bgp ii
Nxll26 bgp ii
 
Strongswan ipsec vpn_linux_strongswan_ip
Strongswan ipsec vpn_linux_strongswan_ipStrongswan ipsec vpn_linux_strongswan_ip
Strongswan ipsec vpn_linux_strongswan_ip
 
Eincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static routeEincop Netwax Lab: Lab 1 static route
Eincop Netwax Lab: Lab 1 static route
 
SAS (Secure Active Switch)
SAS (Secure Active Switch)SAS (Secure Active Switch)
SAS (Secure Active Switch)
 
123
123123
123
 
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
Eincop Netwax Lab: HSRP (Hot Standby Router Protocol)
 
Offline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setupOffline bruteforce attack on wi fi protected setup
Offline bruteforce attack on wi fi protected setup
 

Destacado

Suricata sofi
Suricata sofiSuricata sofi
Suricata sofiLiliana
 
“ Estrategia 'Suricata', individual y organizacional, de adecuación 2.0: apl...
“ Estrategia 'Suricata', individual y organizacional, de adecuación 2.0: apl...“ Estrategia 'Suricata', individual y organizacional, de adecuación 2.0: apl...
“ Estrategia 'Suricata', individual y organizacional, de adecuación 2.0: apl...erubio
 
Penetration testing
Penetration testingPenetration testing
Penetration testinggh02
 
Aguila para lili
Aguila para liliAguila para lili
Aguila para liliLiliana
 
Formation Hypotheses - Mai 2013 - Loïc Le Pape
Formation Hypotheses - Mai 2013 - Loïc Le PapeFormation Hypotheses - Mai 2013 - Loïc Le Pape
Formation Hypotheses - Mai 2013 - Loïc Le PapeOpenEdition
 
Nmap.potosim
Nmap.potosimNmap.potosim
Nmap.potosimgh02
 
UAA-Paraguay, Proyecto Suricata y Red Social 'Sociedad y Tecnología'
UAA-Paraguay, Proyecto Suricata y Red Social 'Sociedad y Tecnología'UAA-Paraguay, Proyecto Suricata y Red Social 'Sociedad y Tecnología'
UAA-Paraguay, Proyecto Suricata y Red Social 'Sociedad y Tecnología'erubio
 
Clase de Muestra 001
Clase de Muestra 001Clase de Muestra 001
Clase de Muestra 001Inacap
 
A3sec Webinar AlienVault USM - Sistemas de detección de ataques en tiempo real
A3sec Webinar AlienVault USM - Sistemas de detección de ataques en tiempo realA3sec Webinar AlienVault USM - Sistemas de detección de ataques en tiempo real
A3sec Webinar AlienVault USM - Sistemas de detección de ataques en tiempo reala3sec
 
Sistemas de Detección de Intrusos
Sistemas de Detección de IntrusosSistemas de Detección de Intrusos
Sistemas de Detección de IntrusosCarlos Arturo Fyuler
 
Seguridad informática
Seguridad informáticaSeguridad informática
Seguridad informáticajlezcano1210
 
Ids sistema de deteccion de intrusos (2)
Ids sistema de deteccion de intrusos (2)Ids sistema de deteccion de intrusos (2)
Ids sistema de deteccion de intrusos (2)Jhon Jairo Hernandez
 
Windows Suricata
Windows SuricataWindows Suricata
Windows Suricatapm02ar
 
Material de etica
Material de eticaMaterial de etica
Material de eticamgzurita1
 

Destacado (19)

Suricata sofi
Suricata sofiSuricata sofi
Suricata sofi
 
“ Estrategia 'Suricata', individual y organizacional, de adecuación 2.0: apl...
“ Estrategia 'Suricata', individual y organizacional, de adecuación 2.0: apl...“ Estrategia 'Suricata', individual y organizacional, de adecuación 2.0: apl...
“ Estrategia 'Suricata', individual y organizacional, de adecuación 2.0: apl...
 
Penetration testing
Penetration testingPenetration testing
Penetration testing
 
Aguila para lili
Aguila para liliAguila para lili
Aguila para lili
 
Clase 19
Clase 19Clase 19
Clase 19
 
Surikata
SurikataSurikata
Surikata
 
Formation Hypotheses - Mai 2013 - Loïc Le Pape
Formation Hypotheses - Mai 2013 - Loïc Le PapeFormation Hypotheses - Mai 2013 - Loïc Le Pape
Formation Hypotheses - Mai 2013 - Loïc Le Pape
 
Nmap.potosim
Nmap.potosimNmap.potosim
Nmap.potosim
 
Comsi
ComsiComsi
Comsi
 
UAA-Paraguay, Proyecto Suricata y Red Social 'Sociedad y Tecnología'
UAA-Paraguay, Proyecto Suricata y Red Social 'Sociedad y Tecnología'UAA-Paraguay, Proyecto Suricata y Red Social 'Sociedad y Tecnología'
UAA-Paraguay, Proyecto Suricata y Red Social 'Sociedad y Tecnología'
 
Clase de Muestra 001
Clase de Muestra 001Clase de Muestra 001
Clase de Muestra 001
 
A3sec Webinar AlienVault USM - Sistemas de detección de ataques en tiempo real
A3sec Webinar AlienVault USM - Sistemas de detección de ataques en tiempo realA3sec Webinar AlienVault USM - Sistemas de detección de ataques en tiempo real
A3sec Webinar AlienVault USM - Sistemas de detección de ataques en tiempo real
 
Sistemas de Detección de Intrusos
Sistemas de Detección de IntrusosSistemas de Detección de Intrusos
Sistemas de Detección de Intrusos
 
AlienVault
AlienVaultAlienVault
AlienVault
 
Seguridad informática
Seguridad informáticaSeguridad informática
Seguridad informática
 
Controles de auditoria
Controles de auditoriaControles de auditoria
Controles de auditoria
 
Ids sistema de deteccion de intrusos (2)
Ids sistema de deteccion de intrusos (2)Ids sistema de deteccion de intrusos (2)
Ids sistema de deteccion de intrusos (2)
 
Windows Suricata
Windows SuricataWindows Suricata
Windows Suricata
 
Material de etica
Material de eticaMaterial de etica
Material de etica
 

Similar a Wireshark.ethereal

an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptIwan89629
 
huawei-ce7850-32q-ei-f-brochure-datasheet.pdf
huawei-ce7850-32q-ei-f-brochure-datasheet.pdfhuawei-ce7850-32q-ei-f-brochure-datasheet.pdf
huawei-ce7850-32q-ei-f-brochure-datasheet.pdfHi-Network.com
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Finalmasoodnt10
 
Howto ethereal-wireshark-trace en
Howto ethereal-wireshark-trace enHowto ethereal-wireshark-trace en
Howto ethereal-wireshark-trace enJORGE GOMEZ
 
huawei-ce7850-32q-ei-b-brochure-datasheet.pdf
huawei-ce7850-32q-ei-b-brochure-datasheet.pdfhuawei-ce7850-32q-ei-b-brochure-datasheet.pdf
huawei-ce7850-32q-ei-b-brochure-datasheet.pdfHi-Network.com
 
huawei-ce7850-32q-ei-brochure-datasheet.pdf
huawei-ce7850-32q-ei-brochure-datasheet.pdfhuawei-ce7850-32q-ei-brochure-datasheet.pdf
huawei-ce7850-32q-ei-brochure-datasheet.pdfHi-Network.com
 
Network Programming: Data Plane Development Kit (DPDK)
Network Programming: Data Plane Development Kit (DPDK)Network Programming: Data Plane Development Kit (DPDK)
Network Programming: Data Plane Development Kit (DPDK)Andriy Berestovskyy
 
How to Speak Intel DPDK KNI for Web Services.
How to Speak Intel DPDK KNI for Web Services.How to Speak Intel DPDK KNI for Web Services.
How to Speak Intel DPDK KNI for Web Services.Naoto MATSUMOTO
 
huawei-ce6850u-48s6q-hi-brochure-datasheet.pdf
huawei-ce6850u-48s6q-hi-brochure-datasheet.pdfhuawei-ce6850u-48s6q-hi-brochure-datasheet.pdf
huawei-ce6850u-48s6q-hi-brochure-datasheet.pdfHi-Network.com
 
AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)Amazon Web Services
 
Opendaylight app development
Opendaylight app developmentOpendaylight app development
Opendaylight app developmentvjanandr
 
(NET404) Making Every Packet Count
(NET404) Making Every Packet Count(NET404) Making Every Packet Count
(NET404) Making Every Packet CountAmazon Web Services
 
huawei-ce6850-48s4q-ei-brochure-datasheet.pdf
huawei-ce6850-48s4q-ei-brochure-datasheet.pdfhuawei-ce6850-48s4q-ei-brochure-datasheet.pdf
huawei-ce6850-48s4q-ei-brochure-datasheet.pdfHi-Network.com
 

Similar a Wireshark.ethereal (20)

Packet filtering using jpcap
Packet filtering using jpcapPacket filtering using jpcap
Packet filtering using jpcap
 
an_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.pptan_introduction_to_network_analyzers_new.ppt
an_introduction_to_network_analyzers_new.ppt
 
Wireshark Basics
Wireshark BasicsWireshark Basics
Wireshark Basics
 
Wireshark
Wireshark Wireshark
Wireshark
 
huawei-ce7850-32q-ei-f-brochure-datasheet.pdf
huawei-ce7850-32q-ei-f-brochure-datasheet.pdfhuawei-ce7850-32q-ei-f-brochure-datasheet.pdf
huawei-ce7850-32q-ei-f-brochure-datasheet.pdf
 
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 FinalExploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
 
Howto ethereal-wireshark-trace en
Howto ethereal-wireshark-trace enHowto ethereal-wireshark-trace en
Howto ethereal-wireshark-trace en
 
Day2
Day2Day2
Day2
 
huawei-ce7850-32q-ei-b-brochure-datasheet.pdf
huawei-ce7850-32q-ei-b-brochure-datasheet.pdfhuawei-ce7850-32q-ei-b-brochure-datasheet.pdf
huawei-ce7850-32q-ei-b-brochure-datasheet.pdf
 
huawei-ce7850-32q-ei-brochure-datasheet.pdf
huawei-ce7850-32q-ei-brochure-datasheet.pdfhuawei-ce7850-32q-ei-brochure-datasheet.pdf
huawei-ce7850-32q-ei-brochure-datasheet.pdf
 
Network Programming: Data Plane Development Kit (DPDK)
Network Programming: Data Plane Development Kit (DPDK)Network Programming: Data Plane Development Kit (DPDK)
Network Programming: Data Plane Development Kit (DPDK)
 
Unit 8 Java
Unit 8 JavaUnit 8 Java
Unit 8 Java
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
How to Speak Intel DPDK KNI for Web Services.
How to Speak Intel DPDK KNI for Web Services.How to Speak Intel DPDK KNI for Web Services.
How to Speak Intel DPDK KNI for Web Services.
 
huawei-ce6850u-48s6q-hi-brochure-datasheet.pdf
huawei-ce6850u-48s6q-hi-brochure-datasheet.pdfhuawei-ce6850u-48s6q-hi-brochure-datasheet.pdf
huawei-ce6850u-48s6q-hi-brochure-datasheet.pdf
 
AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)AWS re:Invent 2016: Making Every Packet Count (NET404)
AWS re:Invent 2016: Making Every Packet Count (NET404)
 
Opendaylight app development
Opendaylight app developmentOpendaylight app development
Opendaylight app development
 
(NET404) Making Every Packet Count
(NET404) Making Every Packet Count(NET404) Making Every Packet Count
(NET404) Making Every Packet Count
 
huawei-ce6850-48s4q-ei-brochure-datasheet.pdf
huawei-ce6850-48s4q-ei-brochure-datasheet.pdfhuawei-ce6850-48s4q-ei-brochure-datasheet.pdf
huawei-ce6850-48s4q-ei-brochure-datasheet.pdf
 
Clase 4. Routing IP.pdf
Clase 4. Routing IP.pdfClase 4. Routing IP.pdf
Clase 4. Routing IP.pdf
 

Más de gh02

Power gui 3.5_userguide. Powershell for windows
Power gui 3.5_userguide. Powershell for windowsPower gui 3.5_userguide. Powershell for windows
Power gui 3.5_userguide. Powershell for windowsgh02
 
Apache.http ftp-smtp
Apache.http ftp-smtpApache.http ftp-smtp
Apache.http ftp-smtpgh02
 
Apache.d4 admin web
Apache.d4 admin webApache.d4 admin web
Apache.d4 admin webgh02
 
Seguridad vo ip
Seguridad vo ipSeguridad vo ip
Seguridad vo ipgh02
 
Intrusion detectionsystems
Intrusion detectionsystemsIntrusion detectionsystems
Intrusion detectionsystemsgh02
 
IDS Network security - Bouvry
IDS Network security - BouvryIDS Network security - Bouvry
IDS Network security - Bouvrygh02
 
Sshmarta
SshmartaSshmarta
Sshmartagh02
 
Ssh
SshSsh
Sshgh02
 
Resumen iptables- 10 comandos mas usados de iptables
Resumen iptables- 10 comandos mas usados de iptablesResumen iptables- 10 comandos mas usados de iptables
Resumen iptables- 10 comandos mas usados de iptablesgh02
 

Más de gh02 (9)

Power gui 3.5_userguide. Powershell for windows
Power gui 3.5_userguide. Powershell for windowsPower gui 3.5_userguide. Powershell for windows
Power gui 3.5_userguide. Powershell for windows
 
Apache.http ftp-smtp
Apache.http ftp-smtpApache.http ftp-smtp
Apache.http ftp-smtp
 
Apache.d4 admin web
Apache.d4 admin webApache.d4 admin web
Apache.d4 admin web
 
Seguridad vo ip
Seguridad vo ipSeguridad vo ip
Seguridad vo ip
 
Intrusion detectionsystems
Intrusion detectionsystemsIntrusion detectionsystems
Intrusion detectionsystems
 
IDS Network security - Bouvry
IDS Network security - BouvryIDS Network security - Bouvry
IDS Network security - Bouvry
 
Sshmarta
SshmartaSshmarta
Sshmarta
 
Ssh
SshSsh
Ssh
 
Resumen iptables- 10 comandos mas usados de iptables
Resumen iptables- 10 comandos mas usados de iptablesResumen iptables- 10 comandos mas usados de iptables
Resumen iptables- 10 comandos mas usados de iptables
 

Wireshark.ethereal

  • 1. Ethereal/WireShark Tutorial Yen-Cheng Chen IM, NCNU April, 2006
  • 2.
  • 3.
  • 4. 2 1 3 List available capture interfaces Start a capture Stop the capture
  • 5. menu  main toolbar  filter toolbar  packet list pane  packet details pane  packet bytes pane  status bar ipconfig /renew
  • 10.  
  • 11.  
  • 13.  
  • 14.  
  • 15. 1 2 3 4
  • 16. 1 2
  • 17. ip.src eq 10.10.13.137 and ip.dst eq 163.22.20.16 ip.src == 10.10.13.137 || ip.src == 163.22.20.16 http && ( ip.src == 10.10.13.137 || ip.src == 163.22.20.16) ! (ip.dst == 10.10.13.137) ip.src == 10.10.13.137 && ip.dst == 163.22.20.16 Filter Expression
  • 18.  
  • 19.  
  • 20.  
  • 21. (ip.dst == 10.10.13.137) && (ip.src == 163.22.20.16)
  • 23.  
  • 24.  
  • 26. No. Time Source Destination Protocol Info 31 6.058434 10.10.13.137 163.22.20.16 HTTP GET /~ycchen/nm/ HTTP/1.1 Frame 31 (613 bytes on wire, 613 bytes captured) Ethernet II, Src: AsustekC_6a:ea:8d (00:13:d4:6a:ea:8d), Dst: 10.10.13.254 (00:02:ba:ab:74:2b) Internet Protocol, Src: 10.10.13.137 (10.10.13.137), Dst: 163.22.20.16 (163.22.20.16) Transmission Control Protocol, Src Port: 1822 (1822), Dst Port: http (80), Seq: 1, Ack: 1, Len: 559 Source port: 1822 (1822) Destination port: http (80) Sequence number: 1 (relative sequence number) Next sequence number: 560 (relative sequence number) Acknowledgement number: 1 (relative ack number) Header length: 20 bytes Flags: 0x0018 (PSH, ACK) Window size: 17520 Checksum: 0xf4f3 [correct] Hypertext Transfer Protocol
  • 28.