Re: [Wireshark-users] tcpdump command to capture https traffic

2007-07-20 Thread Kaushal Shriyan

Hi Guy Harris

Thanks Guy Harris :-)

Can I have online docs to understand TCP/IP Protocol and just to understand
how the Network Packets are constructed.

Thanks a Lot

Awaiting your earnest reply

Regards

Kaushal


On 7/19/07, Guy Harris [EMAIL PROTECTED] wrote:


Kaushal Shriyan wrote:

 is it better to run tcpdump -i eth0 -s 0 -w dump host 192.168.0.1
 http://192.168.0.1/ and host 192.168.0.2 http://192.168.0.2/ and
 port 443

 or instead  tcpdump -i eth0 -s 1500 -w dump host 192.168.0.1
 http://192.168.0.1/ and host 192.168.0.2 http://192.168.0.2/ and
 port 443

 which is the best method

Assuming you're using tcpdump 3.6 or later (as per my earlier mail,
3.4[.x] and 3.5[.x] don't support -s 0):

Given that the snapshot length includes the link-layer header - i.e.,
it's *NOT* the MTU - a snapshot length of 1500 will cut off the last 14
bytes of a full-length 1514-byte Ethernet packet.  Therefore, -s 0 is
better than -s 1500.

It's also better than -s 1514, because

1) it works on all interfaces, regardless of the maximum packet
size
(i.e., you don't have to know the maximum packet size of an interface if
you just use -s 0);

2) it's 3 fewer characters to type. :-)
___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users

___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users


Re: [Wireshark-users] tcpdump command to capture https traffic

2007-07-19 Thread Les Bowditch
Do you just want traffic between 192.168.0.1 AND 192.168.0.2?  If so,
that should work.

 

Les Bowditch
Senior Network Operations Analyst

 

 

 

  

Shift Networks
Suite 320, 1121 Centre Street NW
Calgary, AB T2E 7K6
Tel: +1 (403) 536-5491
Tel: +1 (866) 963-8749
Fax: +1 (403) 770-7449
[EMAIL PROTECTED]
www.shiftnetworks.com http://www.shiftnetworks.com/  


CONFIDENTIALITY NOTICE:

The contents of this electronic mail message are confidential and
strictly reserved for the sole use of Shift Networks Inc. and the
recipient(s) indicated in the message. If you receive this message in
error, please notify the sender immediately and delete the original
message as well as all copies. E-mail transmission cannot be guaranteed
to be secure or error-free as information could be intercepted,
corrupted, lost, destroyed, arrive late or incomplete, or contain
viruses. The sender therefore does not accept liability for any errors
or omissions in the contents of this message, which arise as a result of
e-mail transmission. Any disclosure, copying, distribution or reliance
on the contents of the information is strictly prohibited. Thank you for
your cooperation.

Shift Networks Inc. 

 



From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Kaushal
Shriyan
Sent: Thursday, July 19, 2007 6:24 AM
To: Community support list for Wireshark
Subject: [Wireshark-users] tcpdump command to capture https traffic

 

Hi

I want to capture HTTPS Traffic using tcpdump command 

tcpdump -i eth0 -s 0 -w dump host 192.168.0.1 and host 192.168.0.2 and
port 443 

is the above command correct, please let me know

Best Regards

Kaushal

image001.gif___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users


Re: [Wireshark-users] tcpdump command to capture https traffic

2007-07-19 Thread Guy Harris
Kaushal Shriyan wrote:
 Thanks and what does s 0 signifies, I know s means snapshot length so 
 what does s 0 signifies

It means the maximum snapshot length, which is 65535 bytes.  (Versions 
of tcpdump prior to 3.6 require that you do -s 65535, but all later 
versions support -s 0.)
___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users


Re: [Wireshark-users] tcpdump command to capture https traffic

2007-07-19 Thread Kaushal Shriyan

Thanks Guy Harris

One more question

is it better to run tcpdump -i eth0 -s 0 -w dump host 192.168.0.1 and host
192.168.0.2 and port 443

or instead  tcpdump -i eth0 -s 1500 -w dump host 192.168.0.1 and host
192.168.0.2 and port 443

which is the best method

Thanks and Regards

Kaushal

On 7/19/07, Guy Harris [EMAIL PROTECTED] wrote:


Kaushal Shriyan wrote:
 Thanks and what does s 0 signifies, I know s means snapshot length so
 what does s 0 signifies

It means the maximum snapshot length, which is 65535 bytes.  (Versions
of tcpdump prior to 3.6 require that you do -s 65535, but all later
versions support -s 0.)
___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users

___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users


Re: [Wireshark-users] tcpdump command to capture https traffic

2007-07-19 Thread Guy Harris
Kaushal Shriyan wrote:

 is it better to run tcpdump -i eth0 -s 0 -w dump host 192.168.0.1 
 http://192.168.0.1/ and host 192.168.0.2 http://192.168.0.2/ and 
 port 443
 
 or instead  tcpdump -i eth0 -s 1500 -w dump host 192.168.0.1 
 http://192.168.0.1/ and host 192.168.0.2 http://192.168.0.2/ and 
 port 443
 
 which is the best method

Assuming you're using tcpdump 3.6 or later (as per my earlier mail, 
3.4[.x] and 3.5[.x] don't support -s 0):

Given that the snapshot length includes the link-layer header - i.e., 
it's *NOT* the MTU - a snapshot length of 1500 will cut off the last 14 
bytes of a full-length 1514-byte Ethernet packet.  Therefore, -s 0 is 
better than -s 1500.

It's also better than -s 1514, because

1) it works on all interfaces, regardless of the maximum packet size 
(i.e., you don't have to know the maximum packet size of an interface if 
you just use -s 0);

2) it's 3 fewer characters to type. :-)
___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users