Re: [Wireshark-users] tcpdump command to capture https traffic

2007-07-20 Thread Kaushal Shriyan

Hi Guy Harris

Thanks Guy Harris :-)

Can I have online docs to understand TCP/IP Protocol and just to understand
how the Network Packets are constructed.

Thanks a Lot

Awaiting your earnest reply

Regards

Kaushal


On 7/19/07, Guy Harris [EMAIL PROTECTED] wrote:


Kaushal Shriyan wrote:

 is it better to run tcpdump -i eth0 -s 0 -w dump host 192.168.0.1
 http://192.168.0.1/ and host 192.168.0.2 http://192.168.0.2/ and
 port 443

 or instead  tcpdump -i eth0 -s 1500 -w dump host 192.168.0.1
 http://192.168.0.1/ and host 192.168.0.2 http://192.168.0.2/ and
 port 443

 which is the best method

Assuming you're using tcpdump 3.6 or later (as per my earlier mail,
3.4[.x] and 3.5[.x] don't support -s 0):

Given that the snapshot length includes the link-layer header - i.e.,
it's *NOT* the MTU - a snapshot length of 1500 will cut off the last 14
bytes of a full-length 1514-byte Ethernet packet.  Therefore, -s 0 is
better than -s 1500.

It's also better than -s 1514, because

1) it works on all interfaces, regardless of the maximum packet
size
(i.e., you don't have to know the maximum packet size of an interface if
you just use -s 0);

2) it's 3 fewer characters to type. :-)
___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users

___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users


Re: [Wireshark-users] tcpdump command to capture https traffic

2007-07-19 Thread Les Bowditch
Do you just want traffic between 192.168.0.1 AND 192.168.0.2?  If so,
that should work.

 

Les Bowditch
Senior Network Operations Analyst

 

 

 

  

Shift Networks
Suite 320, 1121 Centre Street NW
Calgary, AB T2E 7K6
Tel: +1 (403) 536-5491
Tel: +1 (866) 963-8749
Fax: +1 (403) 770-7449
[EMAIL PROTECTED]
www.shiftnetworks.com http://www.shiftnetworks.com/  


CONFIDENTIALITY NOTICE:

The contents of this electronic mail message are confidential and
strictly reserved for the sole use of Shift Networks Inc. and the
recipient(s) indicated in the message. If you receive this message in
error, please notify the sender immediately and delete the original
message as well as all copies. E-mail transmission cannot be guaranteed
to be secure or error-free as information could be intercepted,
corrupted, lost, destroyed, arrive late or incomplete, or contain
viruses. The sender therefore does not accept liability for any errors
or omissions in the contents of this message, which arise as a result of
e-mail transmission. Any disclosure, copying, distribution or reliance
on the contents of the information is strictly prohibited. Thank you for
your cooperation.

Shift Networks Inc. 

 



From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Kaushal
Shriyan
Sent: Thursday, July 19, 2007 6:24 AM
To: Community support list for Wireshark
Subject: [Wireshark-users] tcpdump command to capture https traffic

 

Hi

I want to capture HTTPS Traffic using tcpdump command 

tcpdump -i eth0 -s 0 -w dump host 192.168.0.1 and host 192.168.0.2 and
port 443 

is the above command correct, please let me know

Best Regards

Kaushal

image001.gif___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users


Re: [Wireshark-users] tcpdump command to capture https traffic

2007-07-19 Thread Guy Harris
Kaushal Shriyan wrote:
 Thanks and what does s 0 signifies, I know s means snapshot length so 
 what does s 0 signifies

It means the maximum snapshot length, which is 65535 bytes.  (Versions 
of tcpdump prior to 3.6 require that you do -s 65535, but all later 
versions support -s 0.)
___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users


Re: [Wireshark-users] tcpdump command to capture https traffic

2007-07-19 Thread Kaushal Shriyan

Thanks Guy Harris

One more question

is it better to run tcpdump -i eth0 -s 0 -w dump host 192.168.0.1 and host
192.168.0.2 and port 443

or instead  tcpdump -i eth0 -s 1500 -w dump host 192.168.0.1 and host
192.168.0.2 and port 443

which is the best method

Thanks and Regards

Kaushal

On 7/19/07, Guy Harris [EMAIL PROTECTED] wrote:


Kaushal Shriyan wrote:
 Thanks and what does s 0 signifies, I know s means snapshot length so
 what does s 0 signifies

It means the maximum snapshot length, which is 65535 bytes.  (Versions
of tcpdump prior to 3.6 require that you do -s 65535, but all later
versions support -s 0.)
___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users

___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users


Re: [Wireshark-users] tcpdump command to capture https traffic

2007-07-19 Thread Guy Harris
Kaushal Shriyan wrote:

 is it better to run tcpdump -i eth0 -s 0 -w dump host 192.168.0.1 
 http://192.168.0.1/ and host 192.168.0.2 http://192.168.0.2/ and 
 port 443
 
 or instead  tcpdump -i eth0 -s 1500 -w dump host 192.168.0.1 
 http://192.168.0.1/ and host 192.168.0.2 http://192.168.0.2/ and 
 port 443
 
 which is the best method

Assuming you're using tcpdump 3.6 or later (as per my earlier mail, 
3.4[.x] and 3.5[.x] don't support -s 0):

Given that the snapshot length includes the link-layer header - i.e., 
it's *NOT* the MTU - a snapshot length of 1500 will cut off the last 14 
bytes of a full-length 1514-byte Ethernet packet.  Therefore, -s 0 is 
better than -s 1500.

It's also better than -s 1514, because

1) it works on all interfaces, regardless of the maximum packet size 
(i.e., you don't have to know the maximum packet size of an interface if 
you just use -s 0);

2) it's 3 fewer characters to type. :-)
___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users


Re: [Wireshark-users] tcpdump command

2007-05-18 Thread andre.noel
Hi,

 

Youa re using dst host and src host that's why.

 

To see both direction between thiese hosts try  tcpdump -i eth0 -s 1500 -w dump 
host 192.168.0.1 http://192.168.0.1  and host www.example.com 
http://www.example.com 

 

This way you will have only host to host  conversation both direction.

 

Regards.

 

===

André Noël

Analyste principal - protocoles





De : [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] De la part de Kaushal Shriyan
Envoyé : May 18, 2007 9:22
À : Community support list for Wireshark
Objet : [Wireshark-users] tcpdump command

 

Hi 

I have to capture network traffic between an appliance and content server using 
tcpdump command and then dump to a file and read and decode it using wireshark

How do i proceed 

I have used tcpdump -i eth0 -s 1500 -w dump src host 192.168.0.1 and dst host 
www.example.com

when i read the dump capture file using wireshark i could only see packets 
being sent from src host to destination host, I could not see any packets being 
sent from destination host to src host. 

Please let me know what I am doing wrong.

Thanks and Regards

Kaushal

___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users


Re: [Wireshark-users] tcpdump command

2007-05-18 Thread David Meagher

you are using src and dst filters.
this is why you are only seeing traffic going in one way
try just using the host that you are interested in
so
tcpdump -i eth0 -s 1500 -w dump2 host www.example.com

On 18/05/07, Kaushal Shriyan [EMAIL PROTECTED] wrote:


Hi

I have to capture network traffic between an appliance and content server
using tcpdump command and then dump to a file and read and decode it using
wireshark

How do i proceed

I have used tcpdump -i eth0 -s 1500 -w dump src host 192.168.0.1 and dst
host www.example.com

when i read the dump capture file using wireshark i could only see packets
being sent from src host to destination host, I could not see any packets
being sent from destination host to src host.

Please let me know what I am doing wrong.

Thanks and Regards

Kaushal

___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users





--
The famous philosopher Rene Descartes walked into a bar.
Can I get you a drink?, the barman asked.
I think not, Descartes replied... and instantly disappeared in a puff of
smoke.
___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users


Re: [Wireshark-users] tcpdump command

2007-05-18 Thread Guy Harris
Kaushal Shriyan wrote:

 I have to capture network traffic between an appliance and content 
 server using tcpdump command and then dump to a file and read and decode 
 it using wireshark
 
 How do i proceed
 
 I have used tcpdump -i eth0 -s 1500 -w dump src host 192.168.0.1 
 and dst host www.example.com

See other replies for why that filter isn't right (it explicitly asks to 
only see packets sent from the source host to the destination host; 
you'd want host 192.168.0.1 and host www.example.com - or host 
192.168.0.1 and www.example.com; they're equivalent - to capture all 
traffic between 192.168.0.1 and www.example.com).

However, -s 1500 will give you only the first 1500 bytes of an 
Ethernet packet - *including* the Ethernet header; that means that a 
full-sized Ethernet packet, with 1514 bytes (14 bytes of Ethernet header 
and 1500 bytes of payload) will only have the first 1486 bytes of 
payload captured.

The largest -s value is 65535; you can either do -s 65535 or, with 
newer versions of tcpdump, -s 0 to get the full packet.  (Wireshark 
tells dumpcap to use a snapshot length of 65535 by default, and TShark 
uses a snapshot length of 65535 by default.)

Note also that the rules for capture filters in tcpdump are exactly the 
same as they are in Wireshark and TShark (because they're implemented 
with the same code).
___
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users