Hello Dev Team, I use Tshark for network monitoring and sniffing of malicious traffic at work and I am trying to figure out how I can get Tshark to stop showing packets that are TCP [TCP segment of a reassembled PDU] and HTTP Continuation or non-HTTP traffic.
I only need this in Tshark and not Wireshark. I use tshark Live to view any incoming attacks (SYN Floods, ACK, Flood, UDP, Floods) and when I do see an attack sometimes my out put is flooded with [TCP segment of a reassembled PDU] and HTTP Continuation or non-HTTP traffic responses. Sincerely, -- Domingo J. Ponce Prolexic Technologies SOC Engineer +1954-620-6002 ext 911 ___________________________________________________________________________ Sent via: Wireshark-dev mailing list <[email protected]> Archives: http://www.wireshark.org/lists/wireshark-dev Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev mailto:[email protected]?subject=unsubscribe
