Hello Dev Team,

I use Tshark for network monitoring and sniffing of malicious traffic at 
work and I am trying to figure out how I can get Tshark to stop showing 
packets that are TCP [TCP segment of a reassembled PDU] and HTTP 
Continuation or non-HTTP traffic.

I only need this in Tshark and not Wireshark. I use tshark Live to view 
any incoming attacks (SYN Floods, ACK, Flood, UDP, Floods) and when I do 
see an attack sometimes my out put is flooded with [TCP segment of a 
reassembled PDU] and HTTP Continuation or non-HTTP traffic responses.

Sincerely,
-- 


Domingo J. Ponce

Prolexic Technologies

SOC Engineer

+1954-620-6002 ext 911

___________________________________________________________________________
Sent via:    Wireshark-dev mailing list <[email protected]>
Archives:    http://www.wireshark.org/lists/wireshark-dev
Unsubscribe: https://wireshark.org/mailman/options/wireshark-dev
             mailto:[email protected]?subject=unsubscribe

Reply via email to