Hi everyone, I am running tshark on a WAP to make various analyses of my clients' traffic. One of the things I do is monitor all DNS requests to find out which hosts the clients want to access. All I basically want for further processing (in Python) is the source MAC and DNS name of every query, so i came up with the following command...
...and it's working, basically, but some of the tshark output lines start with some kind of sequence number, like this: c4:43:8f:c5:60:5c i.instagram.com What are those and how can I get rid of them? As I said, I'm only interested in who asks for which address to resolve. Thanks in advance for any help. asked 30 Apr '15, 09:51 teenious |
One Answer:
That's the packet count number. See the answer to a similar question.
Regards answered 30 Apr '15, 12:07 Kurt Knochner ♦ Thank you very much, Kurt, upgrading tshark solved my problem. I'm a bit embarrassed I didn't stumble upon the other thread myself, but then again, my searches for "packet number" and "sequence number" didn't yield a lot of useful results... (01 May '15, 10:13) teenious |
tshark version and host OS?
It's tshark 1.10.6 on xubuntu 14.04