In my current pcap file, I have over 500 TCP streams and UDP streams (according to the Statistics -> Conversations in Wireshark). But many of them only have a few packets being passed between the source and destination. I want to analyze the streams that have more than, say 100 packets, sent from A to B. I saw a way to save tcp streams to separate pcap files here: https://ask.wireshark.org/questions/4677/easy-way-to-save-tcp-streams But that command saves all the tcp streams, which I don't need. As a matter of fact, I don't need all the payload either, I only want all the basic information of each stream saved in a separate file. I thought about exporting straight from Wireshark, but that wouldn't group them according to individual flows. So basically, I want a way to save all the packet information (without the payload) of every flow (that has more than 100 packets) in separate files. Is there anyway to do this? Thanks for the help! asked 10 Dec '16, 20:54 mrk |
One Answer:
You can do this with TraceWrangler, using the latest semi-automated build available here: https://www.tracewrangler.com/download/automated/
You should get a sub directory called "extracted" with one file per flow. answered 12 Dec '16, 05:36 Jasper ♦♦ |
Thank you! This is exactly what I wanted