asked 07 Jan '17, 19:08 Saldor edited 08 Jan '17, 04:26 Jaap ♦ |
2 Answers:
If I understand the question correctly, you need a command like this:
The interface number will be the one that shows the data flowing inside the VPN tunnel. This won't work for websites accessed using SSL. Having said all of the above, it would be far easier to capture and analyse the activity using the web access log. If you are monitoring access to a Microsoft IIS web server you can read the log files into Wireshark using a free tool called TribeLab Workbench - see https://youtu.be/wHKocRR-reE answered 09 Jan '17, 05:09 PaulOfford edited 09 Jan '17, 05:11 grahamb ♦ |
Hi Saldor, Sorry about the mistake. I don't have Ubuntu but the following works on my Centos 7 machine:
My Centos machine is running a rather old release of tshark (1.10.14) and at some point the names of the time and Info columns were changed I think. Try the above and we'll tweak the column labels if necessary. answered 09 Jan '17, 23:53 PaulOfford edited 09 Jan '17, 23:54 |
I would like to clarify that I use tshark on Ubuntu, after you enter the above commands, that is what appeared.
When i run list of commands, without -i _interface_number. i get this messeage:
And then nothing happens.
I adapted this from a command to extract the data from a pcap file. I've certainly made one mistake as I don't think you can specify the -2 parameter on a live capture. Let me have a think and I'll get back to you.
PS: The following should work for a captured file:
tshark -2 -q -ta -T fields -E separator=, -E quote=d -E header=y -Y http.request.method -e frame.number -e _ws.col.Time -e ip.src -e ip.dst -e tcp.srcport -e tcp.dstport -e http.user_agent -e _ws.col.Info -r _file_name/file_path_
@Saldor: Your answers has been converted to a comments as that's how this site works. Please read the FAQ for more information.