I like to see the list of TCP streams from my packet capture. Something like this: I looked at Statistics/FlowGraphs, but that seems to show all the SYN/ACK details in each stream (too much information to go though). I looked at Statistics/ConversationList, but that appears to combine the first and the third in the example above (not enough information).This would be so I can document the traffic going between my application servers. For instance: workstation A talks to server B, which starts server B talking to server C, etc. Is there a way to do this in Wireshare, or am I incorrect in my assumptions? Thanks! asked 13 Sep '11, 15:14 Chris edited 13 Sep '11, 23:17 Jaap ♦ |
One Answer:
The functionality that matches your request the most is "Statistics -> Conversations" and then the TCP tab, it will show you the details of every single TCP session in the tracefile. If you need the output to be exactly like the table you included in your question, then you would need to do some scripting or programming yourself. You can either use LUA within Wireshark or use tshark with some shell scripting (or perl or ...). answered 13 Sep '11, 23:50 SYN-bit ♦♦ |
Thanks! That is what I was looking for. I copied it from there to Excel after that for further analysis. It looks like your suggestion will reduce my work from looking at 100,000 packets to looking at 1,000 conversations :).