Wireshark is the world’s foremost network protocol analyzer, but the rich feature set can be daunting for the unfamiliar. This document is part of an effort by the Wireshark team to improve Wireshark’s usability. We hope that you find it useful and look forward to your comments.

Wireshark是世界第一流的网络协议分析器,但是丰富的特性套件让不熟悉它的人望而生畏。Wireshark团队希望此文档能提高Wireshark的可用性  。希望你觉的它有用,最好能看到你的评论。

2. Who should read this document? 此文档适合谁?

The intended audience of this book is anyone using Wireshark.

This book explains all of the basic and some advanced features of Wireshark. As Wireshark has become a very complex program, not every feature may be explained in this book.

This book is not intended to explain network sniffing in general and it will not provide details about specific network protocols. A lot of useful information regarding these topics can be found at the Wireshark Wiki at https://wiki.wireshark.org/.

By reading this book, you will learn how to install Wireshark, how to use the basic elements of the graphical user interface (such as the menu) and what’s behind some of the advanced features that are not always obvious at first sight. It will hopefully guide you around some common problems that frequently appear for new (and sometimes even advanced) Wireshark users.

本书的目标读者是任何一个Wireshark的使用者。

本书解释了Wireshark的素有基本特性和部分高级特性。由于Wireshark是如此的复杂,所以此书并未包含所有的特性。

本书不会解释常见的网络嗅探,也不会对特定的网络协议提供详细解说。在Wireshark Wiki上可以找到很多与此主题相关的信息,Wiki地址 https://wiki.wireshark.org/

阅读本书,你将学会如何安装Wireshark,如何使用图形界面上的基本元素(例如菜单),以及隐藏在部分高级功能背后的特性,这些往往没法一目了然。希望这本书能帮你解决一些Wireshark新用户经常遇到的问题。

3. Acknowledgements

The authors would like to thank the whole Wireshark team for their assistance. In particular, the authors would like to thank:

  • Gerald Combs, for initiating the Wireshark project and funding to do this documentation.
  • Guy Harris, for many helpful hints and a great deal of patience in reviewing this document.
  • Gilbert Ramirez, for general encouragement and helpful hints along the way.

The authors would also like to thank the following people for their helpful feedback on this document:

  • Pat Eyler, for his suggestions on improving the example on generating a backtrace.
  • Martin Regner, for his various suggestions and corrections.
  • Graeme Hewson, for many grammatical corrections.

The authors would like to acknowledge those man page and README authors for the Wireshark project from who sections of this document borrow heavily:

作者感谢整个Wireshark团队的工作支持。尤其要感谢:

  • Gerald Combs, for initiating the Wireshark project and funding to do this documentation.
  • Guy Harris, for many helpful hints and a great deal of patience in reviewing this document.
  • Gilbert Ramirez, for general encouragement and helpful hints along the way.

作者同样感谢以下人员对本书的有效反馈:

  • Pat Eyler, for his suggestions on improving the example on generating a backtrace.
  • Martin Regner, for his various suggestions and corrections.
  • Graeme Hewson, for many grammatical corrections.

4. About this document 关于本书

This book was originally developed by Richard Sharpe with funds provided from the Wireshark Fund. It was updated by Ed Warnicke and more recently redesigned and updated by Ulf Lamping.

It was originally written in DocBook/XML and converted to AsciiDoc by Gerald Combs.

此书最初由 Richard Sharpe 创建,Wireshark基金会提供资金支持。后来由Ed Warnicke 更新,最近由Ulf Lamping重新设计和更新。本书最初以DocBook/XML编写,由Gerald Combs转成AsciiDoc。

5. Where to get the latest copy of this document?

The latest copy of this documentation can always be found at https://www.wireshark.org/docs/.

本文档的最新版本可以在https://www.wireshark.org/docs/找到

6. Providing feedback about this document

Should you have any feedback about this document, please send it to the authors through wireshark-dev[AT]wireshark.org.

如果你对本文档有任何反馈,请发送给作者。wireshark-dev[AT]wireshark.org

7. Typographic Conventions

The following table shows the typographic conventions that are used in this guide.

以下表格列出了本文档中用到的约定版式

Table 1. Typographic Conventions 约定版式

Style 样式 Description 描述 Example 案例

Italic 斜体

File names, folder names, and extensions

C:\Development\wireshark.

Monospace 等宽字体

Commands, flags, and environment variables

CMake’s -G option.

Bold Monospace 粗体等宽字体

Commands that should be run by the user 用户执行的命令

Run cmake -G Ninja ...

Button

Dialog and window buttons 对话框或窗口按钮

Press Launch to go to the Moon.

Key

Keyboard shortcut 快捷键

Press Ctrl+Down to move to the next packet.

Menu

Menu item 菜单项

Select Go → Next Packet to move to the next packet.

7.1. Admonitions

Important and notable items are marked as follows:重要事项和注意事项如下标记:

This is a warning 警告

You should pay attention to a warning, otherwise data loss might occur.

This is a note 注意

A note will point you to common mistakes and things that might not be obvious.

This is a tip 提示

Tips are helpful for your everyday work using Wireshark.

7.2. Shell Prompt and Source Code Examples 提示符和源码案例

Bourne shell, normal user. 运行脚本,普通用户

$ # This is a comment
$ git config --global log.abbrevcommit true

Bourne shell, root user. 运行脚本,root用户

# # This is a comment
# ninja install

Command Prompt (cmd.exe).  命令提示符

>rem This is a comment
>cd C:\Development

PowerShell.  全新命令行

PS$># This is a comment
PS$>choco list -l

C Source Code. C语言代码

#include "config.h"

/* This method dissects foos */
static int
dissect_foo_message(tvbuff_t *tvb, packet_info *pinfo _U_, proto_tree *tree _U_, void *data _U_)
{
/* TODO: implement your dissecting code */
return tvb_captured_length(tvb);
}

Wireshark 序的更多相关文章

  1. Wireshark抓包实例分析TCP重复ACK与乱序

    转载请在文首保留原文出处: EMC 中文支持论坛https://community.emc.com/go/chinese 介绍 TCP 的一大常见问题在于重复 ACK 与快速重传.这一现象的发生也是由 ...

  2. Wireshark理解TCP乱序重组和HTTP解析渲染

    TCP数据传输过程 TCP乱序重组原理 HTTP解析渲染 TCP乱序重组 TCP具有乱序重组的功能.(1)TCP具有缓冲区(2)TCP报文具有序列号所以,对于你说的问题,一种常见的处理方式是:TCP会 ...

  3. wireshark和tcpdump抓包TCP乱序和重传怎么办?PCAP TCP排序工具分享

    点击上方↑↑↑蓝字[协议分析与还原]关注我们 " 介绍TCP排序方法,分享一个Windows版的TCP排序工具." 在分析协议的过程中,不可避免地需要抓包. 无论抓包条件如何优越, ...

  4. wireshark 相关提示

    Packet size limited during capture      提示说明标记的包没有抓全,在某些操作系统中,默认只抓96个字节,tcpdump中有"-s"参数可用于 ...

  5. wireshark使用方法总结

    Wireshark基本用法 抓取报文: 下载和安装好Wireshark之后,启动Wireshark并且在接口列表中选择接口名,然后开始在此接口上抓包.例如,如果想要在无线网络上抓取流量,点击无线接口. ...

  6. 【转】Wireshark基本用法

    原地址:http://blog.jobbole.com/70907/ 按照国际惯例,从最基本的说起. 抓取报文: 下载和安装好Wireshark之后,启动Wireshark并且在接口列表中选择接口名, ...

  7. IM通信协议逆向分析、Wireshark自定义数据包格式解析插件编程学习

    相关学习资料 http://hi.baidu.com/hucyuansheng/item/bf2bfddefd1ee70ad68ed04d http://en.wikipedia.org/wiki/I ...

  8. tcp抓包 Wireshark 使用

    fidder主要是针对http(s)协议进行抓包分析的,所以类似wireshark/tcpdump这种工作在tcp/ip层上的抓包工具不太一样,这种工具一般在chrome/firefox的开发者工具下 ...

  9. 一站式学习Wireshark(五):TCP窗口与拥塞处理

    https://community.emc.com/message/821593#821593 介绍 TCP通过滑动窗口机制检测丢包,并在丢包发生时调整数据传输速率.滑动窗口机制利用数据接收端的接收窗 ...

随机推荐

  1. Java 之 字节输入流 [InputStream]

    一.字节输入流 java.io.InputStream 抽象类是表示字节输入流的所有类的超类,可以读取字节信息到内存中. 它定义了字节输入流的基本共性功能方法. 共性方法: public void c ...

  2. layui列表表单

    列表: <!DOCTYPE html> <html> <head> <meta charset="utf-8"> <title ...

  3. 查看安装的centos的操作系统版本

    cat /etc/redhat-release CentOS Linux release 7.6.1810 (Core)

  4. windows10下安装tensorflow2.0-GPU和Cupy(不用搞CUDA+cudnn)

    0.前言 今年暑假买了个1660ti的游戏本学python,后来发现跑一些数据量比较大的代码和深度学习的时候太慢了,遂想装一下GPU版本,看了网上的资料搞了好几天,又是CUDA又是cudnn的,网速慢 ...

  5. 云计算---openstack创建虚拟机过程

     虚拟机创建过程: (1)界面或命令行通过RESTful API向keystone获取认证信息.(2)keystone通过用户请求认证信息,并生成auth-token返回给对应的认证请求.(3)界面或 ...

  6. 0020SpringBoot使用SpringCloud中的eureka实现远程调用

    要实现远程调用,主要需要三个module:一个注册中心.一个服务提供者.一个服务消费者,然后进行各自的配置和编码,详细内容如下: 1.建一个空的project,创建3各module a.注册中心模块 ...

  7. 一个s的力量——http与https

    我们网络上有很多资源,那么我们怎么来访问呢?就拿一个小例子来说,我们都会用百度来搜索东西,就会在地址栏中输入这样的地址http://www.baidu.com这种访问方式就是通过URL来实现的,那么什 ...

  8. C#格式化信息,格式化数字、格式化日期

    一.格式化方法: 1.ToString()实例方法 使用当前文化: varname.ToString("C4"); 使用特定文化: varname.ToString("C ...

  9. Vue中img的src属性绑定

    正确:<img :src=" 'files/'+value.src "> 或 <img :src="value.src">错误:< ...

  10. windows下递归删除指定文件和文件夹

    //删除文件del *.后缀 /s//删除文件夹for /r 目录 %a in (文件夹名\) do @if exist "%a" rd /s/q "%a"