Wireshark 基础 | 显示过滤篇

目录

Wireshark 基础 | 显示过滤篇_第1张图片

简介

「Wireshark 显示过滤」(display filter),即通过过滤筛选,需要显示哪些特定的数据包。

作用

显示过滤器允许将注意力集中在感兴趣的数据包上,同时隐藏当前不感兴趣的数据包。

允许只显示数据包基于:
● 协议
● 字段是否存在
● 字段值
● 字段间的比较
● …

语言

显示过滤器语言由 Wireshark 自身提供,通过不同的过滤表达式可以能够精确地控制显示哪些数据包。

建议

学习资源详见官方文档,包括 Wiki DisplayFilters 和 Display Filters 语法 。


语法

过滤器表达式

[not] primitive [and|or [not] primitive ...]

过滤器表达式由一个或多个原语组成

[x] x为可选
x|y 选x或y
x为必选
xyz xyz为关键字,必需
and(&&)、or(||)、not(!) 代表与、或、非


原语格式

格式

Protocol[.string1.string2...stringN] [Comparison operator] [Value]

protocol

eth、ip、arp、tcp、udp 等。

支持的协议,View → Internals → Supported Protocols


string

addr、port、flags、flags.syn、len 等。

示例

eth.addr == ff:ff:ff:ff:ff:ff
tcp.port == 80
tcp.flags
tcp.flags.syn == 1
ip.len <= 60
...

comparison operator

eq(==)、ne(!=)、gt(>)、lt(<)、ge(>=)、le(<=)、contains、matches(~)、bitiwise_and(&)

示例

ip.src == 10.0.0.5
ip.src != 10.0.0.5
frame.len > 10
frame.len < 128
frame.len ge 0x100
frame.len <= 0x20
udp contains 81:60:03
http.host matches "ace\.(org|com|net)"
tcp.flags & 0x02
...

!= 注意事项

ip.addr == 1.2.3.4,显示所有包括 IP 地址 1.2.3.4 的数据包

ip.addr != 1.2.3.4,显示所有不包括 IP 地址 1.2.3.4 的数据包?语法错误!对于源或目的 IP 地址为 1.2.3.4 的包,该表达式也适用。因为 ip.addr != 1.2.3.4 表达式被理解为 “the packet contains a field named ip.addr with a value different from 1.2.3.4” 。IP 数据包包含源和目的 IP 地址,当两个地址中至少有一个与 1.2.3.4 不同时,表达式的值将为 true!(ip.addr == 1.2.3.4),显示所有不包括 I P地址 1.2.3.4 的数据包

版本 3.6.0 之后“a != b”已经完全等同于“!(a == b)”。


value

Unsigned integer
可以为 8,16,24,32 或 64 bit 。
十进制、八进制或十六进制表示整数。

示例

ip.len le 1500
ip.len le 02734
ip.len le 0x5dc

Signed integer
可以为8,16,24,32或64 bit。
十进制、八进制或十六进制表示整数。

Boolean
1(真)或 0(假)

无论值是真还是假,布尔值字段都会出现。

譬如 tcp.flags.syn ,syn 存在于所有包含该标志的 TCP 数据包中,无论 syn 标志是 0 还是 1 。

示例

tcp.flags.syn == 1

Ethernet address
6 字节,通过 :,. ,或者 - 分隔。

示例

eth.dst == ff:ff:ff:ff:ff:ff
eth.dst == ff-ff-ff-ff-ff-ff
eth.dst == ffff.ffff.ffff

IPv4 address
示例

ip.addr == 192.168.0.1
ip.addr == 10.1.0.0/16

IPv6 address
示例

ipv6.addr == ::1
ipv6.addr == 2400:640:100:100::/64

Text string
示例

http.request.uri == "https://www.wireshark.org/" 

联合表达式

and(&&)

Logical AND

示例

ip.src==10.0.0.1 and tcp.flags.fin

or(||)

Logical OR

示例

ip.scr==10.0.0.1 or ip.src==192.168.1.1

xor(^^)

Logical XOR

示例

tr.dst[0:3] == 0.6.29 xor tr.src[0:3] == 0.6.29

Wireshark 目前版本实际不支持


not(!)

Logical NOT

示例

not arp

[…]

Subsequence

示例

eth.src[0:3] == 00:00:83
前三个字节以 00:00:83 开始的以太网源 mac 地址

eth.src[1-2] == 00:83
第二到第三个字节为 00:83 的以太网源 mac 地址

eth.src[:4] == 00:00:83:00
前四个字节以 00:00:83:00 开始的以太网源 mac 地址

eth.src[4:] == 20:20
最后两个字节以 20:20 结尾的以太网源 mac 地址

eth.src[2] == 833 个字节为 83 的以太网源 mac 地址

eth.src[0:3,1-2,:4,4:,2] == 00:00:83:00:83:00:00:83:00:20:20:83
复合范围

● Slice Operator,Wireshark 允许选择序列的子序列,在标签之后可以放置一对方括号 [],其中包含逗号分隔的范围说明符列表。

● 指定单个范围的格式:
n:m,n 是起始偏移量,m 是指定的范围的长度;
n-m,n 是起始偏移量,m 是结束偏移量;
:m,等同于 0:m ,从一个序列的起始偏移 m ;
n:,从偏移量 n 到序列的结尾;
n,等同于 n:1 ,从偏移量 n 开始偏移 1 。

● Wireshark 允许将单个范围串在逗号分隔的列表中,形成复合范围。


in

Set Membership

示例

tcp.port in {80 443 8080}
tcp 源或目的端口为 804438080 的数据包,等同于 tcp.port == 80 || tcp.port == 443 || tcp.port == 8080
    
tcp.port in {443 4430..4434}
不等同于 tcp.port == 443 || (tcp.port >= 4430 && tcp.port <= 4434)
因为当任意字段匹配过滤器时都满足比较运算符,所以源端口为 56789 ,目的端口为 80 的数据包也会匹配第二个过滤器,因为 56789 >= 4430 && 80 <= 4434为真。

http.request.method in {"HEAD" "GET"}

ip.addr in {10.0.0.1..10.0.0.9 192.168.1.1..192.168.1.9}

frame.time_delta in {0.001 .. 0.002}
...

● Membership Operator,Wireshark 允许测试字段在一组值或字段中的成员关系。在字段名之后,使用 in 操作符,后跟大括号 {} 包围的集合项。
● 当任意字段匹配过滤器时都满足比较运算符。
● 成员资格操作符根据范围条件测试单个字段。
● 集合项不仅限于数字,其他类型也可以使用。


函数

显示过滤器语言有许多转换字段的函数。

upper

将字符串字段转换为大写。


lower

将字符串字段转换为小写。

示例

lower(http.server) contains "apache"
upper 和 lower 函数可以用来强制不区分大小写的匹配

len

返回字符串或字节字段的字节长度。

示例

len(http.request.uri) > 100
查找具有长请求 uri 的 HTTP 请求

len(ip.addr) == 4
len 函数生成的字符串长度是以字节为单位

count

返回在一个帧中出现字段的数目。

示例

count(ip.addr) > 2
通常一个IP帧只有两个地址(源和目的),但是在 ICMP 错误或隧道的情况下,单个数据包可能包含更多的地址。

string

将非字符串字段转换为字符串。

示例

string(frame.number) matches "[13579]$"
匹配奇数帧序号

string(ip.dst) matches "^172\.(1[6-9]|2[0-9]|3[0-1])\..{1,3}\.255"
匹配以 255 结尾的 172.16-172.31 子网里的目的 IP
...

● string 函数将字段值转换为字符串,适用于操作符“matches”或“contains”。
● 整数字段被转换为十进制表示。
● 可以用于 IP/以太网地址(以及其他地址),但不能用于字符串或字节字段。


表达式

对话框

Fidle name

协议字段树中选择一个协议字段。通过展开协议名,可以获得用于筛选该协议的字段名的列表。

TCP

tcp.ack,Acknowledgment number

tcp.analysis,SEQ/ACK analysis

tcp.checksum,Checksum

tcp.flags,Flags
...

IPv4

ip.addr,Source or Destination address

ip.checksum,Header checksum

ip.dst,Destination

ip.id,Identification
...


Relation

从可用关系列表中选择一个关系。

is present,一元关系,数据包中存在所选择字段即为真

==!=><>=<=、contains、matches、in,二元关系,输入一个值,可能还有一些范围信息

Value

在“值”文本框中输入适当的值。该值还将指示选择字段名的值的类型(如字符串)。


Predefined Values

一些协议字段具有预定义值可用。


Search

允许搜索完整或部分字段名称或描述。支持正则表达式。


Range

偏移:长度,一组整数或一组范围。


示例

Frame

frame

Frame

frame

frame.encap_type

Encapsulation type

frame.encap_type == 1,Ethernet

frame.time_delta

Time delta from previous captured frame

frame.time_delta <= 0.0001

frame.time_delta_displayed

Time delta from previous displayed frame

frame.number

Frame Number

frame.nubmer == 100

frame.len

Frame length on the wire

frame.len <= 60

frame.cap_len

Frame length stored into the capture file

frame.cap_len <= 60

frame.marked

Frame is marked in the GUI

frame.marked == 0,False

frame.ignored

Frame is ignored by the dissectors

frame.ignored == 0,False

frame.protocols

Protocols carried by this frame

frame.protocols == "eth:ethertype:arp"
frame.protocols == "eth:ethertype:ip:tcp"
frame.protocols == "eth:ethertype:ip:tcp:data"
frame.protocols == "eth:ethertype:ip:udp:data"

frame.coloring_rule.name

The frame matched the coloring rule with this name

frame.coloring_rule.name == "ARP"
frame.coloring_rule.name == "TCP"
frame.coloring_rule.name == "UDP"

frame.coloring_rule.string

The frame matched this coloring rule string

frame.coloring_rule.string == "arp"
frame.coloring_rule.string == "tcp"
frame.coloring_rule.string == "udp"

frame.packet_flags

Packet flags

frame.packet_flags
frame.packet_flags_crc_error
frame.packet_flags_packet_too_error
frame.packet_flags_packet_too_short_error

Ethernet II

eth

Ethernet

eth

eth.addr

Source or Destination Hardware Address

eth.addr == 01:00:2b:63:b3:32

eth.dst

Destination Hardware Address

eth.dst == 01:00:2b:63:b3:32

eth.dst.lg

Specifies if this is an locally administered or globally unique(IEEE assigned) address

eth.dst.lg == 0,Globally unique address(factory default)
eth.dst.lg == 1,Locally administered address(this is NOT the factory default)

eth.dst.ig

Specifies if this is an individual(unicast) or group (broadcast/multicast) address

eth.dst.ig == 0,单播
eth.dst.ig == 1,组播

eth.src

Source Hardware Address

eth.src == 01:00:2b:63:b3:32

eth.src.lg

Specifies if this is an locally administered or globally unique(IEEE assigned) address

eth.src.lg == 0,Globally unique address(factory default)
eth.src.lg == 1,Locally administered address(this is NOT the factory default)

est.src.ig

Specifies if this is an individual(unicast) or group (broadcast/multicast) address

eth.src.ig == 0,单播
eth.src.ig == 1,组播

eth.type

Type

eth.type == 0x0800,IPv4

eth.fcs

Frame check sequence

eth.fcs.status

FCS Status

eth.fcs_bad

Bad checksum

eth.len

Length

eth.padding

Padding

eth.padding

eth.trailer

Trailer

eth.trailer

ARP

arp

Address Resolution Protocol

arp

arp.hw.type

Hardware type

arp.hw.type == 1,Ethernet

arp.proto.type

Protocol type

arp.proto.type == 0x0800,IPv4

arp.hw.size

Hardware size

arp.hw.size == 6

arp.proto.size

Protocol size

arp.proto.size == 4

arp.opcode

Opcode

arp.opcode == 1,request

arp.isgratuitous

Is gratuitous

arp.isgratuitous == 1,True
arp.isgratuitous == 0,False

arp.src.hw_mac

Sender MAC address

arp.src.hw_mac == 01:00:2c:65:b2:32

arp.src.proto_ipv4

Sender IP address

arp.src.proto_ipv4 == 10.1.1.1

arp.dst.hw_mac

Target MAC address

arp.dst.hw_mac == 01:00:2c:65:b2:32

arp.dst.proto_ipv4

Target IP address

arp.dst.proto_ipv4 == 10.1.1.1

arp.duplicate-address-detected

Duplicate IP address configured

arp.duplicate-address-frame

Frame showing earlier use of IP address

arp.packet-storm-detected

ARP packet storm detected

IPv4

ip

Internet Protocol Version 4

ip

ip.version

Version

ip.version == 4

ip.hdr_len

Header Length

ip.hdr_len == 20

ip.dsfield

Differentiated Services Field

ip.dsfield == 0x00

ip.dsfield.dscp

Differentiated Services Codepoint

ip.dsfield.dscp == 0

ip.dsfield.ecn

Explicit Congestion Notification

ip.dsfield.ecn == 0

ip.len

Total Length

ip.len <= 60

ip.id

Identification

ip.id == 0x0000

ip.flags

Flags

ip.flags == 0x4000,Don't fragment

ip.flags.rb

Reserved bit

ip.flags.rb == 0,Not set

ip.flags.df

Don't fragment
    
ip.flags.df == 1

ip.flags.mf

More fragments

ip.flags.mf == 0,Not set

ip.frag_offset

Fragment offset

ip.frag_offset == 0

ip.ttl

Time to live

ip.ttl <= 60

ip.proto

Protocol

ip.proto == 6,TCP
ip.proto == 17,UDP

ip.checksum

Header checksum

ip.checksum == 0xef15

ip.src

Source

ip.src == 10.1.1.1

ip.dst

Destination

ip.dst == 10.1.1.1

ip.fragment

ip.fragment · IPv4 Fragment
ip.fragment.count · Fragment
ip.fragment.error · Defragmentation error

ip.fragments

IPv4 Fragments

ip.opt

ip.opt.addr · IP Address
ip.opt.flag · Flag
ip.opt.id_number · ID Number
ip.opt.len · Length
ip.opt.mtu · MTU
ip.opt.padding · Padding
ip.opt.sid · Stream Identifier
ip.opt.type · Type

ip.reassembled

ip.reassembled.data · Reassembled IPv4 data
ip.reassembled.length · Reassembled IPv4 length
ip.reassembled_in · Reassembled IPv4 in frame

TCP

tcp

Transmission Control Protocol

tcp

tcp.srcport

Source Port

tcp.srcport == 62315

tcp.dstport

Destination Port

tcp.dstport == 443

tcp.stream

Stream index

tcp.stream == 0

tcp.len

TCP Segment Len

tcp.len == 29

tcp.seq

Sequence number

tcp.seq == 95672

tcp.seq_raw

The raw value of the sequence number

tcp.seq_raw == 1696880154

tcp.nxtseq

Next sequence number

tcp.nxtseq == 95701

tcp.ack

Acknowledgment number

tcp.ack == 3040

tcp.ack_raw

The raw value of the acknowledgment number

tcp.ack_raw == 1784144095

tcp.ack.nonzero

The acknowledgment number field is nonzero while the ACK flag is not set

tcp.hdr_len

Header Length

tcp.hdr_len == 20

tcp.flags

Flags

tcp.flags == 0x010

tcp.flags.res

Three reserved bits(must be zero)

tcp.flags.res == 0,Not set

tcp.flags.ns

ECN concealment protection(RFC 3540)
    
tcp.flags.ns == 0,Not set

tcp.flags.cwr

Congestion Window Reduced(CWR)
    
tcp.flags.cwr == 0,Not set

tcp.flags.ecn

ECN-Echo

tcp.flags.ecn == 0,Not set

tcp.flags.urg

Urgent

tcp.flags.urg == 0,Not set

tcp.flags.ack

Ackonwledgment

tcp.flags.ack == 1,Set

tcp.flags.push

Push

tcp.flags.push == 0,Not set

tcp.flags.reset

Reset

tcp.flags.reset == 0,Not set

tcp.flags.syn

Syn

tcp.flags.syn == 0,Not set

tcp.flags.fin

Fin

tcp.flags.fin == 0,Not set

tcp.flags.str

TCP Flags

tcp.flags.str == "\xc2\xb7\xc2\xb7\xc2\xb7\xc2\xb7\xc2\xb7\xc2\xb7\xc2\xb7A\xc2\xb7\xc2\xb7\xc2\xb7\xc2\xb7",ACK

tcp.window_size_value

The window size value from the TCP header

tcp.window_size_value == 32709

tcp.window_size

The scaled window size(if scaling has been used)
    
tcp.window_size == 32709

tcp.window_size_scalefactor

The window size scaling factor(-1 when unknown,-2 when no scaling is used)
    
tcp.window_size_scalefactor == -1,unknown
tcp.window_size_scalefactor == -2,no window scaling used
tcp.window_size_scalefactor == 256

tcp.checksum

TCP checksum

tcp.checksum == 0x3305

tcp.checksum.status

Checksum Status

tcp.checksum.status == "Unverified"

tcp.checksum_bad.expert

Bad checksum

tcp.urgent_pointer

Urgent pointer

tcp.urgent_pointer == 0

tcp.analysis

This frame has sone of the TCP analysis shown

tcp.analysis

tcp.analysis.ack_lost_segment

ACKed segment that wasn't captured(common at capture start)

tcp.analysis.ack_rtt

The RTT to ACK the segment was

tcp.analysis.ack_rtt == 0.0001

tcp.analysis.acks_frame

This is an ACK to the segment in frame

tcp.analysis.acks_frame == 100

tcp.analysis.bytes_in_flight

How many bytes are now in flight for this connection

tcp.analysis.bytes_in_flight == 12

tcp.analysis.duplicate_ack

Duplicate ACK

tcp.analysis.duplicate_ack_frame

Duplicate to the ACK in frame

tcp.analysis.duplicate_ack_frame == 114

tcp.analysis.duplicate_ack_num

Duplicate ACK #

tcp.analysis.duplicate_ack_num == 1

tcp.analysis.fast_retransmission

This frame is a (suspected) fast retransmission

tcp.analysis.flags

TCP Analysis Flags

tcp.analysis.initial_rtt

iRTT

tcp.analysis.initial_rtt <= 0.020000

tcp.analysis.keep_alive

TCP keep-alive segment

tcp.analysis.keep_alive_ack

ACK to a TCP keep-alive segment

tcp.analysis.lost_segment

Previous segment(s) not captured (common at capture start)

tcp.analysis.out_of_order

This frame is a (suspected) out_of_order segment

tcp.analysis.push_bytes_sent

How many bytes have been sent since the last PSH flag

tcp.analysis.push_bytes_sent == 12

tcp.analysis.retransmission

This frame is a (suspected) retransmission

tcp.analysis.reused_ports

A new tcp session is started with the same ports as an earlier session in this trace

tcp.analysis.rto

The RTO for this segment was

tcp.analysis.rto <= 1

tcp.analysis.rto_frame

RTO based on delta from frame

tcp.analysis.rto_frame == 100

tcp.analysis.spurious_retransmission

This frame is a (suspected) spurious retransmission

tcp.analysis.tfo_syn

TCP SYN with TFO Cookie

tcp.analysis.window_full

TCP window specified by the receiver is now completely full

tcp.analysis.window_update

TCP window update

tcp.analysis.zero_window

TCP Zero Window segment

tcp.analysis.zero_window_probe

TCP Zero Window Probe

tcp.analysis.zero_window_probe_ack

ACK to a TCP Zero Window Probe

tcp.connection.fin

Connection finish(FIN)

tcp.connection.rst

Connection reset(RST)

tcp.connection.sack

Connection establish acknowledge(SYN+ACK)

tcp.connection.syn

Connection establish request(SYN)

tcp.fin_retransmission

Retransmission of FIN from frame

tcp.option.len.invalid

Invalid length for option

tcp.option_len

Length

tcp.options

TCP Options

tcp.options

tcp.options.echo_value

TCP Echo Option

tcp.options.mss.absent

The SYN packet does not contain a MSS option

tcp.options.mss.present

The non-SYN packet does contain a MSS option

tcp.options.sack.count

TCP SACK Count

tcp.options.sack_le

TCP SACK Left Edge

tcp.options.sack_re

TCP SACK Right Edge

tcp.options.tfo

TCP Fast Open

tcp.options.tfo.cookie

Fast Open Cookie

tcp.options.tfo.request

Fast Open Cookie Request

tcp.options.md5

TCP MD5 signature

tcp.time_relative

Time relative to first frame in this TCP stream

tcp.time_delta

Time delta from previous frame in this TCP stream

tcp.payload

The TCP payload of this packet

tcp.pdu.last_frame

Last frame of this PDU

tcp.pdu.size

PDU Size

tcp.pdu.time

Time until the last segment of this PDU

tcp.reassembled.data

Reassembled TCP Data

tcp.reassembled.length

Reassembled TCP length

tcp.reassembled_in

Reassembled PDU in frame

tcp.reset_cause

Reset cause

tcp.segment

TCP segment

tcp.segment

tcp.segment.count

Segment count

tcp.segment.error

Reassembling error

tcp.segment_data

TCP segment data

tcp.segments

Reassembled TCP segments

data

Data

data

UDP

udp

User Datagram Protocol

udp

udp.srcport

Source Port

udp.srcport == 53354

udp.dstport

Destination Port

udp.dstport == 22313

udp.length

Length

udp.length == 16

udp.checksum

UDP Checksum

udp.checksum == 0xb4c0

udp.checksum.status

Checksum Status

udp.checksum.status == "Unverified"

udp.checksum.bad

Bad checksum

udp.stream

Stream index

udp.stream == 34

udp.time_relative

Time relative to first frame in this UDP stream

udp.time_delta

Time delta from previous frame in this UDP stream

udp.pdu.size

PDU Size

data

Data

data

HTTP

http

Hypertext Transfer Protocol

http

http.request.method

HTTP Request Method

http.request.method == "POST"

http.request.uri

HTTP Request-URI

http.request.uri == "/www/api/xxx"

http.request.version

HTTP Request HTTP-Version

http.request.version == "HTTP/1.1"

http.host

HTTP host

http.host == "www.baidu.com"

http.connection

HTTP Connection

http.connection == "keep-alive"

http.content_lenth_header

HTTP Content-Length header

http.content_length_header == "144"

http.user_agent

HTTP User-Agent header

http.user_agent == "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36"

http.content_type

HTTP Content-Type

http.content_type == "application/x-www-form-urlencoded; charset=utf-8"

http.accept

HTTP Accept

http.accept == "*/*"

http.accept_encoding

HTTP Accept Encoding

http.accept_encoding == "gzip, deflate"

http.accept_language

HTTP Accept Language

http.accept_language == "zh-CN,zh;q=0.9"

http.request.full_uri

The full requested URI(including host name)

http.request.full_uri == "https://www.baidu.com/xxx/xxx"

http.response.version

HTTP Response HTTP-Version

http.response.version == "HTTP/1.1"

http.response.code

HTTP Response Status Code

http.response.code == 200

http.server

HTTP Server

http.server == "nginx" 

http.time

Time since the request was sent

http.time >= 0.05

DNS

dns

Domain Name System

dns

dns.id

Identification of transaction

dns.id == 0xc4e1

dns.flags

Flags

dns.flags == 0x0100

dns.flags.response

Is the message a response?

dns.flags.response == 0

dns.count.queries

Number of queries in packet

dns.count.queries == 1

dns.qry.name

Query Name

dns.qry.name == "www.baidu.com"

dns.qry.type

Query Type

dns.qry.type == 1

dns.count.answers

Number of answers in packet

dns.count.answers == 2

dns.resp.name

Response Name

dns.resp.name == "www.baidu.com"

dns.resp.type

Response Type

dns.resp.type == 5

dns.resp.ttl

Response TTL

dns.resp.ttl == 993

dns.resp.len

Response Length

dns.resp.len == 22

dns.cname

Response Primary Name

dns.cname == "www.a.shifen.com"

dns.a

Response Address

dns.a == 180.101.49.11

dns.time

The time between the Query and the Response

dns.time >= 0.005


感谢阅读,更多技术文章可关注个人公众号:Echo Reply ,谢谢。

你可能感兴趣的:(NetShark,wireshark,网络,网络协议,tcp/ip,tcpdump)