EETOP 创芯网论坛 (原名:电子顶级开发网)

标题: 跟我一起写makefile [打印本页]

作者: konizhang    时间: 2012-2-13 00:53
标题: 跟我一起写makefile
跟我一起写makefile
作者: konizhang    时间: 2012-2-14 01:05
PCI Express System Architecture.pdf
作者: konizhang    时间: 2012-2-17 00:38
C++程序设计
作者: konizhang    时间: 2012-2-22 00:01
http://blog.csdn.net/do2jiang/article/details/5414144
作者: konizhang    时间: 2012-2-28 01:26
MDIO related.
作者: konizhang    时间: 2012-3-5 01:56
本帖最后由 konizhang 于 2012-3-5 12:47 编辑

自己使用
作者: konizhang    时间: 2012-3-5 13:05
回复 6# konizhang
作者: konizhang    时间: 2012-3-5 23:30
回复 7# konizhang
作者: konizhang    时间: 2012-3-5 23:50
回复 8# konizhang
作者: konizhang    时间: 2012-3-5 23:58
回复 9# konizhang
作者: happyren    时间: 2012-3-6 00:00
多谢分享,
作者: konizhang    时间: 2012-3-6 00:08
回复 10# konizhang
作者: konizhang    时间: 2012-3-6 00:24
回复 10# konizhang
作者: konizhang    时间: 2012-3-6 00:33
回复 13# konizhang
作者: konizhang    时间: 2012-3-6 00:48
回复 14# konizhang
作者: konizhang    时间: 2012-3-6 00:49
回复 15# konizhang
作者: konizhang    时间: 2012-3-8 00:22
回复 16# konizhang
作者: konizhang    时间: 2012-3-8 00:28
回复 17# konizhang
作者: lhxzui    时间: 2012-4-29 15:18
回复 9# konizhang


    好资料,谢谢分享
作者: konizhang    时间: 2012-6-26 00:29
自用软件
作者: kaifu    时间: 2012-6-30 11:59
好多东西哦,收藏了
作者: konizhang    时间: 2012-8-28 00:16
web网址收藏
作者: zzc66    时间: 2012-8-31 10:16
只要个makefile。。。其他系列不知道的就算了
谢谢~
作者: fdpp    时间: 2012-9-8 09:51
好东西,好资料,谢谢啦
作者: fdpp    时间: 2012-9-8 09:54
好东西,好资料,谢谢。
作者: konizhang    时间: 2012-9-21 02:18
Login

CaptureFilters
FrontPage
RecentChanges
FindPage
HelpContents
CaptureFilters

--------------------------------------------------------------------------------
Immutable Page
Info
Attachments

More Actions:Raw Text Print View Delete Cache ------------------------ Check Spelling Like Pages Local Site Map ------------------------ Rename Page Delete Page ------------------------ Subscribe User ------------------------ Remove Spam Revert to this revision Package Pages Sync Pages ------------------------ Load Save SlideShow



CaptureFilters

An overview of the capture filter syntax can be found in the User's Guide. A complete reference can be found in the expression section of the tcpdump manual page.
Wireshark uses the same syntax for capture filters as tcpdump, WinDump, Analyzer, and any other program that uses the libpcap/WinPcap library.
If you need a capture filter for a specific protocol, have a look for it at the ProtocolReference.

Contents
1. CaptureFilters1. Examples
2. Useful Filters
3. Default Capture Filters
4. Further Information
5. See Also
6. Discussion


Examples

Capture only traffic to or from IP address 172.18.5.4:
host 172.18.5.4
Capture traffic to or from a range of IP addresses:
net 192.168.0.0/24
or
net 192.168.0.0 mask 255.255.255.0
Capture traffic from a range of IP addresses:
src net 192.168.0.0/24
or
src net 192.168.0.0 mask 255.255.255.0
Capture traffic to a range of IP addresses:
dst net 192.168.0.0/24
or
dst net 192.168.0.0 mask 255.255.255.0
Capture only DNS (port 53) traffic:
port 53
Capture non-HTTP and non-SMTP traffic on your server (both are equivalent):
host www.example.com and not (port 80 or port 25)host www.example.com and not port 80 and not port 25
Capture except all ARP and DNS traffic:
port not 53 and not arp
Capture traffic within a range of ports
(tcp[0:2] > 1500 and tcp[0:2] < 1550) or (tcp[2:2] > 1500 and tcp[2:2] < 1550)
or, with newer versions of libpcap (0.9.1 and later):
tcp portrange 1501-1549
Capture only Ethernet type EAPOL:
ether proto 0x888e
Reject ethernet frames towards the Link Layer Discovery Protocol Multicast group:
not ether dst 01:80:c2:00:00:0e
Capture only IP traffic - the shortest filter, but sometimes very useful to get rid of lower layer protocols like ARP and STP:
ip
Capture only unicast traffic - useful to get rid of noise on the network if you only want to see traffic to and from your machine, not, for example, broadcast and multicast announcements:
not broadcast and not multicast
Capture IPv6 "all nodes" (router and neighbor advertisement) traffic. Can be used to find rogue RAs:
dst host ff02::1
Capture HTTP GET requests. This looks for the bytes 'G', 'E', 'T', and ' ' (hex values 47, 45, 54, and 20) just after the TCP header. "tcp[12:1] & 0xf0) >> 2" figures out the TCP header length. From Jefferson Ogata via the tcpdump-workers mailing list.
port 80 and tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x47455420

Useful Filters

Blaster and Welchia are RPC worms. (Does anyone have better links, i.e. ones that describe or show the actual payload?)
Blaster worm:
dst port 135 and tcp port 135 and ip[2:2]==48
Welchia worm:
icmp[icmptype]==icmp-echo and ip[2:2]==92 and icmp[8:4]==0xAAAAAAAAThe filter looks for an icmp echo request that is 92 bytes long and has an icmp payload that begins with 4 bytes of A's (hex). It is the signature of the welchia worm just before it tries to compromise a system.
Many worms try to spread by contacting other hosts on ports 135, 445, or 1433. This filter is independent of the specific worm instead it looks for SYN packets originating from a local network on those specific ports. Please change the network filter to reflect your own network.

dst port 135 or dst port 445 or dst port 1433  and tcp[tcpflags] & (tcp-syn) != 0 and tcp[tcpflags] & (tcp-ack) = 0 and src net 192.168.0.0/24

Default Capture Filters

Wireshark tries to determine if it's running remotely (e.g. via SSH or Remote Desktop), and if so sets a default capture filter that should block out the remote session traffic. It does this by checking environment variables in the following order:



Environment Variable

Resultant Filter


SSH_CONNECTION

not (tcp port srcport and addr_family host srchost and tcp port dstport and addr_family host dsthost)


SSH_CLIENT

not (tcp port srcport and addr_family host srchost and tcp port dstport)


REMOTEHOST

not addr_family host host


DISPLAY

not addr_family host host


CLIENTNAME

not tcp port 3389

(addr_family will either be "ip" or "ip6")

Further Information

Filtering while capturing from the Wireshark User's Guide

The pcap-filter man page includes a comprehensive capture filter reference

The Mike Horn Tutorial gives a good introduction to capture filters

Capture and display filter Cheat sheets

packetlevel.ch Filter examples


See Also

DisplayFilters: more info on filters while displaying, not while capturing
The String-Matching Capture Filter Generator

Discussion

BTW, the Symantec page says that Blaster probes 135/tcp, 4444/tcp, and 69/udp. Would
(tcp dst port 135 or tcp dst port 4444 or udp dst port 69) and ip[2:2]==48
be a better filter? - Gerald Combs

Q: What is a good filter for just capturing SIP and RTP packets?
A: On most systems, for SIP traffic to the standard SIP port 5060,
tcp port sip
should capture TCP traffic to and from that port,
udp port sip
should capture UDP traffic to and from that port, and
port sip
should capture both TCP and UDP traffic to and from that port (if one of those filters gets "parse error", try using 5060 instead of sip). For SIP traffic to and from other ports, use that port number rather than sip.
In most cases RTP port numbers are dynamically assigned. You can use something like the following which limits the capture to UDP, even source and destination ports, a valid RTP version, and small packets. It will capture any non-RTP traffic that happens to match the filter (such as DNS) but it will capture all RTP packets in many environments.
udp[1] & 1 != 1 && udp[3] & 1 != 1 && udp[8] & 0x80 == 0x80 && length < 250
Capture WLAN traffic without Beacons:
link[0] != 0x80
Capture all traffic originating (source) in the IP range 192.168.XXX.XXX:
src net 192.168
Capture PPPoE traffic:
pppoes
pppoes and (host 192.168.0.0 and port 80)
Capture VLAN traffic:
vlan
vlan and (host 192.168.0.0 and port 80)

--------------------------------------------------------------------------------

CategoryHowTo

CaptureFilters (last edited 2012-06-15 22:40:19 by GeraldCombs)

Immutable Page
Info
Attachments

More Actions:Raw Text Print View Delete Cache ------------------------ Check Spelling Like Pages Local Site Map ------------------------ Rename Page Delete Page ------------------------ Subscribe User ------------------------ Remove Spam Revert to this revision Package Pages Sync Pages ------------------------ Load Save SlideShow


Original content on this site is available under the GNU General Public License.
See the License page for details.
Powered by MoinMoin and Python.
Please don't pee in the pool.
作者: konizhang    时间: 2012-9-21 02:21
wireshark抓报设置
作者: konizhang    时间: 2012-11-12 23:45
TinyXML指南
作者: konizhang    时间: 2012-11-14 00:08
Linux c库函数手册 pdf
作者: yghanwuji    时间: 2012-12-11 10:59
感谢楼主,很有用!
作者: konizhang    时间: 2013-2-2 03:00
自己使用的小工具
作者: 似水如烟    时间: 2013-11-5 15:05
8j6uhy5tgrefb
作者: Mr.Z    时间: 2014-1-5 14:06
希望再介绍详细点。。。这传上来的都是些什么。。。
作者: jimisky1228    时间: 2014-1-20 14:10
不错的资料!!!
作者: alexsilvester    时间: 2014-7-28 02:49
thx for docu
作者: 功夫熊猫    时间: 2015-5-16 10:04
点个赞
作者: Holon_zhang    时间: 2015-6-16 14:25
后面又上传了什么东东?
作者: 陈小随    时间: 2016-1-20 20:53
后面的那些不是很懂、、、what?
作者: justin371    时间: 2016-3-2 16:32
下来看看
作者: joshuacp    时间: 2017-3-21 10:31
谢谢楼主
作者: xyzzju    时间: 2017-8-3 15:48
好东西,学习一下
作者: volentino    时间: 2018-6-29 08:55
回复 1# konizhang


   good information
作者: kaicayan    时间: 2021-9-14 16:45
感谢
作者: whulaisla    时间: 2021-9-20 23:48
谢谢分享
作者: qptom    时间: 2021-11-2 11:52
谢谢分享1
作者: 443665663    时间: 2022-4-6 17:26
谢谢 分享
作者: xlteam2    时间: 2022-5-15 14:55
Very very good
作者: dihoo123    时间: 2023-2-24 18:21
学习一下!
作者: pony029    时间: 2025-3-31 09:29
看看,感谢感谢
作者: im.leo    时间: 2025-4-1 16:06
多谢分享 多谢分享 多谢分享




欢迎光临 EETOP 创芯网论坛 (原名:电子顶级开发网) (https://bbs.eetop.cn/) Powered by Discuz! X3.5