Packet capture tool wireshark usage skills

Reprint: http://www.tuicool.com/articles/aymi6f

 

ttp.host==magentonotes.com

http.host contains magentonotes.com

//Filter http packets that pass through the specified domain name, the host value here is not necessarily the domain name in the request

http.response.code==302 //Filter data packets whose http response status code is 302

http.response==1 //Filter all http response packets

http.request==1 //Filter all http requests, it seems that you can also use http.request

http.request.method==POST

//

wireshark

Filter all http request packets whose request method is POST, note that POST is uppercase

http.cookie contains guid //Filter http packets containing the specified cookie

http.request.uri==”/online/setpoint” //Filter the uri of the request, the value is the part after the domain name

http.request.full_uri==” http://task.browser.360.cn/online/setpoint” //To filter the entire url with domain name, you need to use http.request.full_uri

http.server contains "nginx" //Filter packets containing nginx characters in the server field of the http header

http.content_type == "text/html" //Filter http responses and post packets whose content_type is text/html, that is, filter http packets according to the file type

http.content_encoding == "gzip" //Filter http packets whose content_encoding is gzip

http.transfer_encoding == "chunked" // filter according to transfer_encoding

http.content_length == 279

http.content_length_header == “279″

//Filter according to the value of content_length

http.server //Filter all packets that contain the server field in the http header

http.request.version == “

HTTP

/1.1″

//filter

HTTP

/ 1.1 version of the http package, including request and response

http.response.phrase == "OK" // filter the phrase in the http response

Guess you like

Origin http://10.200.1.11:23101/article/api/json?id=327041017&siteId=291194637