Threat Level: green Handler on Duty: Didier Stevens

SANS ISC: TShark Tip: Extracting Field Values From Capture Files InfoSec Handlers Diary Blog


Sign Up for Free!   Forgot Password?
Log In or Sign Up for Free!

TShark Tip: Extracting Field Values From Capture Files

Published: 2021-12-25
Last Updated: 2021-12-26 09:13:48 UTC
by Didier Stevens (Version: 1)
0 comment(s)

TShark is WireShark's console program: it's like WireShark, but with a command-line interface in stead of a GUI.

TShark can process a capture file: use option -r to read and process the capture file, like this:

Option -e can be used to display the value of a field, like ip.src. You have to combine option -e with option -Tfields to display field values:

When I want to produce a list of User Agent Strings found in a capture file, I select field http.user_agent. Piping the output of TShark into my tool count.py allows me to produce a list of unique values (with counter):

Didier Stevens
Senior handler
Microsoft MVP
blog.DidierStevens.com

Keywords: wireshark tshark
0 comment(s)
Diary Archives