
The steps to configure a capture filter are the following: The capture filter must be set before launching the Wiershark capture, which is not the case for the display filters that can be modified at any time during the capture. The capture filter syntax is the same as the one used by programs using the Lipcap (Linux) or Winpcap (Windows) library like the famous TCPdump. The display filter is much more powerful (and complex) it will permit you to search exactly the data you want. The capture filter is used as a first large filter to limit the size of captured data to avoid generating a log too big. The goals of the two filters are different. So should I use the capture or the display filter? They can be modified while data is captured.

developers use it to debug protocol implementations.network security engineers use it to examine security problems.network administrators use it to troubleshoot network problems.Here are some examples people use Wireshark for: Trace files captured from your network can be opened in Wireshark and analysed right down to individual packet level.

It provides low-level packet filtering and analytical capability. Wireshark (formerly known as Ethereal) has become the defacto, open-source standard for protocol analysis. In this first article i’ll show you Wireshark an useful tool for network analysis.


Indeed, several open source solutions are truly effective and can help the specialist networks in daily work. On the Internet there are hundreds of excellent open source tools and utilities that can be used for network analysis, but not many technicians use them.
