3 # http.request.method=="POST"
7 usermod
-a -G wireshark
$USER
11 up_interfaces
=$
(ifconfig |
grep "UP,BROADCAST" |\
12 sed 's/://' |
awk '{print $1}')
13 interface
=$
(echo "$up_interfaces" | dmenu
-l 10 )
18 tshark
-i $interface -Y 'http.request.method == POST and tcp contains "password"' |
grep password
23 # tshark -i $interface -w capture-output.pcap
24 tshark
-i $interface -w capture-output.pcap
29 # tshark -r $1 -V -x > result.log
30 # tshark -r $1 -Y "http"
31 # tshark -r $1 -Y http.request -T fields -e http.host -e http.user_agent | sort | uniq -c | sort -n
32 # tshark -r $1 -Y http.request -T fields -e http.host -e ip.dst -e http.request.full_uri
33 # tshark -r $1 -T fields -e http.host -e ip.dst -e http.request.full_uri
37 tshark
-r $1 -q -o "ssl.keys_list:127.0.0.1,4443,http,server.pem" -z "follow,ssl,ascii,1"
42 # tshark -i $interface -f "src port 53" -n -T fields -e dns.qry.name -e dns.resp.addr
43 # tshark -i wlan0 -f "src port 53" -n -T fields -e frame.time -e ip.src -e ip.dst -e dns.qry.name -e dns.resp.addr
44 tshark
-i $interface -f "src port 53" -n -T fields
-e dns.qry.name
49 tshark
-i $interface -Y http.request
-T fields
-e http.
host -e http.user_agent