捕获过滤器使用 Berkeley Packet Filter (BPF) 语法,主要用于在捕获数据包时进行过滤。以下是一些捕获过滤器的示例:
tcp
host 192.168.1.1
net 192.168.1.0/24
port 80
src host 192.168.1.1
dst host 192.168.1.1
src host 192.168.1.1 and port 80
src host 192.168.1.1 and dst host 192.168.1.2
tcp or udp
显示过滤器用于捕获后过滤和分析数据包,语法更加灵活和强大。以下是一些常见的显示过滤器及其用法:
tcp
http.request
ip.src == 192.168.1.1
ip.dst == 192.168.1.1
tcp.port == 80
ip.src == 192.168.1.1 && http.request
tcp.flags.syn == 1 && tcp.flags.ack == 0 || tcp.flags.syn == 1 && tcp.flags.ack == 1 || tcp.flags.ack == 1 && tcp.flags.syn == 0 && tcp.flags.fin == 0
icmp && ip.src == 192.168.1.0/24
http.request.method == "POST" && frame contains "search_string"
ip.src == 192.168.1.1 && tcp.srcport >= 1000 && tcp.srcport <= 2000
bootp.type == 1
dns.flags.response == 1
arp.opcode == 1
tls.handshake.type == 1
frame contains "example.com"
data.data contains 0A:0B:0C:0D
frame.time >= "2024-06-01 00:00:00" && frame.time <= "2024-06-01 23:59:59"
tcp && ip.src == 192.168.1.1
http || dns
!arp
http.request
http.response
http.request.uri contains "login"
http && (ip.src == 192.168.1.2 || ip.dst == 192.168.1.2)
此过滤器显示所有与 IP 地址 192.168.1.2 相关的 HTTP 流量。tcp.port == 443
dns.flags.response == 0
dns.flags.response == 1
bootp.type == 1
bootp.type == 2
arp.opcode == 1
arp.opcode == 2
过滤所有 ICMP 请求(Echo Request):
icmp.type == 8
过滤所有 ICMP 响应(Echo Reply):
icmp.type == 0
调试网络中的 ICMP 流量:
icmp && (ip.src == 192.168.1.2 || ip.dst == 192.168.1.2)
此过滤器显示所有与 IP 地址 192.168.1.2 相关的 ICMP 流量。
tcp.port == 25
tcp.port == 110
tcp.port == 143