wireshark
- 网络抓包
-
Wireshark must have access to the private key associated with the server certificate .
Wireshark必须获得与服务器证书关联的私钥。
-
Wireshark is one such tool that supports a vast array of network protocol decoding and analysis .
Wireshark就是其中一个工具,它支持大量的网络协议解码和分析。
-
Wireshark supports such a wide variety of protocols and filters that you can get detailed information .
Wireshark支持广泛的协议和过滤器,您可以用它们获得详细的信息。
-
Under Wireshark of open source environment develop again for a plug-in to analyze network management protocol assumedly .
在Wireshark开源环境下,编写插件进行二次开发,模拟解析网管协议。
-
This should already be clear since you needed to know the right IP address for the Wireshark configuration step .
这点已经很明显了,因为您需要知道用于Wireshark配置步骤的正确IP地址。
-
If your configuration was successful you will see some text indicating that Wireshark successfully loaded the private key .
如果您配置成功,您将会看到有文本提示您Wireshark已成功加载私钥。
-
Once you have Wireshark configured correctly , you are ready to record a conversation .
一旦您已经正确配置Wireshark,您就可以开始记录会话了。
-
Another useful feature is that Wireshark can work with both live information , and it can record information for later filtering and processing .
Wireshark的另一个有用的特性是它能够处理即时信息,并且它能够记录信息以备将来过滤和处理。
-
Now that you have Tomcat configured , you need to configure Wireshark .
您已经完成了Tomcat的配置,现在需要配置Wireshark。
-
Wireshark relies on capturing the entire SSL conversation .
Wireshark依赖于捕获完整的SSL会话。
-
This can be checked in the " About " window of Wireshark .
这点可以在Wireshark的“About”窗口核实。
-
With tools like Wireshark , you can go even deeper and get more detailed information on a much wider range of protocols and content .
通过使用诸如Wireshark的工具,您可以更一地步地了解更大范围的协议和内容的更多详细信息。
-
This confirms that you have carried out all the cryptographic manipulation steps and Wireshark configuration steps correctly .
这表明您已经正确完成了所有加密操作步骤和Wireshark配置步骤。
-
You are then free to use Wireshark as you normally would to analyse the HTTP conversation and proceed with your problem investigation .
然后您就可以像平时一样随意使用Wireshark分析HTTP会话并继续调查问题。
-
Anyone listening in on the traffic can know this as well ( as evidenced because we are using Wireshark captures ) .
任何在网络上侦听的人当然也知道这两个数(这点很明显,因为我们是通过Wireshark获取它们的,别人也可以)。
-
And example by the most commonly used in real-time interactive software QQ , using wireshark software to capture packets , then detailed analysis of the application data .
并以实时交互中最常用的软件QQ为例,用wireshark软件捕获数据包,详细分析了其应用数据。
-
In particular , this tutorial does not go into any depth about how to use Wireshark once it has been configured correctly .
特别指出,本教程并未对正确配置后如何使用Wiresharkn进行深入探讨。
-
After this , the Tomcat welcome page should appear in the browser and lots of rows of data should appear in Wireshark .
之后浏览器上就会出现Tomcat的欢迎页面,并且在Wireshark中会出现多行数据。
-
At times like this , you can turn to a tool like Wireshark , which captures all the network traffic in your system and lets you read it .
这时,您可以借助像Wireshark这样的工具,它可以捕获您系统中的所有网络流量,并使您能够进行读取。
-
Wireshark also supports a huge array of protocol decoders , enabling you to examine in minute detail the contents of the packets and conversations .
Wireshark也支持大量的协议解码器,这使您能够检查每分钟内数据包和会话的详细内容。
-
After running this command you can load the fixed packet capture file back in to Wireshark and then you should see the decrypted packets as expected .
运行完这条命令之后,您可以重新把修正过的数据包获取文件加载到Wireshark,然后您就会看到预期的已解密数据包。
-
With the help of Wireshark , my favorite network tool , and a slightly modified debug build of Firefox , we can see exactly what 's going on .
在我最喜爱的网络工具Wireshark以及略微修改的Firefox调试版的帮助下,我们可以对正在发生的事情看个究竟。
-
This tutorial will work through these steps in this order and then , using a browser connecting to the Tomcat server , we will capture a request and response and examine it in Wireshark .
本教程将会按这个顺序执行这些步骤,然后使用浏览器连接Tomcat服务器,我们将获得一个请求和响应,然后就能在Wireshark中进行检查。
-
The Unit Test uses C + + programming language and Google Test tool . The System Test uses Virtual Machine and WireShark , checking the Login Database information and analyzing captured packages to verify the function of the system .
单元测试采用的C++语言和GoogleTest工具;系统测试则利用了虚拟机和WireShark抓包软件,通过键入命令查看数据库信息和分析抓到的报文,验证系统功能是否正确。
-
In this tutorial you have learned how to capture and read a secure HTTP communication between two systems . You have seen how to generate the required cryptographic artifacts and then how to configure Tomcat and Wireshark to use them correctly .
在本教程中,您学习了如何捕获和读取两个系统间的安全HTTP通信,了解了如何生成一个必需的密码工件以及如何配置Wireshark和Tomcat来正确使用它们。
-
By wireshark P2P and non P2P software to capture one minute of pure data flow analysis of flow characteristics and node characteristics , and characteristics as the input parameters of the neural network with BP algorithm simulation to verify the validity of the parameters in the recognition process .
通过wireshark软件捕获P2P和非P2P一分钟的纯净数据流分析其流量特征和节点特征,并将这些特征作为神经网络的输入参数,结合BP算法进行仿真,验证参数在识别过程中的有效性。