Wireshark-users: [Wireshark-users] tcp data
From: Yüce Sungur <Yuce.Sungur@xxxxxxxxxxxxx>
Date: Thu, 26 Oct 2006 16:41:13 +0300

Hi,

I am trying to capture some tcp streams and check for the 5th byte having the value of D4,,

I captured with Wireshark and used tcpsplit to create the tcp streams and used grep,,

Is it possible to do it via Wireshark without all the other programs,??

 

 






Bu e-posta mesaji ve ekleri gönderildigi kisi ya da kuruma özeldir ve gizlidir. Ayrica hukuken de gizli olabilir. Hiçbir sekilde üçüncü kisilere açiklanamaz ve yayinlanamaz. Mesajin yetkili alicisi degilseniz hiçbir kismini kopyalayamaz, baskasina gönderemez veya hiçbir sekilde kullanamazsiniz. Eger mesajin yetkili alicisi veya yetkili alicisina iletmekten sorumlu kisi siz degilseniz, lütfen mesaji sisteminizden siliniz ve göndereni uyariniz. Gönderen ve TÜRKIYE IS BANKASI A.S., bu mesajin içerdigi bilgilerin dogrulugu, bütünlügü ve güncelligi konusunda bir garanti vermemektedir. Mesajin içeriginden, iletilmesinden, alinmasindan, saklanmasindan, gizliliginin korunamamasindan, virüs içermesinden ve sisteminizde yaratabilecegi zararlardan Bankamiz sorumlu tutulamaz.

This e-mail and its attachments are private and confidential to the exclusive use of the individual or entity to whom it is addressed. It may also be legally confidential. Any disclosure, distribution or other dissemination of this message to any third party is strictly prohibited. If you are not the intended recipient, you may not copy, forward, send or use any part of it. If you are not the intended recipient or the person who is responsible to transmit to the intended recipient, please contact the sender by reply e-mail and destroy all copies of the original message and its attachments. The sender and TURKIYE IS BANKASI A.S. do not warrant for the accuracy, currency, integrity or correctness of the information in the message and its attachments. TURKIYE IS BANKASI A.S. shall have no liability with regard to the information contained in the message, its transmission, reception, storage, preservation of confidentiality, viruses or any damages caused in anyway to your computer system.