
In this example, use http.response, and escape the periods. bash$ tshark -G | grep -E "sec_websocket_version"į Sec-WebSocket-Version c_websocket_versionğT_STRING http 0x0 If we already know what the field name is, we can get the full display filter by searching for it. Tshark -G will print all protocols, so you can use it in conjunction with grep to find fields of interest. Sometimes you know the protocol you’re looking for, just not the relevant fields you need to filter with. If you like C-style syntax, you can also use & instead of and and || instead of or. įor example, source MAC address becomes eth.src.

If you are unfamiliar with filtering for traffic, Filter with Regex: matches and containsĭisplay Filters are a large topic and a major part of Wireshark’s popularity.
