Inspecting the client and server interaction

In the following example, we are capturing packets on localhost with the execution of the TCP client and server on port 12345. When the client sends a message to the server, we can capture the packets that are being exchanged in the communication.

We can perform packet filtering by using ip.dst == 127.0.0.1, as shown in the following screenshot:

As we are capturing packets on a non-standard port, Wireshark doesn't decode data packets in the data section (as shown in the middle pane of the preceding screenshot). However, you can see the decoded text on the bottom pane, where the server's timestamp is shown on the right-hand side.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset