?
Solved

Wireshark command line

Posted on 2015-01-20
2
Medium Priority
?
766 Views
Last Modified: 2015-02-05
I am using wirehshark tshark command line to extract host entries to a text file, I am using the below command which looks right from the tutorial but I get the error message tshark: -R without -2 is deprecated. For single-pass filtering use -Y.

Can anyone tell me what the above error means and what I am doing wrong.

C:\Program Files\Wireshark>tshark -r lim.pcapng -R http.host -T fields -e ip.src -e ip.dst -e http.host > httphostim.txt
0
Comment
Question by:Sid_F
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 70

Accepted Solution

by:
Qlemo earned 2000 total points
ID: 40560647
The message says it all, either you add -2 to get a two-pass scan, or replace -R by -Y. For your purpose the letter should work fine.
Two-pass scans are required for resent and sequence analysis asf.
0
 
LVL 6

Author Comment

by:Sid_F
ID: 40592251
Thanks sorry for the delay in replying
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Read about achieving the basic levels of HRIS security in the workplace.
Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Suggested Courses
Course of the Month8 days, 7 hours left to enroll

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question