?
Solved

Wireshark command line

Posted on 2015-01-20
2
Medium Priority
?
793 Views
Last Modified: 2015-02-05
I am using wirehshark tshark command line to extract host entries to a text file, I am using the below command which looks right from the tutorial but I get the error message tshark: -R without -2 is deprecated. For single-pass filtering use -Y.

Can anyone tell me what the above error means and what I am doing wrong.

C:\Program Files\Wireshark>tshark -r lim.pcapng -R http.host -T fields -e ip.src -e ip.dst -e http.host > httphostim.txt
0
Comment
Question by:Sid_F
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 71

Accepted Solution

by:
Qlemo earned 2000 total points
ID: 40560647
The message says it all, either you add -2 to get a two-pass scan, or replace -R by -Y. For your purpose the letter should work fine.
Two-pass scans are required for resent and sequence analysis asf.
0
 
LVL 6

Author Comment

by:Sid_F
ID: 40592251
Thanks sorry for the delay in replying
0

Featured Post

Learn how to optimize MySQL for your business need

With the increasing importance of apps & networks in both business & personal interconnections, perfor. has become one of the key metrics of successful communication. This ebook is a hands-on business-case-driven guide to understanding MySQL query parameter tuning & database perf

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Keystroke loggers have been around for a very long time. While the threat is old, some of the remedies are new!
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
Suggested Courses

649 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question