# Revision history [back]

Example file: telnet-cooked.pcap from the Wireshark wiki Sample Captures
Documentation available in User's Guide (Following Protocol Streams) and the tshark man page.

ask_wireshark$tshark -r telnet-cooked.pcap -T fields -e tcp.stream | sort -n | uniq 0 ask_wireshark$
ask_wireshark$tshark -r telnet-cooked.pcap -z follow,tcp,hex,0 -q =================================================================== Follow: tcp,hex Filter: tcp.stream eq 0 Node 0: 192.168.0.2:1550 Node 1: 192.168.0.1:23 00000000 ff fd 03 ff fb 18 ff fb 1f ff fb 20 ff fb 21 ff ........ ... ..!. 00000010 fb 22 ff fb 27 ff fd 05 ff fb 23 ."..'... ..# 00000000 ff fd 25 ..% 0000001B ff fc 25 ..% 00000003 ff fb 03 ff fd 18 ff fd 1f ff fd 20 ff fd 21 ff ........ ... ..!. 00000013 fd 22 ff fa 22 01 0b ff f0 .".."... . 0000001E ff fa 1f 00 50 00 20 ff f0 ff fa 22 03 01 00 00 ....P. . ...".... 0000002E 03 62 03 04 02 0f 05 00 00 07 62 1c 08 02 04 09 .b...... ..b..... 0000003E 42 1a 0a 02 7f 0b 02 15 0f 02 11 10 02 13 11 00 B....... ........ 0000004E 00 12 00 00 ff f0 ff fd 03 ff fa 22 01 0f ff f0 ........ ...".... 0000001C ff fd 27 ff fb 05 ff fd 23 ff fb 26 ff fd 26 ff ..'..... #..&..&. 0000002C fd 24 .$
0000005E  ff fe 26 ff fc 26 ff fc  24                       ..&..&.. $0000002E ff fa 20 01 ff f0 ff fa 23 01 ff f0 ff fa 27 01 .. ..... #.....'. 0000003E ff f0 ff fa 18 01 ff f0 ........ 00000067 ff fa 20 00 39 36 30 30 2c 39 36 30 30 ff f0 ff .. .9600 ,9600... 00000077 fa 23 00 62 61 6d 2e 7a 69 6e 67 2e 6f 72 67 3a .#.bam.z ing.org: 00000087 30 2e 30 ff f0 ff fa 27 00 00 44 49 53 50 4c 41 0.0....' ..DISPLA 00000097 59 01 62 61 6d 2e 7a 69 6e 67 2e 6f 72 67 3a 30 Y.bam.zi ng.org:0 000000A7 2e 30 ff f0 ff fa 18 00 78 74 65 72 6d 2d 63 6f .0...... xterm-co 000000B7 6c 6f 72 ff f0 lor.. 00000046 ff fd 01 ... 000000BC ff fc 01 ... 00000049 ff fb 01 ff fa 21 02 ff f0 ff fc 01 .....!.. .... 000000BF ff fd 01 ff fe 01 ...... 00000055 ff fa 22 03 05 80 00 11 80 00 12 80 00 ff f0 .."..... ....... 00000064 0d 0a 4f 70 65 6e 42 53 44 2f 69 33 38 36 20 28 ..OpenBS D/i386 ( 00000074 6f 6f 66 29 20 28 74 74 79 70 32 29 0d 0a 0d 0a oof) (tt yp2).... 00000084 6c 6f 67 69 6e 3a 20 login: 000000C5 66 61 6b 65 0d 0a fake.. <snip> 00000559 24 20$
00000101  65 78 69 74 0d 0a                                 exit..
===================================================================
ask_wireshark$ Depending on the use, you may want to change the mode to ascii, raw or ebcdic. Example file: telnet-cooked.pcap from the Wireshark wiki Sample Captures Documentation available in User's Guide (Following Protocol Streams) and the tshark man page. ask_wireshark$ tshark -r telnet-cooked.pcap -T fields -e tcp.stream | sort -n | uniq
0
ask_wireshark$ask_wireshark$ tshark -r telnet-cooked.pcap -z follow,tcp,hex,0 -q

===================================================================
Follow: tcp,hex
Filter: tcp.stream eq 0
Node 0: 192.168.0.2:1550
Node 1: 192.168.0.1:23
00000000  ff fd 03 ff fb 18 ff fb  1f ff fb 20 ff fb 21 ff  ........ ... ..!.
00000010  fb 22 ff fb 27 ff fd 05  ff fb 23                 ."..'... ..#
00000000  ff fd 25                                          ..%
0000001B  ff fc 25                                          ..%
00000003  ff fb 03 ff fd 18 ff fd  1f ff fd 20 ff fd 21 ff  ........ ... ..!.
00000013  fd 22 ff fa 22 01 0b ff  f0                       .".."... .
0000001E  ff fa 1f 00 50 00 20 ff  f0 ff fa 22 03 01 00 00  ....P. . ..."....
0000002E  03 62 03 04 02 0f 05 00  00 07 62 1c 08 02 04 09  .b...... ..b.....
0000003E  42 1a 0a 02 7f 0b 02 15  0f 02 11 10 02 13 11 00  B....... ........
0000004E  00 12 00 00 ff f0 ff fd  03 ff fa 22 01 0f ff f0  ........ ..."....
0000001C  ff fd 27 ff fb 05 ff fd  23 ff fb 26 ff fd 26 ff  ..'..... #..&..&.
0000002C  fd 24                                             .$0000005E ff fe 26 ff fc 26 ff fc 24 ..&..&..$
0000002E  ff fa 20 01 ff f0 ff fa  23 01 ff f0 ff fa 27 01  .. ..... #.....'.
0000003E  ff f0 ff fa 18 01 ff f0                           ........
00000067  ff fa 20 00 39 36 30 30  2c 39 36 30 30 ff f0 ff  .. .9600 ,9600...
00000077  fa 23 00 62 61 6d 2e 7a  69 6e 67 2e 6f 72 67 3a  .#.bam.z ing.org:
00000087  30 2e 30 ff f0 ff fa 27  00 00 44 49 53 50 4c 41  0.0....' ..DISPLA
00000097  59 01 62 61 6d 2e 7a 69  6e 67 2e 6f 72 67 3a 30  Y.bam.zi ng.org:0
000000A7  2e 30 ff f0 ff fa 18 00  78 74 65 72 6d 2d 63 6f  .0...... xterm-co
000000B7  6c 6f 72 ff f0                                    lor..
00000046  ff fd 01                                          ...
000000BC  ff fc 01                                          ...
00000049  ff fb 01 ff fa 21 02 ff  f0 ff fc 01              .....!.. ....
000000BF  ff fd 01 ff fe 01                                 ......
00000055  ff fa 22 03 05 80 00 11  80 00 12 80 00 ff f0     .."..... .......
00000064  0d 0a 4f 70 65 6e 42 53  44 2f 69 33 38 36 20 28  ..OpenBS D/i386 (
00000074  6f 6f 66 29 20 28 74 74  79 70 32 29 0d 0a 0d 0a  oof) (tt yp2)....
00000084  6c 6f 67 69 6e 3a 20                              login:
000000C5  66 61 6b 65 0d 0a                                 fake..
<snip>
00000559  24 20                                             $00000101 65 78 69 74 0d 0a exit.. =================================================================== ask_wireshark$


Depending on the use, you may want to change the mode to ascii, raw or ebcdic.

Windows 10 has an undocumented unique option:

\$ tshark -r telnet-cooked.pcap -T fields -e tcp.stream | sort /unique
0