2022-03-31 08:58:09 +0000 | received badge | ● Popular Question (source) |
2021-07-21 09:14:12 +0000 | received badge | ● Popular Question (source) |
2021-07-13 21:38:07 +0000 | commented answer | How to increase capture length ("frame.cap_len") when using Wireshark for USB sniffing on Ubuntu? Understood, thank you once again for the info (can't upvote the answer, sorry, not enough reputation). |
2021-07-13 21:37:31 +0000 | marked best answer | How to increase capture length ("frame.cap_len") when using Wireshark for USB sniffing on Ubuntu? I'm using Wireshark 3.2.3 and usbmon for capturing USB traffic on Ubuntu 20.04. All the required tools and packages were installed just a week ago, so they ought to be of recent versions. The problem looks like this in the captured log (after exporting it as JSON): Only half of the actual data was captured by Wireshark. Since the payload can only be decoded as a single continuous stream, this makes it entirely impossible to actually decode and analyze anything from this point forward. How can I increase this limit and capture ALL the payload? |
2021-07-13 09:14:16 +0000 | commented answer | How to increase capture length ("frame.cap_len") when using Wireshark for USB sniffing on Ubuntu? Thank you for the explanation, that's sad. Is there an alternative to usbmon that would let me capture the complete data |
2021-07-12 14:03:05 +0000 | asked a question | How to increase capture length ("frame.cap_len") when using Wireshark for USB sniffing on Ubuntu? How to increase capture length ("frame.cap_len") when using Wireshark for USB sniffing on Ubuntu? I'm using Wireshark 3. |
2018-12-26 09:48:08 +0000 | marked best answer | Export capture log (inc. packet data) in a computer-friendly format The most complete way to export capture log from Wireshark that I've found is plain text with packet data, e. g.: However, I need to parse all this data in software, and I'm not looking forward to parsing all this text back to structured binary data. Seems a waste of resources (mostly my time as a programmer) to export to plain text and then parse it all back, removing all the clutter. Isn't there a more machine-friendly way to export capture data (list of packets with their parsed headers and data content)? |
2018-12-26 09:48:08 +0000 | received badge | ● Scholar (source) |
2018-12-26 09:48:05 +0000 | commented answer | Export capture log (inc. packet data) in a computer-friendly format No idea how I overlooked that. It's still not perfect, but much better. Thanks. |
2018-12-26 06:33:49 +0000 | asked a question | Export capture log (inc. packet data) in a computer-friendly format Export capture log (inc. packet data) in a computer-friendly format The most complete way to export capture log from Wir |