Wireshark capture filter Updated 2025-07-16
Capture by instead:
sudo wireshark -f http -k
sudo wireshark -f icmp -k
Filter by both protocol and host:
sudo wireshark -f 'host 192.168.1.102 and icmp' -k
For application layer capture filtering, the best you can do is by port:
sudo wireshark -f 'tcp port 80'
There is an http filter but only for as a wireshark display filter
27 Inch QHD (2560x1440) Monitor, 60Hz, IPS, 5ms, Ultrathin Bezel, 99% sRGB, DisplayPort, HDMI, 5x USB, 3 Year Warranty
Monorepo Updated 2025-07-16
Breast Updated 2025-07-16
C++ library Updated 2025-07-16
Amazon EC2 hello world Updated 2025-07-16
Let's get SSH access, instal a package, and run a server.
As of December 2023 on a t2.micro instance, the only one part of free tier at the time with advertised 1 vCPU, 1 GiB RAM, 8 GiB disk for the first 12 months, on Ubuntu 22.04:
$ free -h
               total        used        free      shared  buff/cache   available
Mem:           949Mi       149Mi       210Mi       0.0Ki       590Mi       641Mi
Swap:             0B          0B          0B
$ nproc
1
$ df -h /
Filesystem      Size  Used Avail Use% Mounted on
/dev/root       7.6G  1.8G  5.8G  24% /
To install software:
sudo apt update
sudo apt install cowsay
cowsay asdf
Once HTTP inbound traffic is enabled on security rules for port 80, you can:
while true; do printf "HTTP/1.1 200 OK\r\n\r\n`date`: hello from AWS" | sudo nc -Nl 80; done
and then you are able to curl from your local computer and get the response.
Delft OpenCourseWare Updated 2025-07-16
They have a lot of stuff, well done.
CC BY-NC-SA by default unfortunately, but what can you do...

There are unlisted articles, also show them or only show them.