Capture by instead:
sudo wireshark -f http -k
sudo wireshark -f icmp -k
Filter by both protocol and host:
sudo wireshark -f 'host 192.168.1.102 and icmp' -k
For application layer capture filtering, the best you can do is by port:There is an
sudo wireshark -f 'tcp port 80'
http
filter but only for as a wireshark display filterTODO can't find any details about his early days? Sad:
The Linux kernel responds to ICMP directly by Ciro Santilli 35 Updated 2024-12-23 +Created 1970-01-01
There is no userland process for it, it is handled directly by the Linux kernel: unix.stackexchange.com/questions/439801/what-linux-process-is-responsible-for-responding-to-pings/768739#768739
Find computer IP with the
ip
CLI tool by Ciro Santilli 35 Updated 2024-12-23 +Created 1970-01-01As per stackoverflow.com/a/52351480/895245 our standard test setup is:
while true; do
resp=$"$(date): hello\n"
len="$(printf '%s' "$resp" | wc -c)"
printf "HTTP/1.1 200 OK\r\nContent-Length: $len\r\n\r\n${resp}\n" | nc -Nl 8000
done
There are unlisted articles, also show them or only show them.