Networking/Computing Tips/Tricks

We all know what a great tool Wireshark is.  One of the features added to Wireshark is the ability to temporarily colorize an Ethernet, IP, TCP or UDP conversation.  Some folks this this is great stuff, and wanted to know how to use it, so here goes.  BTW - this is the new 2.x interface.

In the following screen shot, you can see I have a capture file open:

Screen Shot 2015 11 25 at 10.11.37 AM 

The default color rules are in place above, you can see that the Default Profile is being used.

If you closely, you will see that the fourth packet in the capture is an HTTP "get" for a Web Page.  Let's say that I am interested in this conversation, and I want to see the packets associated with this TCP coversation.  There are several options, but one thing I could do is I could use Wiresharks ability to apply a display filter to see the conversation.

Right click on the fourth packet, select Conversation Filter, then TCP:

Screen Shot 2015 11 25 at 10.13.37 AM

This causes a Display filter: (ip.addr eq and ip.addr eq and (tcp.port eq 2714 and tcp.port eq 80) to be used, and the following display:

Screen Shot 2015 11 25 at 10.14.56 AM

The problem with this approach, is that the filter really removes the other traffic from the display that was hapenning while this conversation was occuring.  We all know that it might be nice to see this. 

So the way to do this is use Temporary Colorization.  

To see how this works, I first remove the display filter, the reselect the fourth packet with a right click.  This time I select Colorize Conversation, TCP, and I picked Color 4:

Screen Shot 2015 11 25 at 10.16.57 AM

Keep in mind this is only temporary and does not affect the Color rules you may be using.  Check out the results:

Screen Shot 2015 11 25 at 10.18.49 AM

Now this TCP conversation is colorized in purple so it stands out and together, but I have not lost the context of this conversation along with other packets in the capture.


So how do you remove this temporary colorization?  Simple: hit CTRL-Space, or select the option from the view menu:

Screen Shot 2015 11 25 at 10.20.34 AM

Poof!  The temporary colors are removed and you are back to the Profile Color rules that are in place prior to this exercise.  Temporary and useful.  We like it!

Hope this helped.

Comments powered by CComment

The nicest thing you can do is use these inks to support us!  Thank you!

Support our research!  Buy me a coffee :)

Support our research. Become a Patron!

Find by Tag

4G Networks 5G Networks 6in4 6LoWLAN 6LoWPAN 802.11 802.11ah 802.11ax 802.11ay 802.11az Addressing Analysis Ansible Architecture ARP AToM BGP Bloom's Taxonomy Broadband Cable cat CBRS CellStream Cellular Central Office Cheat Sheet Chrome Cisco Cloud Coloring Rules Computer Consulting CPI Customer Support Data Center Data Networking DHCPv6 DNS Docker Documentation Dublin-Traceroute dumpcap ECMP Ethernet Ethics Fragmentation G-MPLS Git GNS3 Google GQUIC Hands-On History Home Network ICMP ICMPv6 IEEE 802.11p IEEE 802.15.4 Interface Control Internet IoT IPsec IPv4 IPv6 IS-IS L2VPN L3VPN LDP Linux LLN LoL M-BGP MAC MAC OSx Macro Microsoft mininet Monitoring MPLS MTU Multicast My Room Name Resolution Netcat Netmiko NetMon netsh Networking Network Science nmap Npcap Online School OpenFlow OSPF OSPFv2 OSPFv3 OSX OTT Paris-Traceroute Parrot PIM pktmon PMTU Policy POTS POTS to Pipes PPP Profile Programming Project Management Protocol 41 PW3E Python QoS QUIC Remote Desktop Requirements RIP Routing RPL RSVP Rural SAS SDN Security Service Provider Small Business SONET Speed SS7 SSH SSL Subnetting SYSCTL T-Shark TCP TCP/IP Telco Telecom 101 Telecommunications Telephone termshark TLS Tools Traceroute Traffic Engineering Training Travel Tunnel Ubuntu Utility Video Virtualbox Virtualization VoIP VRF VXLAN Webex WEP Wi-Fi Wi-Fi 4 Wi-Fi 5 Wi-Fi 6 Wi-Fi 6/6E Windows Winpcap Wireless Wireless 5G Wireshark Wireshark Tip WLAN WPA2 Zenmap ZigBee Zoom

Support us by clicking:

Twitter Feed