Difference between revisions of "Wireshark: Capture SQL Traffic"
Onnowpurbo (talk | contribs) |
Onnowpurbo (talk | contribs) |
||
Line 1: | Line 1: | ||
− | + | Kadang kala kita perlu menangkap komunikasi antara server Web dengan database server. | |
− | + | Melalui wireshark kita data memfilter | |
− | + | ||
− | + | Capture Options (ctrl-K). | |
+ | |||
+ | |||
Revision as of 11:18, 18 April 2017
Kadang kala kita perlu menangkap komunikasi antara server Web dengan database server. Melalui wireshark kita data memfilter
Capture Options (ctrl-K).
Wireshark has display filters and capture filters. The capture filter captures only certain packets, resulting in a small capture file. Capture filters are set in Capture Options (ctrl-K). An example to capture SQL Server traffic would be:
host <sql-server-ip> and port <sql-server-port>
A display filter is set in the toolbar. A display filter does not reduce the size of the capture. You can change a display filter while the capture is running. An example display filter:
ip.addr == <sql-server-ip> && tcp.port == <sql-server-port>
The default SQL Server port is 1433.
You can use only tds to identify the traffic between SQL Server's client and server, this fill filter a lot of noise packet.
Or you can append the tds with the and or && operator after other filters if you want to filter more specific traffic.