Difference between revisions of "Wireshark: Capture SQL Traffic"
Jump to navigation
Jump to search
Onnowpurbo (talk | contribs) (New page: 'm trying to identify the source of some ill-timed connection resets. I'm trying to use Wireshark to capture the traffic that goes between the application server and database server. How d...) |
Onnowpurbo (talk | contribs) |
||
(3 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
− | + | Kadang kala kita perlu menangkap komunikasi antara server Web dengan database server. | |
− | + | Melalui wireshark kita data memfilter | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | + | Capture Options (ctrl-K). | |
− | + | Untuk mem-filter komunikasi ke SQL server, kita butuh informasi | |
− | + | host <sql-server-ip> | |
+ | port <sql-server-port> | ||
+ | |||
+ | Filter yang diberikan dapat menggunakan format, | ||
ip.addr == <sql-server-ip> && tcp.port == <sql-server-port> | ip.addr == <sql-server-ip> && tcp.port == <sql-server-port> | ||
− | + | Biasanya SQL Server port adalah 1433 | |
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
Latest revision as of 11:23, 18 April 2017
Kadang kala kita perlu menangkap komunikasi antara server Web dengan database server. Melalui wireshark kita data memfilter
Capture Options (ctrl-K).
Untuk mem-filter komunikasi ke SQL server, kita butuh informasi
host <sql-server-ip> port <sql-server-port>
Filter yang diberikan dapat menggunakan format,
ip.addr == <sql-server-ip> && tcp.port == <sql-server-port>
Biasanya SQL Server port adalah 1433