wireshark http POST

11,925

Solution 1

There's no guarantee that all of the posted data will be in the same packet as the POST command string itself. In fact, if the posted data is more than about 1500 bytes (probably a little less due to the presence of other HTTP headers), you're practically guaranteed it won't all be in the same packet. So for best results you'll need a filtering method that understands multi-packet HTTP transaction, and libpcap's filter language (which is what tcpdump uses and what wireshark uses for capture filters) ain't it.

Solution 2

What operating system?

If it's linux you can use tcpdump -s 0 -A -i <if> port 80 along with what ever other filters you need to capture and print the http packets you're interested in, and then pipe it to a perl/bash/awk/whatever script to filter that content from there.

Solution 3

Its hard to understand what your asking but my guess is that you just need to find the packet in your Wireshark capture, right click on it, and choose "Follow Stream" from the menu . Its just a guess... just trying to help?

Share:
11,925
Nakilon
Author by

Nakilon

I am an active user of StackOverflow since 2010 and I assure you that this place is not what it looks like. A group of inadequate Rubyists teaming with SO moderators are stalking me and abusing their privileges to delete all my content without a reason. When I have managed to make one moderator follow the rules, in revenge thay randomly chose one old answer of mine and collectively downvoted it 5 times within minutes -- I flagged that but moderators ignored it, same as they have ignored all the rest of my flags. Because they are the same team. Toxic community of ungrateful inadequate people who censor me and delete my content just because I responsibly follow the official rules of SO that they don't follow. They are blatantly violating multiple SO rules, they are collectively stalking, downvoting and deleting random answers of mine just to show that nothing can stop them because they are moderators. Such behaviour isn't professional, it is disgusting and shameful. They are such mean people that even write insults on me in comments. When I flags insults the flags get ignored. No matter what is written in rules of SO they don't work because moderators are promoting different rules -- such that allow people to insult you in comments, calling you bad words, saying that you are handicapped and other things. Moderators refuse to remove such comments and if you create a post in Meta to highlight the problem, instead of acting and fixing it they only write even more insults on you -- the Meta website is a trap place where they call you to come to throw even more trash on you, publicly insult and demean you. Do not believe moderators -- they always lie and censor everything that would expose it.

Updated on September 17, 2022

Comments

  • Nakilon
    Nakilon over 1 year

    I would like to have a http POST request method CAPTURE filter.

    I know it is easy to do it by display filter http.request.method==POST but I need tcpdump compatible.

    I wrote tcp dst port 80 and (tcp[13] = 0x18)
    But it is not perfect...

    tcp dst port 80 and (tcp[((tcp[12:1] & 0xf0) >> 2):4] = 0x504f5354)
    works better, but... packages are not treated as a http packages, so I can not do my further display filters...

    And is there any way to not display frame, tcp, ip and http header information, only data-text-lines field value (content of POST)?

    Or same thing in tcpdump, only dumping of POSTed html form content?

    • Admin
      Admin about 14 years
      I want to see only http POST packets in tcpdump