From 1c1dddd2b2200214f3b08596cd31f2295e47754d Mon Sep 17 00:00:00 2001 From: brutzman <brutzman@nps.edu> Date: Sun, 22 May 2022 02:29:38 -0700 Subject: [PATCH] add step for launching --- documentation/Wireshark/README.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/documentation/Wireshark/README.md b/documentation/Wireshark/README.md index 3cd36081ce..1b1eb7d708 100644 --- a/documentation/Wireshark/README.md +++ b/documentation/Wireshark/README.md @@ -21,15 +21,16 @@ IMPORTANT: if you have already installed Wireshark, check your version! Always use the latest version so that operating-system security and feature sets are up to date. 1. Download Wireshark from https://www.wireshark.org -2. Install as local administrator if possible +2. Install Wireshark using local administrator permissions if possible. 3. Launch and see if network packets are being detected. | Successful installation, monitoring network traffic | Failed installation, no monitoring of network traffic | | ------ | ------ | | <a href="images/WiresharkNetworkInterfaces.png"><img src="images/WiresharkNetworkInterfaces.png" width="400" align="center"/></a> | <a href="images/WiresharkNoNetworkTraffic.png"><img src="images/WiresharkNoNetworkTraffic.png" width="400" align="center"/></a> | -4. Check your network interfaces via console commands [ipconfig](ipconfig.txt) -5. Double-check network interfaces using [ipconfig /all](ipconfigAllExcerpt.txt) to see any hidden interfaces +4. Check your network interfaces via console commands [ipconfig](ipconfig.txt). +5. Double-check network interfaces using [ipconfig /all](ipconfigAllExcerpt.txt) to see any hidden interfaces. +6. Select blue "fin" Wireshark button in header bar to begin monitoring packets. ## Capturing Packets @@ -45,8 +46,7 @@ Always use the latest version so that operating-system security and feature sets | <a href="images/WiresharkPreferencesCapture.png"><img src="images/WiresharkPreferencesCapture.png" width="400" align="center"/> | | 2. Set filter to `(tcp.port == 3000 || udp.port == 3000) && dis` -3. Press the blue Wireshark fin in the header bar to begin monitoring packets. -4. Launch one of the example programs to send packets, then observe results. +3. Launch one of the example programs to send packets, then observe results. | `udp && dis` | `(tcp.port == 3000 \|\| udp.port == 3000) && dis` | | ------ | ------ | -- GitLab