博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
tshark CAN协议分析初试
阅读量:5920 次
发布时间:2019-06-19

本文共 6745 字,大约阅读时间需要 22 分钟。

/********************************************************************************* *                        tshark CAN协议分析初试 * 说明: *     使用tshark分析CAN数据,协议支持,不过貌似CANopen的协议分析不出来,单纯的CAN * 数据分析data部分都无法显示,目前不知道原因。 * *                                              2018-2-5 深圳 宝安西乡 曾剑锋 ********************************************************************************/一、tshark help:    [buildroot@root ~]#  tshark -h    Running as user "root" and group "root". This could be dangerous.    TShark (Wireshark) 2.2.6 (wireshark-2.2.6)    Dump and analyze network traffic.    See https://www.wireshark.org for more information.        Usage: tshark [options] ...        Capture interface:      -i 
name or idx of interface (def: first non-loopback) -f
packet filter in libpcap filter syntax -s
packet snapshot length (def: 65535) -p don't capture in promiscuous mode -I capture in monitor mode, if available -B
size of kernel buffer (def: 2MB) -y
link layer type (def: first appropriate) -D print list of interfaces and exit -L print list of link-layer types of iface and exit Capture stop conditions: -c
stop after n packets (def: infinite) -a
... duration:NUM - stop after NUM seconds filesize:NUM - stop this file after NUM KB files:NUM - stop after NUM files Capture output: -b
... duration:NUM - switch to next file after NUM secs filesize:NUM - switch to next file after NUM KB files:NUM - ringbuffer: replace after NUM files Input file: -r
set the filename to read from (- to read from stdin) Processing: -2 perform a two-pass analysis -R
packet Read filter in Wireshark display filter syntax -Y
packet displaY filter in Wireshark display filter syntax -n disable all name resolutions (def: all enabled) -N
enable specific name resolution(s): "mnNtCd" -d
==
,
... "Decode As", see the man page for details Example: tcp.port==8888,http -H
read a list of entries from a hosts file, which will then be written to a capture file. (Implies -W n) --disable-protocol
disable dissection of proto_name --enable-heuristic
enable dissection of heuristic protocol --disable-heuristic
disable dissection of heuristic protocol Output: -w
write packets to a pcap-format file named "outfile" (or to the standard output for "-") -C
start with specified configuration profile -F
set the output file type, default is pcapng an empty "-F" option will list the file types -V add output of packet tree (Packet Details) -O
Only show packet details of these protocols, comma separated -P print packet summary even when writing to a file -S
the line separator to print between packets -x add output of hex and ASCII dump (Packet Bytes) -T pdml|ps|psml|json|ek|text|fields format of text output (def: text) -j
protocols layers filter if -T ek|pdml|json selected, (e.g. "http tcp ip", -e
field to print if -Tfields selected (e.g. tcp.port, _ws.col.Info) this option can be repeated to print multiple fields -E
=
set options for output when -Tfields selected: bom=y|n print a UTF-8 BOM header=y|n switch headers on and off separator=/t|/s|
select tab, space, printable character as separator occurrence=f|l|a print first, last or all occurrences of each field aggregator=,|/s|
select comma, space, printable character as aggregator quote=d|s|n select double, single, no quotes for values -t a|ad|d|dd|e|r|u|ud output format of time stamps (def: r: rel. to first) -u s|hms output format of seconds (def: s: seconds) -l flush standard output after each packet -q be more quiet on stdout (e.g. when using statistics) -Q only log true errors to stderr (quieter than -q) -g enable group read access on the output file(s) -W n Save extra information in the file, if supported. n = write network address resolution information -X
:
eXtension options, see the man page for details -U tap_name PDUs export mode, see the man page for details -z
various statistics, see the man page for details --capture-comment
add a capture comment to the newly created output file (only for pcapng) Miscellaneous: -h display this help and exit -v display version info and exit -o
:
... override preference setting -K
keytab file to use for kerberos decryption -G [report] dump one of several available reports and exit default report="fields" use "-G ?" for more help WARNING: dumpcap will enable kernel BPF JIT compiler if available. You might want to reset it By doing "echo 0 > /proc/sys/net/core/bpf_jit_enable" [buildroot@root ~]#二、tshark支持协议查看: tshark -G protocols三、vcan设置: sudo ip link add dev vcan0 type vcan sudo ip link set up vcan0 candump vcan0 canopend vcan0 -i 4 -s od4_storage -a od4_storage_auto四、tshark抓包设备显示: [buildroot@root ~]# sudo tshark -D Running as user "root" and group "root". This could be dangerous. 1. eth0 2. vcan0 3. any 4. lo (Loopback) 5. usbmon1 6. usbmon2 7. usbmon3 8. randpkt (Random packet generator) [buildroot@root ~]#五、tshark vcan抓包: [buildroot@root ~]# tshark -i vcan0 Running as user "root" and group "root". This could be dangerous. Capturing on 'vcan0' device vcan0 entered promiscuous mode 1 0.000000000 ? CAN 32 STD: 0x00000704 7f 2 0.000023000 ? CAN 32 STD: 0x00000704 7f 3 1.001414667 ? CAN 32 STD: 0x00000704 7f 4 1.001437667 ? CAN 32 STD: 0x00000704 7f 5 2.001844334 ? CAN 32 STD: 0x00000704 7f 6 2.001867334 ? CAN 32 STD: 0x00000704 7f 7 3.002829334 ? CAN 32 STD: 0x00000704 7f 8 3.002850334 ? CAN 32 STD: 0x00000704 7f六、tshark vcan can协议解析: [buildroot@root ~]# tshark -i vcan0 -O can Running as user "root" and group "root". This could be dangerous. Capturing on 'vcan0' device vcan0 entered promiscuous mode Frame 1: 32 bytes on wire (256 bits), 32 bytes captured (256 bits) on interface 0 Linux cooked capture Controller Area Network ...0 0000 0000 0000 0000 0111 0000 0100 = Identifier: 0x00000704 0... .... .... .... .... .... .... .... = Extended Flag: False .0.. .... .... .... .... .... .... .... = Remote Transmission Request Flag: False ..0. .... .... .... .... .... .... .... = Error Flag: False Frame-Length: 1 Data (1 byte) Frame 2: 32 bytes on wire (256 bits), 32 bytes captured (256 bits) on interface 0 Linux cooked capture Controller Area Network ...0 0000 0000 0000 0000 0111 0000 0100 = Identifier: 0x00000704 0... .... .... .... .... .... .... .... = Extended Flag: False .0.. .... .... .... .... .... .... .... = Remote Transmission Request Flag: False ..0. .... .... .... .... .... .... .... = Error Flag: False Frame-Length: 1 Data (1 byte)

 

转载于:https://www.cnblogs.com/zengjfgit/p/8416377.html

你可能感兴趣的文章
Java实现的冒泡排序
查看>>
APP中的第三方“支付”功能该如何测试
查看>>
HDU 1907
查看>>
数值积分中的辛普森方法及其误差估计
查看>>
Web service (一) 原理和项目开发实战
查看>>
跑带宽度多少合适_跑步机选购跑带要多宽,你的身体早就告诉你了
查看>>
SQL Over
查看>>
shell 批量压缩指定文件夹及子文件夹内图片
查看>>
TextGrocery中文文本分类处理
查看>>
WinForm 之 自定义标题栏的窗体移动
查看>>
PHP合并数组+与array_merge的区别
查看>>
可汗学院超经典、超实用概率论总结——商女不知忘国恨,隔江犹看概率论
查看>>
ftoa浮点型转换成字符串
查看>>
翻译:MariaDB wait/nowait
查看>>
使用Costura.Fody将源DLL合并到目标EXE
查看>>
今年暑假不AC
查看>>
sql语句中----删除表数据drop、truncate和delete的用法
查看>>
Office2010从第三页开始设置页码
查看>>
想知道Java与内存的关系?这篇文章全部告诉你
查看>>
SVG笔记
查看>>