一、Wireshark 时间显示设置
1、在菜单栏上面点击视图->时间显示格式->选择自捕获开始经过秒数和自动(根据捕获文件),如图所示
这样设置就可以看出客户端和服务端每个数据包间隔时间
二、设置列用来显示当前包与前面包的时间间隔,具体步骤如下:
1、点击菜单栏上编辑->首选项,如图所示
2、点击首选项后,然后在首选窗口左侧选择外观->列,如图所示
3、点击该窗口的+号添加一个新的一咧,然后命令为tcp.time_delta,然后选择Absolute date,as YYYY-MM-DD,and time 这个时间来捕获设备所处时区的日期和时间,如图所示
4、在Wireshark首选项窗口中依次选择Protocols->TCP,然后勾选Calculate conversation timestamps,如图所示
三、案例分析
1、本机向DNS服务器查询域名
1982 237.385558 2021-06-30 10:25:09.381124 10.10.242.234 116.116.116.116 DNS 87 Standard query 0x2d62 A push.live.blackview4g.com
2、DNS服务器根据域名向本机客户端响应对应的IP地址
1983 237.433036 2021-06-30 10:25:09.428602 116.116.116.116 10.10.242.234 DNS 170 Standard query response 0x2d62 A push.live.blackview4g.com CNAME push.live.blackview4g.com.w.kunlunso.com A 211.91.241.244 A 211.91.241.243
3、服务器和客户端进行3次握手成功,客户端和服务端RTMP连接成功
//握手第一次
1984 237.434836 2021-06-30 10:25:09.430402 10.10.242.234 211.91.241.244 TCP 76 52090 → 1935 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 SACK_PERM=1 TSval=4294962282 TSecr=0 WS=256
1985 237.494042 2021-06-30 10:25:09.489608 211.91.241.244 10.10.242.234 TCP 68 1935 → 52090 [SYN, ACK] Seq=0 Ack=1 Win=29200 Len=0 MSS=1360 SACK_PERM=1 WS=512
1986 237.494242 2021-06-30 10:25:09.489808 10.10.242.234 211.91.241.244 TCP 56 52090 → 1935 [ACK] Seq=1 Ack=1 Win=87808 Len=0
1987 237.494964 2021-06-30 10:25:09.490530 10.10.242.234 211.91.241.244 TCP 1416 52090 → 1935 [ACK] Seq=1 Ack=1 Win=87808 Len=1360
1988 237.495017 2021-06-30 10:25:09.490583 10.10.242.234 211.91.241.244 RTMP 233 Handshake C0+C1
//握手第二次
1989 237.562119 2021-06-30 10:25:09.557685 211.91.241.244 10.10.242.234 TCP 56 1935 → 52090 [ACK] Seq=1 Ack=1361 Win=32256 Len=0
1990 237.562227 2021-06-30 10:25:09.557793 211.91.241.244 10.10.242.234 TCP 56 1935 → 52090 [ACK] Seq=1 Ack=1538 Win=34816 Len=0
1991 237.562262 2021-06-30 10:25:09.557828 211.91.241.244 10.10.242.234 TCP 1416 1935 → 52090 [ACK] Seq=1 Ack=1538 Win=34816 Len=1360
1992 237.562285 2021-06-30 10:25:09.557851 211.91.241.244 10.10.242.234 TCP 233 1935 → 52090 [PSH, ACK] Seq=1361 Ack=1538 Win=34816 Len=177
1993 237.562304 2021-06-30 10:25:09.557870 211.91.241.244 10.10.242.234 TCP 1416 1935 → 52090 [ACK] Seq=1538 Ack=1538 Win=34816 Len=1360
1994 237.562344 2021-06-30 10:25:09.557910 10.10.242.234 211.91.241.244 TCP 56 52090 → 1935 [ACK] Seq=1538 Ack=1361 Win=90624 Len=0
1995 237.562381 2021-06-30 10:25:09.557947 10.10.242.234 211.91.241.244 TCP 56 52090 → 1935 [ACK] Seq=1538 Ack=1538 Win=93440 Len=0
1996 237.562407 2021-06-30 10:25:09.557973 10.10.242.234 211.91.241.244 TCP 56 52090 → 1935 [ACK] Seq=1538 Ack=2898 Win=96256 Len=0
1997 237.562454 2021-06-30 10:25:09.558020 10.10.242.234 211.91.241.244 TCP 1416 52090 → 1935 [ACK] Seq=1538 Ack=2898 Win=96256 Len=1360
1998 237.562483 2021-06-30 10:25:09.558049 10.10.242.234 211.91.241.244 RTMP 232 Handshake C2
//客户端和服务端连接成功
1999 237.612021 2021-06-30 10:25:09.607587 211.91.241.244 10.10.242.234 RTMP 232 Handshake S0+S1+S2
2000 237.612215 2021-06-30 10:25:09.607781 10.10.242.234 211.91.241.244 RTMP 167 connect('app')