You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Open Wireshark (as administrator) and select Edit → Preferences... → Protocols → DLT_USER → Edit... → + and, for User 0 (DLT=147), set the payload protocol to winshark (other instructions say to use etw, but Wireshark says dissector not found).
Following the instructions, what I do and see for capture method 1:
Open PowerShell as administrator and run command pktmon start -c -m real-time (real-mode is stated in the Winshark documentation, but this is not a valid argument).
Open Wireshark as administrator and start a capture on the interface Pktmon. No network-level data is displayed, only Microsoft-Windows-PktMon:
Switch to the PowerShell window and, to stop the capture, press CTRL + C.
Following the instructions, what I do and see for capture method 2:
Open PowerShell as administrator and run commands netsh.exe trace start capture=yes report=no correlation=no and then logman start Winshark-PacketCapture -p "Microsoft-Windows-NDIS-PacketCapture" -rt -ets.
Open Wireshark as administrator and start a capture on the interface Winshark-PacketCapture. Only layer 2 network-level data is displayed.
Switch to the PowerShell window and, to stop the captures, run commands netsh.exe trace stop (this one can take a little while and a lot of CPU for the data collection to complete) and then logman stop Winshark-PacketCapture -ets. (I'd like to see this included in the documentation for others.)
The text was updated successfully, but these errors were encountered:
My environment:
My install process:
Edit
→Preferences...
→Protocols
→DLT_USER
→Edit...
→+
and, forUser 0 (DLT=147)
, set the payload protocol towinshark
(other instructions say to useetw
, but Wireshark saysdissector not found
).Following the instructions, what I do and see for capture method 1:
pktmon start -c -m real-time
(real-mode
is stated in the Winshark documentation, but this is not a valid argument).Pktmon
. No network-level data is displayed, onlyMicrosoft-Windows-PktMon
:Following the instructions, what I do and see for capture method 2:
netsh.exe trace start capture=yes report=no correlation=no
and thenlogman start Winshark-PacketCapture -p "Microsoft-Windows-NDIS-PacketCapture" -rt -ets
.Winshark-PacketCapture
. Only layer 2 network-level data is displayed.netsh.exe trace stop
(this one can take a little while and a lot of CPU for the data collection to complete) and thenlogman stop Winshark-PacketCapture -ets
. (I'd like to see this included in the documentation for others.)The text was updated successfully, but these errors were encountered: