'Analyze' and 'Decode as' options for Pcaps
NabaragRebaca opened this issue · 2 comments
Hi @lmangani
Is it possible to use the 'Decode as' functionality like we have in wireshark through the analyze option. I have a need to provide a port with a specific value and analyze the pcap when the protocol field matches the value.
I am successfully passing the filters value in URL and looking something similar to that.
Any help would be highly appreciated.
Hello @NabaragRebaca I don't think this is currently a viable option. This UI is just a viewer of sharkd output so all filtering needs to be done upfront. Filtering ports should not require "Decode As" so I'm not sure what to suggest.
Hello,For example We have one http PCAP run tcp port eg 1433(SQL port),It is HTTP traffic, but webshark decode as TCP. Wireshark and tshark can manual decode as HTTP, I did not find webshark or shard support this
Is it possible pull sharkd support that?(Then webshark can support it)