From the PCAP list you search through all your files, public files, and files that you have read access to
You can search by PCAP ID. The PCAP ID uniquely identifies your PCAP in the system.
_id:ZmFzdC1vcGVuLnBjYXBu
By using the username
field you can search for PCAPs uploaded by a certain user.
username: john
You can search files via their metadata. For example, meta information extracted from the PCAP. Metadata search allows you to use Elastic Search query strings to search through your PCAPs.
You can search for exact matches strings or date fields for ranges.
origname:"fast-open.pcapng"
sha1:"34e9e6c2839ff461b70f815515cb6c3cd1551fb3"
databitrate: [1000 TO *]
filesize: [90000 TO *]
By using wildcard search you can search in multiple fields at once using a prefix.
By using tagname
you can search for PCAPs with a specific tag associated with them.
tagname: sharkfest2019
Do an instant deep packet search through all your PCAPs at once
Indexed search leverages the index created for the PCAPs to search through the packets. Indexed search only supports field names that are indexed. You can use normal display filters to search through the PCAPs.
ip.src == 1.1.1.1 or ip.dst == 1.1.1.1
tcp.analysis.retransmission > 0
ip.proto == 1
The resulting PCAP list will include a column that shows how many of the packets in the PCAPs matched your query. To see which field names are indexed open the indicies view of the PCAP or the indexer profile settings page
Different PCAPs might be indexed with different indexer configurations. If a field was not index by the default indexing process, reindexing might be necessary.
Some display filters may have surprising results or may not work. In general protocol or field-existence is not indexed. This means that the following filters that work in the packet list, do not work in the PCAP list:
tcp
http
tcp.analysis.flags
In the PCAP list, you always need to compare to a value. The above filters may be rewritten as follows to get a similar result:
ip.proto == 6 or ipv6.next_header == 6
tcp.srcport == 80 or tcp.dstport == 80 or tcp.srcport == 443 or tcp.dstport == 443
tcp.analysis.flags == 1
Filters that contains special characters like :
or \
may not work, you can try to substitute the character with a wildcard:
eth.src== "00\:10\:a4\:de\:b5\:d0"
eth.src == "00\:07\:50*"
ipv6.src == "fe80\:\:b2ea\:bcff\:fe45\:b870"