Differences between revisions 7 and 8
Revision 7 as of 2008-07-09 00:07:02
Size: 1737
Editor: GuyHarris
Comment: That's a display filter, not a capture filter.
Revision 8 as of 2008-09-12 02:43:00
Size: 1692
Editor: GuyHarris
Comment: Show the screenshot of MSNMS traffic.
Deletions are marked like this. Additions are marked like this.
Line 12: Line 12:
XXX - Add example traffic here (as plain text or Wireshark screenshot).
{{attachment:msnms.png}}

MSN Messenger Service (MSNMS)

XXX - add a brief MSNMS description here

History

XXX - add a brief description of MSNMS history

Protocol dependencies

  • TCP: Typically, MSNMS uses TCP as its transport protocol. The default TCP port for MSNMS traffic is 1863.

Example traffic

msnms.png

Wireshark

The MSNMS dissector is (fully functional, partially functional, not existing, ... whatever the current state is). Also add info of additional Wireshark features where appropriate, like special statistics of this protocol.

Preference Settings

(XXX add links to preference settings affecting how MSNMS is dissected).

Example capture file

XXX - Add a simple example capture file to the SampleCaptures page and link from here (see below). Keep this file short, it's also a good idea to gzip it to make it even smaller, as Wireshark can open gzipped files automatically.

Display Filter

A complete list of MSNMS display filter fields can be found in the display filter reference

  • Show only the MSNMS based traffic:
     msnms

Capture Filter

You cannot directly filter MSNMS protocols while capturing. However, if you know the TCP port used (see above), you can filter on that one.

  • Capture only the MSNMS traffic over the default port (1863):
     tcp port 1863

Discussion

MSNMS (last edited 2008-09-12 02:43:00 by GuyHarris)