Inspecting the client and server interaction

In the following example, we are capturing packets on localhost with the execution of the TCP client and server on port 12345. When the client sends a message to the server, we can capture the packetsĀ that are being exchanged in the communication.

We can perform packet filtering by using ip.dst == 127.0.0.1, as shown in the following screenshot:

As we are capturing packets on a non-standard port, Wireshark doesn't decode data packetsĀ in the data section (as shown in the middle pane of the preceding screenshot). However, you can see the decoded text on the bottom pane, where the server's timestamp is shown on the right-hand side.