wireshark抓包mysql
2020-04-15 本文已影响0人
仙境源地
官网下载地址
场景1:抓某一个接口指定查询sql语句(例如jpa中调用的sql展示)
-
选择需要监听的网卡
屏幕快照 2020-04-15 上午11.27.17.png
-
开始抓包后选择需要监听的内容
tcp.dstport == 3306 and mysql.query contains select
屏幕快照 2020-04-15 上午11.25.19.png
-
点击记录详情,查看完整的sql语句
/* load one-to-many com.aihuishou.service.tic.entity.BaseTradeInOrder.tradeInOrderRefunds */ select tradeinord0_.trade_in_order_id as trade_i17_8_1_, tradeinord0_.id as id1_8_1_, tradeinord0_.id as id1_8_0_, tradeinord0_.after_sale_no as after_sa2_8_0_, tradeinord0_.amount as amount3_8_0_, tradeinord0_.created_dt as created_4_8_0_, tradeinord0_.gateway_serial_no as gateway_5_8_0_, tradeinord0_.gateway_type as gateway_6_8_0_, tradeinord0_.memo as memo7_8_0_, tradeinord0_.order_no as order_no8_8_0_, tradeinord0_.origin_amount as origin_a9_8_0_, tradeinord0_.out_serial_no as out_ser10_8_0_, tradeinord0_.refund_fail_dt as refund_11_8_0_, tradeinord0_.refund_reason as refund_12_8_0_, tradeinord0_.refund_status as refund_13_8_0_, tradeinord0_.refund_success_dt as refund_14_8_0_, tradeinord0_.trade_in_order_id as trade_i17_8_0_, tradeinord0_.updated_dt as updated15_8_0_, tradeinord0_.user_key as user_ke16_8_0_ from trade_in_order_refund tradeinord0_ where tradeinord0_.trade_in_order_id in (6169, 6178, 6177, 6176, 6175, 6174, 6173, 6172, 6171, 6170)
![](https://img.haomeiwen.com/i14492059/2fba6a4c9ee70947.png)
- 过滤表达式如何写
Analyze->Display Filter Expression
![](https://img.haomeiwen.com/i14492059/94c41f5a61b72ff0.png)
场景2:抓包本地http请求
选择lo0这个本地有流量的
![](https://img.haomeiwen.com/i14492059/19db05743577c45a.png)
抓包本地http
![](https://img.haomeiwen.com/i14492059/545f0695d2604d81.png)