Rawshark (Wireshark) 4.2.6 (v4.2.6rc0-2-g76ee960786d7) Dump and analyze network traffic. See https://www.wireshark.org for more information. Usage: rawshark [options] ... Input file: -r set the pipe or file name to read from Processing: -d | packet encapsulation or protocol -F field to display -m virtual memory limit, in bytes -n disable all name resolutions (def: "mNd" enabled, or as set in preferences) -N enable specific name resolution(s): "mnNtdv" -p use the system's packet header format (which may have 64-bit timestamps) -R packet filter in Wireshark display filter syntax -s skip PCAP header on input --enable-protocol enable dissection of proto_name --disable-protocol disable dissection of proto_name --only-protocols Only enable dissection of these protocols, comma separated. Disable everything else --disable-all-protocols Disable dissection of all protocols --enable-heuristic enable dissection of heuristic protocol --disable-heuristic disable dissection of heuristic protocol Output: -l flush output after each packet -S format string for fields (%D - name, %S - stringval, %N numval) -t (a|ad|adoy|d|dd|e|r|u|ud|udoy)[.[N]]|.[N] output format of time stamps (def: r: rel. to first) -u s|hms output format of seconds (def: s: seconds) Diagnostic output: --log-level sets the active log level ("critical", "warning", etc.) --log-fatal sets level to abort the program ("critical" or "warning") --log-domains <[!]list> comma-separated list of the active log domains --log-fatal-domains list of domains that cause the program to abort --log-debug <[!]list> list of domains with "debug" level --log-noisy <[!]list> list of domains with "noisy" level --log-file file to output messages to (in addition to stderr) Miscellaneous: -h, --help display this help and exit -v, --version display version info and exit -o : ... override preference setting -K keytab file to use for kerberos decryption