How to apply filter in wireshark

I am new to wireshark and trying to write simple filters. Unless all four handshake packets are present for the session you're trying to decrypt, Wireshark won't be able to decrypt the traffic. 0. host == "example. Wireshark uses display filters for general packet filtering while viewing and for its ColoringRules. *\xff". 5 Back to Display Filter Reference Mar 11, 2016 · To filter out a mac address in Wireshark, make a filter like so: To get the mac address, type “ncpa. Most applications do have a "signature" to their traffic e. eth. Now click on the filter box between the main toolbar and the packet list in the main Wireshark window. If a packet meets the requirements expressed in your filter, then it is displayed in the list of packets. Type http. What does it do? It takes the string you enter, splits it into 1, 2, or 4 byte chunks, converts them to numbers, and creates a capture filter that matches those numbers at the offset you provide. off-topic. This expression translates to “pass all traffic with a source IPv4 address of 192. I did following: In the search field/panel, selected "Packet Details" then "String" then typed "Application Data" then the search result highlighted the exact field in the Packet Details where it appears; I Right clicked on the field in the Packet Details > Select Add as a Column In this video, I cover the process of using display & capture filters with Wireshark in order to filter through and identify malicious network traffic. 1 && ip. Defining And Saving Filters. In the interfaces, choose a particular Ethernet adapter and note down its IP, and click the start button of the selected adapter. They can be used to check for the presence of a protocol or field, the value of a field, or even compare two fields to each other. 1 and 2. At the network layer, you can limit the results to an IP address using this display filter: Dec 29, 2023 · If you don’t see the Home page: Click on Capture on the menu bar and then select Options from that drop-down menu. So for your case, you could do: eth. ⭐Help Support Hacke Jun 7, 2021 · There are several ways in which you can filter Wireshark by IP address: 1. Field name. 5 Back to Display Filter Reference An even better way to find the DESKTOP-string is to clear the Wireshark filter and use the Find Packet function under Wireshark’s Edit menu, as shown below in Figure 20. 3. Jul 2, 2020 · sudo pacman -Syu wireshark-qt. Apply a display filter that hides all broadcast packets, then search the Packet List pane for deauthentication packets. What is this? It's a web page that lets you create capture filters that match strings in TCP payloads. This can save time in remembering and retyping some of the more complex filters you use. Locate and click on the display filter toolbar in Wireshark. Oct 28, 2010 · You can also limit the filter to only part of the ip address. When I use a filter with the IP address of the device (ip==192. 0/8. Filter time in epoch time format. Open our first pcap named Wireshark-tutorial-filter-expressions-1-of-5. Nov 19, 2023 · Activity 2 - Select Destination Traffic. addr == 10. 0 to 4. 1, “The “Coloring Rules” dialog box”. Figure 4. You can use the display filter eapol to locate EAPOL packets in your capture. The most basic way to apply a filter is by typing it into the filter box at the top of the window and clicking Apply (or pressing Enter). Good luck! Jul 15, 2022 · Start by clicking on the plus button to add a new display filter. dst==159. it is also possible to filter for certain packets using the epoch time format. However, it's likely that the traffic for the May 31, 2024 · Filtering HTTP Traffic to and from Specific IP Address in Wireshark. hostname". 4. For example: ip. 3 ways to troubleshoot using Wireshark and tcpdump Protocol analyzer tools, such as Wireshark and tcpdump, can help network administrators identify protocols in the network, analyze network performance and discover network devices. 7. Notice that the Packet List Lane now only DisplayFilters. 5). At the transport layer, you can specify a port using this display filter: tcp. The above display filter expression will set a filter for a specific port number and also sets a Wireshark and TShark share a powerful filter engine that helps remove the noise from a packet trace and lets you see only the packets that interest you. Apply the current value in the edit area as the new display filter. Wireshark provides a display filter language that enables you to precisely control which packets are displayed. Aug 26, 2015 · Just select Displayed in the Packet Range frame. To do an exact match, you can do: http. 1. Display Filter Reference. -K <keytab file>. x Oct 30, 2020 · 2. Find out the syntax, primitives and boolean operators for writing effective filters. Filters by sequence number. I've tried making filters that look like: btle. A friend suggested using Wireshark to check network traffic. port eq 80 or tcp. port eq 53 or tcp. 228. Now open a second terminal window and invoke a normal FTP session. QA engineers use it to verify network Feb 8, 2017 · Save these bytes into a text file, e. Here are some reasons people use Wireshark: Network administrators use it to troubleshoot network problems. 5. Note that with newer builds of Wireshark for Windows, this is available only with "Export Specified Packets", not with "Save" or "Save as" options. Capturing traffic is not a security specific question, i. or. Alternatively, you can highlight the IP address of a packet and then create a filter for it. 54. 2. Caller ID and Callee ID in the From and To URI. This is a reference. To create or edit capture filters, select Manage Capture Filters from the capture filter bookmark Jun 21, 2022 · Method No. If you need a display filter for a specific Jan 23, 2023 · Now, even if you don’t know how to filter only packets sent from this IP address, you can use Wireshark to show you how it’s done. That’s where Wireshark’s filters come in. You’ll then see a menu of additional options. 6. Back to Display Filter Reference. 0 release. Choose the desired interface on which to listen and start the capture. host filter. Probably the easiest way to add a column for Epoch Time is to open a capture file, expand the Frame details in the Packet details pane, then right-click on the Epoch Time field and choose, "Apply as Column". 78. dstport == 80 && http For more on capture filters, read "Filtering while capturing" from the Wireshark user guide, the capture filters page on the Wireshark wiki, or pcap-filter (7) man page. Learn how to apply capture and display filters in Wireshark, a free and open source network traffic analyzer. Versions: 1. Figure 11 shows the results of adding that filter: Figure 11: Applying a filter to a capture in Wireshark. Pick the right network interface for capturing packet data. In the case in the above question, that means setting the filter to: Note that what makes it work is changing ip. seq == x. 5. neuhaus. 43. OK, something wrong. A destination filter can be applied to restrict the packet view in wireshark to only those packets that have destination IP as mentioned in the filter. add a comment. keep_alive". ip. When you look in there you see “Answers” and then “Time”. You create pre-defined filters that appear in the capture and display filter bookmark menus ( ). Destination IP Filter. SOAPAction, and click Apply. The master list of display filter protocol fields can be found in the display filter reference. You can filter on a HTTP host on multiple levels. Jan 12, 2013 · Display Filter Reference: Secure Sockets Layer. 208. Every protocol with filterable fields is listed at the top level. The XML dissector is fully functional. Display Filter Reference: Bluetooth Low Energy Link Layer. Use the menu entry 'Telephony > VOIP Calls', then you can see the SIP call list. To permanently colorize packets, select View → Coloring Rules… . SCOS is the EMEA Wireshark University Certified Training Partner. txt -> OK. adr == x. Mar 29, 2022 · asked Mar 29, 2022 at 5:00. You can also click Analyze Hi, I know that I should be able to apply as column to a selected field, but I don't see the option and crtl+shift+I doesn't work as well. 1 – Direct Filter Typing. When you first bring up the Display Filter Expression dialog box you are shown a tree of field names, organized by protocol, and a box for selecting a relation. Assuming you simply want to display a protocol, follow these steps. Enter the login name and password, run some FTP commands, then close the session. Complete documentation can be found at the pcap-filter man page. 4,044 1 11 28. can I install only tshark? How do I change the interface on Tshark? Tshark TCP stream assembly. 1 has a problem, and your capture has tons of conversations, you can filter on Jul 30, 2013 · Something to note once it is highlighted it will show you the filter to search for in the lower left hand corner. Try this Wireshark display filter for Layer 2 broadcasts (which includes IP and other protocols, like ARP: eth. Reset the current display filter and clear the edit area. Nov 14, 2022 · Right above the column display part of Wireshark is a bar that filters the display. The “Display Filter Expression” dialog box. Wireshark University US. Filter by Protocol. push == 1 So, I have been trying to filter for the MAC address to no avail. syn filter. If you want to filter for all HTTP traffic exchanged with a specific you can use the “and” operator. May 31, 2024 · Filtering Specific IP in Wireshark. Once you’ve checked off those boxes, you’re ready to start capturing packets. With wireshark, you can use the http. Oct 14, 2019 · You didn't specifically say display filters but will assume you're working with an existing capture. If you want to exclude SYN/ACK frames and only show SYN use this: tcp. I know how to set a display filter using number IP address: ip. Observe the destination IP address. Learn tips and tricks from Wireshark guru Chris Greer (Packet Pioneer). May 12, 2009 · You can use Microsoft Network Monitor to do the trick. the number after the slash represents the number of bits used to represent Nov 15, 2014 · 10. host == "exact. G. By default at the bottom of your screen you see the packet details. How to convert Pcapng file to pcap file by Tshark Chris Greer shares his top 10 Real World Wireshark filters. reset==1". Double-click on the interface you want to use for the capture. Jul 3, 2018 · 0. When running Wireshark, the first step is always to start a capture on a designated interface. flags & 0x02. stream eq X. "some MAC address") btle. 2 Answers: 0. request in the display filter and hit Enter. This need arose from fast Internet growth: billions of new devices DNS servers that allow recursive queries from external networks can be used to perform denial of service (DDoS) attacks. To filter 123. udp port 53 and (udp[10] & 1 == 1) and src net not <net1> and src net not <net2>. What i am trying to do is the following: I want to write a filter so that only the packets between my computer and a specified server appear in the packets pane. src == 192. Network security engineers use it to examine security problems. Jan 1, 1970 · The -k option specifies that Wireshark should start capturing packets immediately. Jun 22, 2022 · Find the appropriate filter in the dialogue box, tap it, and press the “+” button to save it. The conversations window is similar to the endpoint Window. 9. syn==1 && tcp. Network and cybersecurity professionals can use these filters to find potential problems in web applications and servers quickly. You can then drag & drop the column to your preferred location. If, for example, you wanted to see all HTTP traffic related to a site at xxjsj you could use the following filter: tcp. In the Wireshark menu, go to Capture | Options. answered Sep 29 '3. 1, “The “Endpoints” Window” for a description of their common features. port==80". dst. But if you're talking about "Keep Alives", you could filter for "tcp. addr== [IP address] and hit Enter. 7 - Display Filters dialog box. Wireshark supports limiting the packet capture to packets that match a capture filter. Wireshark University EU. Now we shall be capturing packets. e. Protocol field name: btle. answered Aug 29, 2017 at 13:11. Use the following display filter to show all packets that contain the specific IP in either or both the source and destination columns: ip. If you want to filter for identical srcport or dstport you can simplify the filter and use just port. This option requires the use of the -i parameter to specify the interface that packet capture will occur from. port == 443 && ip. Use the specified file for Kerberos decryption. IPv6 was initially designed with a compelling reason in mind: the need for more IP addresses. Then right click -> and choose filter -> Apply as Filter. by port use or specific data in each packet, and Wireshark uses this to perform dissection of the respective traffic. It depends on the kind of timeout you talk about. You will see a list of available interfaces and the capture filter field towards the bottom of the screen. Applying a display filter on large capture files might take quite a long time. Select File > Save As or choose an Export option to record the capture. Sep 29, 2022 · For filtering packets start the Wireshark by selecting the network we want to analyze. Below is a brief overview of the libpcap filter language’s syntax. This brings up Wireshark’s search panel immediately under the search filter bar. Tshark output file problem, saving to csv or txt. Nov 9, 2018 · Hey guys! HackerSploit here back again with another video, in this video, I will be explaining how to use the capture filter in Wireshark. Jul 1, 2017 · If you want to filter to only see the HTTP protocol results of a wireshark capture, you need to add the following filter: Yep, that's it. dst == 192. Applying a display filter (Source: Brief) Dec 20, 2012 · To capture network traffic using a capture filter: Select either the Capture menu and then the Interfaces dialog box or the List the available capture interfaces toolbar button. * you can use ip. See WireShark man pages (filters) and look for Classless InterDomain Routing (CIDR) notation. Apply. Follows a tcp stream. addr == 65. ⚠ The XML dissector is not an XML validator! It uses the DTDs just to be able to extract information for the filtering engine. Oct 4, 2018 · To use them open the capture options dialog and click the bookmark icon at the left side of the capture filter text input field. If you’re interested in a packet with a particular IP address, type this into the filter bar: “ ip. Enter the protocol’s name Mar 13, 2023 · To edit the display filter, go to the Analyze menu, and then select Display Filters, which will bring up the following dialog box: Figure 7. During installation, you'll see the screen below, recommending that you don't run Wireshark as root. Start Wireshark and import the file via File -> Import from Hex Dump -> Filename:basic. You can search selected (== or eq) not selected (!) and selected (&&) or selected (||) and of course the not . dst==10. Right-click on an item in the Description column en choose "Add 'Description' to Display Filter" from the context menu. We can see the information below: The Start Time and Stop Time of each call. . 1 sent TCP FIN first in TCP connection termination) Sort by ». Wireshark capture filters are written in libpcap filter language. ”. 29. May 29, 2013 · 1. Nov 20, 2014 · In this video, we cover the top 10 Wireshark display filters in analyzing network and application problems. You can also add it through the "Edit -> Preferences -> Columns" dialog. To stop capturing, press Ctrl+E. 11. proto == 'http' to http. Here is an example: Similarly, you can also filter results based on other flags like ACK, FIN, and more, by using filters like tcp. Oct 24, 2019 · Make sure you have the right administrative privileges to execute a live capture for your network. link. Sep 12, 2011 · Restart Wireshark. To select destination traffic: Observe the traffic captured in the top Wireshark packet list pane. This might not be ideal in some situations, so we can reduce the number of packets captured by applying capture filters. Protocol field name: tcp Versions: 1. If you mean an application timeout where it shuts down the socket you'll see a reset packet. To filter the frames, IP packets, or TCP segments that Wireshark shows from a pcap, type expressions here. The basics and the syntax of the display filters are described in the User's Guide. Open your file in Microsoft Network Monitor. Add Oct 17, 2022 · To apply filters while viewing packets follow the below steps : Start the Wireshark by selecting or opening any previously saved captured file. Hit the Apply button on the filter toolbar. Now type the filter primitive you want to apply while displaying packets. header. Building Display Filter Expressions. Oct 9, 2015 · This is what it looks like in Wireshark. host. Either of these will show frames with the SYN bit set: tcp. 8. This field is also where the current applied filter is displayed. They let you drill down to the exact traffic you want to see and are the basis of many of Wireshark's other features, such as the coloring rules. ack, tcp. syn==1. The Display Filter is added to the Filter Window. On the next screen, press Tab to move the red highlight to "<YES>" and press the Space bar. dst matches "\xff. To filter the display, you can enter a display filter expression - not the name of a saved display filter - in the "Filter:" box at the bottom of the display, and type the <Enter> key or press the "Apply" button (that does not require you to have a saved filter), or, if you want to use a saved filter, you can press the "Filter:" button, select Jan 29, 2019 · So below are the most common filters that I use in Wireshark. See Wireshark, monitor certain process/task or prevent ordinary packets be monitored, How to capture network traffic by process name in Aug 17, 2022 · In order to analyze TCP, you first need to launch Wireshark and follow the steps given below: From the menu bar, select capture -> options -> interfaces. Click a packet and expand the frame section . 1 and tcp. Select Options. IPv6 is short for "Internet Protocol version 6". advertising_address == <some MAC address> One of them does no apparent filtering, the other apparently causes the program distress in that it can't figure out the KT1979. 200), Wireshark detects no traffic at all even when I send a formerly working message via UDP. In the Capture Filter box type host 8. This will look for those byte sequences in either the source or destination MACs. This will look for ethernet destination addresses that have a 0xFF followed by something (or nothing) and another 0xFF within it. To check if a URL contains a specific string, do: http. Display filters let you compare the fields within a protocol against a specific value Jul 8, 2020 · Select the shark fin on the left side of the Wireshark toolbar, press Ctrl+E, or double-click the network. 10. Select from a list of recently applied filters. E. For example, type “dns” and you’ll see only DNS packets. For example, I have two host 1. Instead of choosing any, wlan0, eth0, choose the new virtual interface docker0 instead. Select a protocol field from the protocol field tree. Viewing frame information about a network packet in Wireshark. Now in the “Filter” field type the filter primitive you want to apply while displaying the packets. user1865775. You can filter for that by using "tcp. Some intended purposes. For that, go to the right field we would like to filter – in this case, the source IP address. For example, to display on those TCP packets that contain SYN flag, use the tcp. Figure 20. 20. 223. Apart from that similar questions and answers are easy to find using a search engine. You can look for external recursive queries with a filter such as. Mar 6, 2024 · The display filters in Wireshark are useful beyond just analyzing data. answered Aug 27 '1. *. ⭐Help Support Hacke 3. Protocol field name: tcap Versions: 1. addr matches "\x01\x02. After capturing all traffic between them in certain time range, I would like to find all TCP connection finish initiated by 1. Here’s what you need to do to save a display filter: Open Wireshark and go to the “bookmark Apr 9, 2024 · 1) List SIP calls. cpl” in the Windows search, which will bring you here: Right click the connection, go to ‘Status’: Then, go to details: And write down the value listed in “Physical Address”. *\x04\x05". pcap in Wireshark. 25. src==10. There is no direct method to do so as the sending application is not captured along with the traffic. and it has the ability to load XML DTDs and use them to choose the filter fields to be used when parsing XML. Preference Settings * Use Heuristics. 12. Your example would be "ip. Once there, you can select one of the three icons as shown in the lower left-hand corner of the Display Filters dialog box: A plus icon will add a new display filter. Aug 31, 2014 · Wireshark also has the ability to filter results based on TCP flags. access_address == 00:00:00:00:00:00 (i. You can ctrl-c when the window is visible, and all the What you need to do is select the DNS packet of the DNS reply / response in Wireshark. The textbox background should turn green, indicating the display filter syntax is correct (and that our preference changes for the custom field SOAPAction took effect). where <net1> and <net2> are network specifiers, such as 10. 57. For further help with Lua dissectors, you might want to refer to one or more of the following: Jul 23, 2012 · The filter applied in the example below is: ip. reset) If you right click the highlighted section now you can click on filter and you have some options there. Run the following operation in the Filter box: ip. Jul 2, 2015 · 2. I would go through the packet capture and see if there are any records that I know I should be seeing to validate that the filter is working properly and to assuage any doubts. 4. 94. Hey guys! HackerSploit here back again with another video, in this video, I will be explaining how to use the display filter in Wireshark. 0 to 2. Apr 16, 2020 · This was working fine for me for a while and then stopped. Press Tab to move the red highlight to "<OK>" and press the Space bar. Temporary filters can also be created by selecting the Colorize with Filter → Color X menu items when right-clicking in the packet detail pane. 8 and ip. This is very easy to do. 52. The drag and drop feature allows us to quickly set filters and hone in on the packets tha Mar 6, 2024 · Wireshark creator Gerald Combs & core developer Roland Knall give an overview of the new Wireshark 4. Initial Speaker is the IP Address of Caller. For example, if you are looking for a specific term appearing in the packet, this filter is what you need. Start wireshark in your real system, go to capture > options . matches. Broadcast messages happen on Layer 2 or Layer 3. x. Capture packet data from the right location within your network. Find the packets that matter!In short, the filter Aug 29, 2017 · Use "or" to combine multiple possible matches as a filter. Try this filter: Since you've got two ports and two IPs in tcp/ip packets you need to specify exactly what source and destination sockets you want. Option 2: String matching display filter Display Filter Reference: Transaction Capabilities Application Part. exe. Feb 22, 2017 · Looking only at SYN packets is not very helpful if you need to find a conversation that has problems - it's usually better to gather as much information about the IPs involved in the problem and filter on them. addr==10. Aug 27, 2009 · Install your application in the container using the same way that you would install it in a real system. Filtering traffic with Wireshark is important for quickly isolating specific packets and dig down Sep 29, 2023 · Use this tutorial to apply and edit display filters to make detailed network sniffing easier. 1. May 25, 2021 · Let's keep learning more about Wireshark in this tutorial. Jan 26, 2018 · Consider this: eth. Along with addresses, packet counters, and byte counters the conversation window adds four columns: the start time of the conversation (“Rel Start”) or (“Abs Start”), the duration of the conversation in seconds, and the average bits Oct 15, 2020 · I have a bunch of packets like these in wire shark. 6. addr == 123. port == 80. src==159. fin, and more, respectively. 1 (i. Similar effects can be achieved with /16 and /24. 65 But how would I set a display filter so it only displays the packet that has "Broadcast" as their destination port? So in this case: it would only show the first row/packet: May 22, 2019 · In this example we will be using Wireshark-win64-2. 1 1 1 1. Hi, I do not need ports I just wanna see general protocols and combine them, so I just one see all HTTP, IRC and DNS traffic on Wireshark and would like eliminate all the Sep 8, 2023 · Note the filter bar’s red color in Figure 3. port eq 194. ack==0. 11 or a destination IPv4 address of 192. txt. Any way to use cmd tshark for a gns3 wire? authority RRs tshark. tcp. if you know that the computer with the IP 192. In the Display Filter textbox, enter http. Here is what i tried: ip. If the filter bar is green, the expression has been accepted, and it should work properly, as shown below in Figure 4. contains "partial. Learn cybersecurity with their experienced staff. 1, as either the source or dest] ip. 7) Jun 23, 2021 · Hello Pauli. At the application layer, you can specify a display filter for the HTTP Host header: http. Select the first HTTP packet labeled GET /. Dec 5, 2013 · Wireshark - how can i filter out unique packets based on a value which reside in payload portion of packet? For example if i have 3 UDP packates : UDP1 : Payload = "xyz" UDP2 : Payload = "abc" UDP3 : Payload = "xyz" I want to apply filter such that wireshark displays only packets which are not having repeated value in the payload: Figure 6. For example: markava60. addr == 192. Simply hit next and choose all the defaults in the Wizard to install. Display Filter Reference: Transmission Control Protocol. Choose the interface that goes “out” to the network (for example eth1) and click on Start, and Wireshark will start examining all the packets in transit on the network. port == 80 and ip. May 7, 2018 · It’s a filter that displays all TCP packets that contain a certain term (instead of xxx, use what term you’re looking for). Wireshark is available for free, is open source, and is one of the best packet analyzers available today. I have the v. As shown in the video above, Wireshark (by default) captures each and every packet flowing in the network. Or, go to the Wireshark toolbar and select the red Stop button that's located next to the shark fin. Filtering while capturing. Apr 24, 2017 · One Answer: 2. See Section 8. WPA and WPA2 use keys derived from an EAPOL handshake, which occurs when a machine joins a Wi-Fi network, to encrypt traffic. When you start typing, Wireshark will help you autocomplete your filter. Wireshark will display the “Coloring Rules” dialog box as shown in Figure 11. Using the Find Packet feature in Wireshark. You should see the 3 fields dissected as part of the "Basic Protocol". To focus on IP broadcast messages you might try. 7 or ip. Select an interface by clicking on it, enter the filter text, then click on the Start button. Within the packet details you need to look at the “Domain Name System (response)” section. And to use regular expressions, you can use http. Wireshark's most powerful feature is its vast array of display filters (over 303000 fields in 3000 protocols as of version 4. 168. flags. These filters can help identify slow-loading pages, failed form submissions, and security vulnerabilities. (tcp. accept rate: 0%. Clear. ig == 1. Sep 15, 2022 · Here is a quick tip on a Wireshark feature that I use all the time. I've found it to be a steep learning curve. That said, please try the following filter and see if you're getting the entries that you think you should be getting: dns and (ip. 1 [Sets a filter for any packet with 10. Copy the filter below. com". ig == 1 and ip. The Epoch Time option is what we need. Wires Dec 6, 2020 · Using tshark filters to extract only interesting traffic from 12GB trace. Recent. Actually, if you want to minimize the temporary file, you could add a filter to the capture itself: Capture -> Options -> Capture filter "host 192 Jul 8, 2020 · Capture filter are filters used to reduce the number of packets captured. In response to the text you have entered the display filter, Wireshark provides a list of suggestions. To view only HTTP traffic, type http (lower case) in the Filter box and press Enter. IPv6 is the "next generation" protocol designed by the IETF to replace the current version of Internet_Protocol, IP Version 4 or IPv4. 2 [sets a conversation filter between the two defined IP addresses] I had to in the past filter by "Application Data" Info column. Please comment below and add any common ones that you use as well. For Example : tcp. 20 Back to Display Filter Reference Wireshark. 41 1 2. First one is the ip address of my computer, and second one Aug 27, 2021 · Bright Packet. , basic. g. analysis. In the window that will open you'll see all your interfaces. Protocol field name: ssl Versions: 1. Learn how to use Wireshark from one of the best in the industry!// Chris SOCIAL // YouTube: https Dec 21, 2009 · For example, to capture only packets sent to port 80, use: dst tcp port 80 Couple that with an http display filter, or use: tcp. Once you select the IP address, right-click, and then select the Apply As Filter option. ga ic wi fm tz ob ff su tj ah