When debugging SSL to grab packets, through the tools such as TCPView and Minisniffer clearly see the TCP connection has been established and began to send and receive data, but Wireshark is always unable to catch the corresponding packet.
This morning, HQ's senior engineer told me that "Wireshark cannot crawl a localhost packet under Windows" and that it had to use other tools.
Http://stackoverflow.com/questions/5847168/wireshark-localhost-traffic-capture
You can capture on the loopback interface in Linux, on various BSDs including Mac OS X, and on Digital/tru64 UNIX, and you Might be able to does it on Irix and AIX, but you definitely cannot does so on Solaris, HP-UX, or Windows.
The final use of Rawcap is done: Http://www.netresec.com/?page=RawCap
It's pretty easy to use, but not much to say.
Wireshark cannot crawl localhost packets under windows