SlideShare a Scribd company logo
1 of 1
Download to read offline
packetlife.net 
Command Line Options 
TCPDUMP 
-A Print frame payload in ASCII 
-c <count> Exit after capturing count packets 
-D List available interfaces 
-e Print link-level headers 
-F <file> Use file as the filter expression 
-G <n> Rotate the dump file every n seconds 
-i <iface> Specifies the capture interface 
-K Don't verify TCP checksums 
-L List data link types for the interface 
-n Don't convert addresses to names 
-p Don't capture in promiscuous mode 
-q Quick output 
-r <file> Read packets from file 
-s <len> Capture up to len bytes per packet 
-S Print absolute TCP sequence numbers 
-t Don't print timestamps 
-v[v[v]] Print more verbose output 
-w <file> Write captured packets to file 
-x Print frame payload in hex 
-X Print frame payload in hex and ASCII 
-y <type> Specify the data link type 
-Z <user> Drop privileges from root to user 
Capture Filter Primitives 
[src|dst] host <host> Matches a host as the IP source, destination, or either 
ether [src|dst] host <ehost> Matches a host as the Ethernet source, destination, or either 
gateway host <host> Matches packets which used host as a gateway 
[src|dst] net <network>/<len> Matches packets to or from an endpoint residing in network 
[tcp|udp] [src|dst] port <port> Matches TCP or UDP packets sent to/from port 
[tcp|udp] [src|dst] portrange <p1>-<p2> Matches TCP or UDP packets to/from a port in the given range 
less <length> Matches packets less than or equal to length 
greater <length> Matches packets greater than or equal to length 
(ether|ip|ip6) proto <protocol> Matches an Ethernet, IPv4, or IPv6 protocol 
(ether|ip) broadcast Matches Ethernet or IPv4 broadcasts 
(ether|ip|ip6) multicast Matches Ethernet, IPv4, or IPv6 multicasts 
type (mgt|ctl|data) [subtype <subtype>] Matches 802.11 frames based on type and optional subtype 
vlan [<vlan>] Matches 802.1Q frames, optionally with a VLAN ID of vlan 
mpls [<label>] Matches MPLS packets, optionally with a label of label 
<expr> <relop> <expr> Matches packets by an arbitrary expression 
Protocols 
arp 
ip6 
link 
ppp 
radio 
rarp 
TCP Flags 
ether 
fddi 
icmp 
ip 
slip 
tcp 
tr 
udp 
wlan 
tcp-urg tcp-rst 
tcp-ack tcp-syn 
tcp-psh tcp-fin 
Modifiers 
! or not 
&& or and 
|| or or 
Examples 
udp dst port not 53 
host 10.0.0.1 && host 10.0.0.2 
tcp dst port 80 or 8080 
UDP not bound for port 53 
Traffic between these hosts 
Packets to either TCP port 
ICMP Types 
icmp-echoreply icmp-routeradvert icmp-tstampreply 
icmp-unreach icmp-routersolicit icmp-ireq 
icmp-sourcequench icmp-timxceed icmp-ireqreply 
icmp-redirect icmp-paramprob icmp-maskreq 
icmp-echo icmp-tstamp icmp-maskreply 
by Jeremy Stretch v2.0

More Related Content

What's hot

Understanding iptables
Understanding iptablesUnderstanding iptables
Understanding iptablesDenys Haryachyy
ย 
Linux network configuration
Linux network configurationLinux network configuration
Linux network configurationMario Tabuada Mussio
ย 
The Next Generation Firewall for Red Hat Enterprise Linux 7 RC
The Next Generation Firewall for Red Hat Enterprise Linux 7 RCThe Next Generation Firewall for Red Hat Enterprise Linux 7 RC
The Next Generation Firewall for Red Hat Enterprise Linux 7 RCThomas Graf
ย 
Network emulator
Network emulatorNetwork emulator
Network emulatorjeromy fu
ย 
Linux Networking Commands
Linux Networking CommandsLinux Networking Commands
Linux Networking Commandstmavroidis
ย 
Linux networking commands
Linux networking commandsLinux networking commands
Linux networking commandsSayed Ahmed
ย 
Staging driver sins
Staging driver sinsStaging driver sins
Staging driver sinsStephen Hemminger
ย 
Dhcp
DhcpDhcp
DhcpMd Shihab
ย 
2015 FOSDEM - OVS Stateful Services
2015 FOSDEM - OVS Stateful Services2015 FOSDEM - OVS Stateful Services
2015 FOSDEM - OVS Stateful ServicesThomas Graf
ย 
Tc basics
Tc basicsTc basics
Tc basicsjeromy fu
ย 
sshuttle VPN (2011-04)
sshuttle VPN (2011-04)sshuttle VPN (2011-04)
sshuttle VPN (2011-04)apenwarr
ย 
DevConf 2014 Kernel Networking Walkthrough
DevConf 2014   Kernel Networking WalkthroughDevConf 2014   Kernel Networking Walkthrough
DevConf 2014 Kernel Networking WalkthroughThomas Graf
ย 
LinuxCon 2015 Linux Kernel Networking Walkthrough
LinuxCon 2015 Linux Kernel Networking WalkthroughLinuxCon 2015 Linux Kernel Networking Walkthrough
LinuxCon 2015 Linux Kernel Networking WalkthroughThomas Graf
ย 
Ngrep commands
Ngrep commandsNgrep commands
Ngrep commandsRishu Seth
ย 
Packet Filtering Using Iptables
Packet Filtering Using IptablesPacket Filtering Using Iptables
Packet Filtering Using IptablesAhmed Mekkawy
ย 
Netcat - A Swiss Army Tool
Netcat - A Swiss Army ToolNetcat - A Swiss Army Tool
Netcat - A Swiss Army ToolChandrapal Badshah
ย 
DNS, DHCP Configuration
DNS, DHCP Configuration DNS, DHCP Configuration
DNS, DHCP Configuration Anik Saha
ย 
Linux networking
Linux networkingLinux networking
Linux networkingArie Bregman
ย 

What's hot (20)

Understanding iptables
Understanding iptablesUnderstanding iptables
Understanding iptables
ย 
Linux network configuration
Linux network configurationLinux network configuration
Linux network configuration
ย 
The Next Generation Firewall for Red Hat Enterprise Linux 7 RC
The Next Generation Firewall for Red Hat Enterprise Linux 7 RCThe Next Generation Firewall for Red Hat Enterprise Linux 7 RC
The Next Generation Firewall for Red Hat Enterprise Linux 7 RC
ย 
Network emulator
Network emulatorNetwork emulator
Network emulator
ย 
Linux Networking Commands
Linux Networking CommandsLinux Networking Commands
Linux Networking Commands
ย 
Linux networking commands
Linux networking commandsLinux networking commands
Linux networking commands
ย 
Staging driver sins
Staging driver sinsStaging driver sins
Staging driver sins
ย 
Dhcp
DhcpDhcp
Dhcp
ย 
2015 FOSDEM - OVS Stateful Services
2015 FOSDEM - OVS Stateful Services2015 FOSDEM - OVS Stateful Services
2015 FOSDEM - OVS Stateful Services
ย 
transport protocols
transport protocolstransport protocols
transport protocols
ย 
Tc basics
Tc basicsTc basics
Tc basics
ย 
sshuttle VPN (2011-04)
sshuttle VPN (2011-04)sshuttle VPN (2011-04)
sshuttle VPN (2011-04)
ย 
Netcat
NetcatNetcat
Netcat
ย 
DevConf 2014 Kernel Networking Walkthrough
DevConf 2014   Kernel Networking WalkthroughDevConf 2014   Kernel Networking Walkthrough
DevConf 2014 Kernel Networking Walkthrough
ย 
LinuxCon 2015 Linux Kernel Networking Walkthrough
LinuxCon 2015 Linux Kernel Networking WalkthroughLinuxCon 2015 Linux Kernel Networking Walkthrough
LinuxCon 2015 Linux Kernel Networking Walkthrough
ย 
Ngrep commands
Ngrep commandsNgrep commands
Ngrep commands
ย 
Packet Filtering Using Iptables
Packet Filtering Using IptablesPacket Filtering Using Iptables
Packet Filtering Using Iptables
ย 
Netcat - A Swiss Army Tool
Netcat - A Swiss Army ToolNetcat - A Swiss Army Tool
Netcat - A Swiss Army Tool
ย 
DNS, DHCP Configuration
DNS, DHCP Configuration DNS, DHCP Configuration
DNS, DHCP Configuration
ย 
Linux networking
Linux networkingLinux networking
Linux networking
ย 

Viewers also liked

Tcpdump hunter
Tcpdump hunterTcpdump hunter
Tcpdump hunterAndrew McNicol
ย 
Tcpdump
TcpdumpTcpdump
TcpdumpTensor
ย 
Wireshark
WiresharkWireshark
WiresharkSourav Roy
ย 
Addition
AdditionAddition
Additionkwalker1318
ย 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1rayborg
ย 
Cain abel
Cain abelCain abel
Cain abelKUNDOKU .com
ย 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Needamiable_indian
ย 
Tcpdump basico
Tcpdump basicoTcpdump basico
Tcpdump basicoJosu Orbe
ย 
Cain
CainCain
Caingasay
ย 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social mediaAlan Raj
ย 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers Ravi Teja Reddy
ย 

Viewers also liked (11)

Tcpdump hunter
Tcpdump hunterTcpdump hunter
Tcpdump hunter
ย 
Tcpdump
TcpdumpTcpdump
Tcpdump
ย 
Wireshark
WiresharkWireshark
Wireshark
ย 
Addition
AdditionAddition
Addition
ย 
Cybersecurity cyberlab1
Cybersecurity cyberlab1Cybersecurity cyberlab1
Cybersecurity cyberlab1
ย 
Cain abel
Cain abelCain abel
Cain abel
ย 
Freeware Security Tools You Need
Freeware Security Tools You NeedFreeware Security Tools You Need
Freeware Security Tools You Need
ย 
Tcpdump basico
Tcpdump basicoTcpdump basico
Tcpdump basico
ย 
Cain
CainCain
Cain
ย 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
ย 
Packet sniffers
Packet sniffers Packet sniffers
Packet sniffers
ย 

Similar to TCPDUMP

Chapter11 -- networking with tcpip and the internet
Chapter11  -- networking with tcpip and the internetChapter11  -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internetRaja Waseem Akhtar
ย 
Networking Fundamentals: Transport Protocols (TCP and UDP)
Networking Fundamentals: Transport Protocols (TCP and UDP)Networking Fundamentals: Transport Protocols (TCP and UDP)
Networking Fundamentals: Transport Protocols (TCP and UDP)Andriy Berestovskyy
ย 
nwlab-ex1.pdf
nwlab-ex1.pdfnwlab-ex1.pdf
nwlab-ex1.pdfJayaprasanna4
ย 
Tcp Ip Overview
Tcp Ip OverviewTcp Ip Overview
Tcp Ip OverviewAmir Malik
ย 
TCP IP
TCP IP TCP IP
TCP IP muh kemal
ย 
commandes_CHEAT_SH_2.pdf
commandes_CHEAT_SH_2.pdfcommandes_CHEAT_SH_2.pdf
commandes_CHEAT_SH_2.pdfAchRaf264021
ย 
Chapter 01 - Overview
Chapter 01 - OverviewChapter 01 - Overview
Chapter 01 - Overviewphanleson
ย 
Socket Programming TCP:IP PPT.pdf
Socket Programming TCP:IP PPT.pdfSocket Programming TCP:IP PPT.pdf
Socket Programming TCP:IP PPT.pdfPraveenKumar187040
ย 
Ios i pv4_access_lists
Ios i pv4_access_listsIos i pv4_access_lists
Ios i pv4_access_listsMohamed Gamel
ย 
Ios i pv4_access_lists
Ios i pv4_access_listsIos i pv4_access_lists
Ios i pv4_access_listsSwapnil Kapate
ย 
Ip Access Lists
Ip Access ListsIp Access Lists
Ip Access ListsCCNAResources
ย 
Application Layer and Socket Programming
Application Layer and Socket ProgrammingApplication Layer and Socket Programming
Application Layer and Socket Programmingelliando dias
ย 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commandsAniket Thakur
ย 
Basics of sockets
Basics of socketsBasics of sockets
Basics of socketsAviNash ChaVhan
ย 
mrutu sammary 1.pdf
mrutu sammary 1.pdfmrutu sammary 1.pdf
mrutu sammary 1.pdfSamiaMaulidi
ย 
Unit 8 Java
Unit 8 JavaUnit 8 Java
Unit 8 Javaarnold 7490
ย 

Similar to TCPDUMP (20)

Tcpdump
TcpdumpTcpdump
Tcpdump
ย 
Chapter11 -- networking with tcpip and the internet
Chapter11  -- networking with tcpip and the internetChapter11  -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internet
ย 
CN 1.docx
CN 1.docxCN 1.docx
CN 1.docx
ย 
Networking Fundamentals: Transport Protocols (TCP and UDP)
Networking Fundamentals: Transport Protocols (TCP and UDP)Networking Fundamentals: Transport Protocols (TCP and UDP)
Networking Fundamentals: Transport Protocols (TCP and UDP)
ย 
nwlab-ex1.pdf
nwlab-ex1.pdfnwlab-ex1.pdf
nwlab-ex1.pdf
ย 
Tcp Ip Overview
Tcp Ip OverviewTcp Ip Overview
Tcp Ip Overview
ย 
Networking chapter VI
Networking chapter VINetworking chapter VI
Networking chapter VI
ย 
TCP IP
TCP IP TCP IP
TCP IP
ย 
commandes_CHEAT_SH_2.pdf
commandes_CHEAT_SH_2.pdfcommandes_CHEAT_SH_2.pdf
commandes_CHEAT_SH_2.pdf
ย 
Chapter 01 - Overview
Chapter 01 - OverviewChapter 01 - Overview
Chapter 01 - Overview
ย 
Socket Programming TCP:IP PPT.pdf
Socket Programming TCP:IP PPT.pdfSocket Programming TCP:IP PPT.pdf
Socket Programming TCP:IP PPT.pdf
ย 
Ios i pv4_access_lists
Ios i pv4_access_listsIos i pv4_access_lists
Ios i pv4_access_lists
ย 
Ios i pv4_access_lists
Ios i pv4_access_listsIos i pv4_access_lists
Ios i pv4_access_lists
ย 
Ip Access Lists
Ip Access ListsIp Access Lists
Ip Access Lists
ย 
Application Layer and Socket Programming
Application Layer and Socket ProgrammingApplication Layer and Socket Programming
Application Layer and Socket Programming
ย 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commands
ย 
Basics of sockets
Basics of socketsBasics of sockets
Basics of sockets
ย 
mrutu sammary 1.pdf
mrutu sammary 1.pdfmrutu sammary 1.pdf
mrutu sammary 1.pdf
ย 
Acl
AclAcl
Acl
ย 
Unit 8 Java
Unit 8 JavaUnit 8 Java
Unit 8 Java
ย 

More from Martin Cabrera

Log Management
Log ManagementLog Management
Log ManagementMartin Cabrera
ย 
Metodologia de Operacion frente a ataques
Metodologia de Operacion frente a ataquesMetodologia de Operacion frente a ataques
Metodologia de Operacion frente a ataquesMartin Cabrera
ย 
Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)Martin Cabrera
ย 
Hex file and regex cheat sheet
Hex file and regex cheat sheetHex file and regex cheat sheet
Hex file and regex cheat sheetMartin Cabrera
ย 
Memory forensics cheat sheet
Memory forensics cheat sheetMemory forensics cheat sheet
Memory forensics cheat sheetMartin Cabrera
ย 

More from Martin Cabrera (7)

Log Management
Log ManagementLog Management
Log Management
ย 
Metodologia de Operacion frente a ataques
Metodologia de Operacion frente a ataquesMetodologia de Operacion frente a ataques
Metodologia de Operacion frente a ataques
ย 
Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)Network DDoS Incident Response Cheat Sheet (by SANS)
Network DDoS Incident Response Cheat Sheet (by SANS)
ย 
IPv6
IPv6IPv6
IPv6
ย 
IPSEC
IPSECIPSEC
IPSEC
ย 
Hex file and regex cheat sheet
Hex file and regex cheat sheetHex file and regex cheat sheet
Hex file and regex cheat sheet
ย 
Memory forensics cheat sheet
Memory forensics cheat sheetMemory forensics cheat sheet
Memory forensics cheat sheet
ย 

Recently uploaded

WhatsApp 9892124323 โœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 โœ“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 โœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 โœ“Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
ย 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
ย 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
ย 
๐Ÿฌ The future of MySQL is Postgres ๐Ÿ˜
๐Ÿฌ  The future of MySQL is Postgres   ๐Ÿ˜๐Ÿฌ  The future of MySQL is Postgres   ๐Ÿ˜
๐Ÿฌ The future of MySQL is Postgres ๐Ÿ˜RTylerCroy
ย 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
ย 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
ย 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
ย 
FULL ENJOY ๐Ÿ” 8264348440 ๐Ÿ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY ๐Ÿ” 8264348440 ๐Ÿ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY ๐Ÿ” 8264348440 ๐Ÿ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY ๐Ÿ” 8264348440 ๐Ÿ” Call Girls in Diplomatic Enclave | Delhisoniya singh
ย 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
ย 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
ย 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
ย 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
ย 
Finology Group โ€“ Insurtech Innovation Award 2024
Finology Group โ€“ Insurtech Innovation Award 2024Finology Group โ€“ Insurtech Innovation Award 2024
Finology Group โ€“ Insurtech Innovation Award 2024The Digital Insurer
ย 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
ย 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
ย 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
ย 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
ย 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
ย 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
ย 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
ย 

Recently uploaded (20)

WhatsApp 9892124323 โœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 โœ“Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 โœ“Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 โœ“Call Girls In Kalyan ( Mumbai ) secure service
ย 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
ย 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ย 
๐Ÿฌ The future of MySQL is Postgres ๐Ÿ˜
๐Ÿฌ  The future of MySQL is Postgres   ๐Ÿ˜๐Ÿฌ  The future of MySQL is Postgres   ๐Ÿ˜
๐Ÿฌ The future of MySQL is Postgres ๐Ÿ˜
ย 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
ย 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
ย 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
ย 
FULL ENJOY ๐Ÿ” 8264348440 ๐Ÿ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY ๐Ÿ” 8264348440 ๐Ÿ” Call Girls in Diplomatic Enclave | DelhiFULL ENJOY ๐Ÿ” 8264348440 ๐Ÿ” Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY ๐Ÿ” 8264348440 ๐Ÿ” Call Girls in Diplomatic Enclave | Delhi
ย 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
ย 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
ย 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
ย 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
ย 
Finology Group โ€“ Insurtech Innovation Award 2024
Finology Group โ€“ Insurtech Innovation Award 2024Finology Group โ€“ Insurtech Innovation Award 2024
Finology Group โ€“ Insurtech Innovation Award 2024
ย 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
ย 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
ย 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
ย 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
ย 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
ย 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
ย 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
ย 

TCPDUMP

  • 1. packetlife.net Command Line Options TCPDUMP -A Print frame payload in ASCII -c <count> Exit after capturing count packets -D List available interfaces -e Print link-level headers -F <file> Use file as the filter expression -G <n> Rotate the dump file every n seconds -i <iface> Specifies the capture interface -K Don't verify TCP checksums -L List data link types for the interface -n Don't convert addresses to names -p Don't capture in promiscuous mode -q Quick output -r <file> Read packets from file -s <len> Capture up to len bytes per packet -S Print absolute TCP sequence numbers -t Don't print timestamps -v[v[v]] Print more verbose output -w <file> Write captured packets to file -x Print frame payload in hex -X Print frame payload in hex and ASCII -y <type> Specify the data link type -Z <user> Drop privileges from root to user Capture Filter Primitives [src|dst] host <host> Matches a host as the IP source, destination, or either ether [src|dst] host <ehost> Matches a host as the Ethernet source, destination, or either gateway host <host> Matches packets which used host as a gateway [src|dst] net <network>/<len> Matches packets to or from an endpoint residing in network [tcp|udp] [src|dst] port <port> Matches TCP or UDP packets sent to/from port [tcp|udp] [src|dst] portrange <p1>-<p2> Matches TCP or UDP packets to/from a port in the given range less <length> Matches packets less than or equal to length greater <length> Matches packets greater than or equal to length (ether|ip|ip6) proto <protocol> Matches an Ethernet, IPv4, or IPv6 protocol (ether|ip) broadcast Matches Ethernet or IPv4 broadcasts (ether|ip|ip6) multicast Matches Ethernet, IPv4, or IPv6 multicasts type (mgt|ctl|data) [subtype <subtype>] Matches 802.11 frames based on type and optional subtype vlan [<vlan>] Matches 802.1Q frames, optionally with a VLAN ID of vlan mpls [<label>] Matches MPLS packets, optionally with a label of label <expr> <relop> <expr> Matches packets by an arbitrary expression Protocols arp ip6 link ppp radio rarp TCP Flags ether fddi icmp ip slip tcp tr udp wlan tcp-urg tcp-rst tcp-ack tcp-syn tcp-psh tcp-fin Modifiers ! or not && or and || or or Examples udp dst port not 53 host 10.0.0.1 && host 10.0.0.2 tcp dst port 80 or 8080 UDP not bound for port 53 Traffic between these hosts Packets to either TCP port ICMP Types icmp-echoreply icmp-routeradvert icmp-tstampreply icmp-unreach icmp-routersolicit icmp-ireq icmp-sourcequench icmp-timxceed icmp-ireqreply icmp-redirect icmp-paramprob icmp-maskreq icmp-echo icmp-tstamp icmp-maskreply by Jeremy Stretch v2.0