Skip to content

tcpdump

lethanhtung01011980 edited this page Mar 24, 2020 · 6 revisions

To listen on an interface

  • tcpdump - i tun0

To create pcap

  • tcpdump -s 0 port ftp or ssh -i eth0 -w mycap.pcap
  • -s 0 will set the capture byte to its maximum i.e. 65535, after this capture file will not truncate.

To read from pcap

  • tcpdump -r password_cracking_filtered.pcap
  • tcpdump -n src host victim-ip -r password_cracking_filtered.pcap
  • tcpdump -n dst host victim-ip -r password_cracking_filtered.pcap
  • tcpdump -n port 81 -r password_cracking_filtered.pcap

To read from pcap and view the content of packet

  • tcpdump -X -r password_cracking_filtered.pcap

Sidebar

0. COMMON exploits

1. Scan Info

1.2 Passive Gathering

1.3 Active Gathering

2. Pre-attack

2.2 File transfer

3. Get Reverse Shell

4. Exploits

4.2 Windows Exploits

4.3 Linux Exploits

4.4 Password crack

4.5 Buffer Overflow

4.6 Web attacks

6. Escalate Privilege

6.1 Escalate in Windows

6.2 Escalate in Linux

7. Access and further attacks

8. Port redirection and Tunnelling

9. Metasploit

10. Kali

11. Thirdparty scripts

Clone this wiki locally