<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>tcpdump Archives - ITBlogSec.com</title>
	<atom:link href="https://itblogsec.com/tag/tcpdump/feed/" rel="self" type="application/rss+xml" />
	<link>https://itblogsec.com/tag/tcpdump/</link>
	<description>IT, network, security and hacking</description>
	<lastBuildDate>Mon, 04 May 2020 14:10:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Tcpdump cheat sheet</title>
		<link>https://itblogsec.com/tcpdump-cheat-sheet/</link>
					<comments>https://itblogsec.com/tcpdump-cheat-sheet/#comments</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 23 Feb 2017 18:11:54 +0000</pubDate>
				<category><![CDATA[Cheat Sheets]]></category>
		<category><![CDATA[tcpdump]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=622</guid>

					<description><![CDATA[<p>Tcpdump is a common packet analyzer that runs under the command line. It allows the user to display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. Distributed under the BSD license, tcpdump is free software.</p>
<p>The post <a href="https://itblogsec.com/tcpdump-cheat-sheet/">Tcpdump cheat sheet</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Tcpdump cheat sheet </h2>
<p style="text-align: justify;">It is a common <strong>packet analyzer</strong> that runs under the command line. It allows the user to display <strong>TCP/IP</strong> and other packets being transmitted or received over a network to which the computer is attached. Distributed under the <strong>BSD license</strong>, it is free software. It works on most Unix-like operating systems: Linux, Solaris, BSD, macOS, HP-UX, Android and AIX among others. In those systems, tcpdump uses the libpcap library to capture packets. The port of application for Windows is called <strong>WinDump</strong>; it uses <strong>WinPcap</strong>, the Windows port of <strong>libpcap</strong>.</p>
<p style="text-align: justify;">It was originally written in <strong>1987</strong> by <strong><a title="Van Jacobson" href="https://en.wikipedia.org/wiki/Van_Jacobson">Van Jacobson</a>, <a class="new" title="Craig Leres (page does not exist)" href="https://en.wikipedia.org/w/index.php?title=Craig_Leres&amp;action=edit&amp;redlink=1">Craig Leres</a> and <a class="new" title="Steven McCanne (page does not exist)" href="https://en.wikipedia.org/w/index.php?title=Steven_McCanne&amp;action=edit&amp;redlink=1">Steven McCanne</a></strong> who were, at the time, working in the <strong><a class="mw-redirect" title="Lawrence Berkeley Laboratory" href="https://en.wikipedia.org/wiki/Lawrence_Berkeley_Laboratory">Lawrence Berkeley Laboratory</a></strong> Network Research Group. By the late 1990s there were numerous versions of tcpdump distributed as part of various operating systems, and numerous patches that were not well coordinated. <strong><a class="new" title="Michael Richardson (mcr) (page does not exist)" href="https://en.wikipedia.org/w/index.php?title=Michael_Richardson_(mcr)&amp;action=edit&amp;redlink=1">Michael Richardson (mcr)</a> and <a class="new" title="Bill Fenner (page does not exist)" href="https://en.wikipedia.org/w/index.php?title=Bill_Fenner&amp;action=edit&amp;redlink=1">Bill Fenner</a></strong> created <strong>www.tcpdump.org</strong> in 1999.</p>
<p style="text-align: justify;">Tool prints the contents of network packets. It <strong>can read packets from a network interface card</strong> or from a previously created saved packet file. It can write packets to standard output or a file. It is also possible to use tcpdump for the specific purpose of intercepting and displaying the communications of another user or computer. A user with the necessary privileges on a system acting as a <a title="Router (computing)" href="https://en.wikipedia.org/wiki/Router_(computing)">router</a> or <a class="mw-redirect" title="Gateway (computer networking)" href="https://en.wikipedia.org/wiki/Gateway_(computer_networking)">gateway</a> through which unencrypted traffic such as <strong><a title="Telnet" href="https://en.wikipedia.org/wiki/Telnet">Telnet</a> </strong>or <strong><a class="mw-redirect" title="HTTP" href="https://en.wikipedia.org/wiki/HTTP">HTTP</a> </strong>passes can use this tool to view login IDs, passwords, the <a title="Uniform Resource Locator" href="https://en.wikipedia.org/wiki/Uniform_Resource_Locator">URLs</a> and content of websites being viewed, or any other unencrypted information.</p>
<a href="https://itblogsec.com/wp-content/uploads/2017/02/tcpdump.pdf" class="pdfemb-viewer" style="" data-width="max" data-height="max" data-toolbar="bottom" data-toolbar-fixed="off">tcpdump</a>
<p style="text-align: center;">Download file <a href="https://itblogsec.com/wp-content/uploads/2017/02/tcpdump.pdf" target="_blank" rel="noopener">here</a></p>
<p style="text-align: center;">source: <a href="http://packetlife.net" target="_blank" rel="noopener">http://packetlife.net</a></p>
<p>The post <a href="https://itblogsec.com/tcpdump-cheat-sheet/">Tcpdump cheat sheet</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/tcpdump-cheat-sheet/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
			</item>
		<item>
		<title>How to find out TOP talkers in your network</title>
		<link>https://itblogsec.com/top-talkers-by-using-tcpdump/</link>
					<comments>https://itblogsec.com/top-talkers-by-using-tcpdump/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 30 Dec 2016 22:44:59 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[tcpdump]]></category>
		<category><![CDATA[top talkers]]></category>
		<category><![CDATA[unix]]></category>
		<guid isPermaLink="false">http://itblogsec.com/?p=21</guid>

					<description><![CDATA[<p>Sometimes it is very useful to find out current top talkers in your network. You can figure out what it's going on and what IP can be possible source of congestion.</p>
<p>The post <a href="https://itblogsec.com/top-talkers-by-using-tcpdump/">How to find out TOP talkers in your network</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>How to find out TOP talkers in your network</h2>
<p style="text-align: justify;">Sometimes it is very useful to find out current top talkers in your network, affecting your local interface. You can figure out what it&#8217;s going on and what IP can be possible source of congestion.</p>
<h3>UNIX/LINUX procedure</h3>
<p>Issue following command, by parameter -c you can configure amount of packets what will be captured, by parameter -i specify interface you want to sniff on:</p>
<pre class="lang:default decode:true">sudo tcpdump -tnn -c 40 -i eth0  | awk -F "." '{print $1"."$2"."$3"."$4}' | sort | uniq -c | sort -nr | head</pre>
<p>&nbsp;</p>
<div id="attachment_369" style="width: 1108px" class="wp-caption alignnone"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-369" class="border-image wp-image-369 size-full" src="https://itblogsec.com/wp-content/uploads/2016/12/top_talkers.jpg" width="1098" height="161" srcset="https://itblogsec.com/wp-content/uploads/2016/12/top_talkers.jpg 1098w, https://itblogsec.com/wp-content/uploads/2016/12/top_talkers-300x44.jpg 300w, https://itblogsec.com/wp-content/uploads/2016/12/top_talkers-768x113.jpg 768w, https://itblogsec.com/wp-content/uploads/2016/12/top_talkers-1024x150.jpg 1024w" sizes="(max-width: 1098px) 100vw, 1098px" /><p id="caption-attachment-369" class="wp-caption-text">Output of analyzing 40 packets</p></div>
<p>&nbsp;</p>
<h3>WINDOWS procedure</h3>
<p style="text-align: justify;">In Windows OS we will use well-known application <a href="https://www.wireshark.org/download.html">Wireshark</a>. Normally a network interface will only &#8220;receive&#8221; packets directly addressed to the interface. Promiscuous mode allows the interface to receive all packets that it sees whether they are addressed to the interface or not. By enabling interface in promiscuous mode you can easily sniff traffic and based on further analyse you can figure out who is possible top-talker. It is very useful in case you are experiencing some kind of broadcast (multicast) storm and want to identify source of your congestion.</p>
<div id="attachment_379" style="width: 1146px" class="wp-caption alignnone"><img decoding="async" aria-describedby="caption-attachment-379" class="border-image wp-image-379 size-full" src="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_01.png" width="1136" height="582" srcset="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_01.png 1136w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_01-300x154.png 300w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_01-768x393.png 768w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_01-1024x525.png 1024w" sizes="(max-width: 1136px) 100vw, 1136px" /><p id="caption-attachment-379" class="wp-caption-text">Selection of interface and starting packets capture</p></div>
<p><span style="color: #ff0000;">1. Click button to open capture interface settings<br />
</span><span style="color: #ff0000;">2. Select interface which you want to capture traffic on<br />
</span><span style="color: #ff0000;">3. Click &#8220;Start&#8221; button to start capturing</span></p>
<div id="attachment_381" style="width: 1257px" class="wp-caption alignnone"><img decoding="async" aria-describedby="caption-attachment-381" class="border-image wp-image-381 size-full" src="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_03.png" width="1247" height="397" srcset="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_03.png 1247w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_03-300x96.png 300w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_03-768x245.png 768w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_03-1024x326.png 1024w" sizes="(max-width: 1247px) 100vw, 1247px" /><p id="caption-attachment-381" class="wp-caption-text">Stopping capture and selecting Conversations</p></div>
<p><span style="color: #ff0000;">4. After a few seconds you can &#8220;Stop&#8221; capturing of traffic</span><br />
<span style="color: #ff0000;">5. Select &#8220;Statistics&#8221;</span><br />
<span style="color: #ff0000;">6. Choose &#8220;Conversations&#8221;</span></p>
<div id="attachment_384" style="width: 1017px" class="wp-caption alignnone"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-384" class="border-image wp-image-384 size-full" src="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_04.png" width="1007" height="241" srcset="https://itblogsec.com/wp-content/uploads/2016/12/wireshark_04.png 1007w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_04-300x72.png 300w, https://itblogsec.com/wp-content/uploads/2016/12/wireshark_04-768x184.png 768w" sizes="(max-width: 1007px) 100vw, 1007px" /><p id="caption-attachment-384" class="wp-caption-text">Conversations dialog where you can filter and see full statistics of captured packets</p></div>
<p style="text-align: justify;">Simply by selecting desired port, ordering based on &#8220;Bytes&#8221; you can see souce/destination IP which is originating the most packets. Do not forget that you will not be able to see all traffic in your network but you can capture traffic which does not have to be addressed directly to your interface but can influence also your network performance (e.g. broadcast storm &#8230;).</p>
<p>The post <a href="https://itblogsec.com/top-talkers-by-using-tcpdump/">How to find out TOP talkers in your network</a> appeared first on <a href="https://itblogsec.com">ITBlogSec.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://itblogsec.com/top-talkers-by-using-tcpdump/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 0/174 objects using XCache
Page Caching using Disk: Enhanced 

Served from: itblogsec.com @ 2025-11-28 19:31:46 by W3 Total Cache
-->