π¦Wireshark or Tcpdump
https://www.kali.org/tools/wireshark/ https://www.kali.org/tools/tcpdump/
Wireshark
wireshark -i eth1
# Filter by ip
ip.add == 10.10.10.9
# Filter by dest ip
ip.dest == 10.10.10.15
# Filter by source ip
ip.src == 10.10.16.33
# Filter by tcp port
tcp.port == 25
# Filter by ip addr and port
ip.addr == 10.10.14.22 and tcp.port == 8080
# Filter SYN flag
tcp.flags.syn == 1 and tcp.flags.ack ==0
# Broadcast filter
eth.dst == ff:ff:ff:ff:ff:ffFilters CheatSheet


TShark
Others Notes
Password sniffing using Wireshark
Attacker
Stop capture
File->Save as
Filter: http.request.method==POST
RDP log in Target
service
start Remote Packet Capture Protocol v.0 (experimental)
Log off Target
Wireshark->Capture options->Manage Interface->Remote Interfaces
Add a remote host and its interface
Fill info
Additional Resources
Last updated

