🦈Wireshark or Tcpdump

https://www.kali.org/tools/wireshark/ https://www.kali.org/tools/tcpdump/

Wireshark

wireshark -i eth1

# Filter by ip
ip.add == 10.10.10.9

# Filter by dest ip
ip.dest == 10.10.10.15

# Filter by source ip
ip.src == 10.10.16.33

# Filter by tcp port
tcp.port == 25

# Filter by ip addr and port
ip.addr == 10.10.14.22 and tcp.port == 8080

# Filter SYN flag
tcp.flags.syn == 1 and tcp.flags.ack ==0

# Broadcast filter
eth.dst == ff:ff:ff:ff:ff:ff

Filters CheatSheet

TShark

Others Notes

Password sniffing using Wireshark

Attacker

  • Stop capture

  • File->Save as

  • Filter: http.request.method==POST

  • RDP log in Target

  • service

  • start Remote Packet Capture Protocol v.0 (experimental)

  • Log off Target

  • Wireshark->Capture options->Manage Interface->Remote Interfaces

  • Add a remote host and its interface

  • Fill info

Additional Resources

TCPDUMP Tutorial
Detecting DoS Attack traffic

https://www.youtube.com/watch?v=4_7A8Ikp5Cc

Last updated