Advertisement
zmnkh

packer capture

Mar 24th, 2015
523
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.25 KB | None | 0 0
  1. #packet capture
  2.  
  3. load -l (load할 수 있는 기능 확인)
  4. load sniffer
  5. sniffer_interface
  6. sniffer_start 1 (세션 번호)
  7. sniffer_dump 1 test.pcap (/root 밑에 저장됨)
  8. sniffer_stop 1
  9.  
  10. 해당 파일을 wireshark에서 오픈해 보면 됨
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement