Advertisement
Guest User

Untitled

a guest
Aug 21st, 2019
103
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.07 KB | None | 0 0
  1. # parsing pcap capture file with tshark
  2. ```bash
  3. tcpdump -r vagrant_up.pcap -w outfile.pcap "dst port 5150"
  4. tshark -r vagrant_up.pcap -n -T fields -e ip.src -e tcp.srcport -e ip.dst -e tcp.dstport
  5. tshark -r vagrant_up.pcap -T json > /tmp/output.json
  6. jq '.|length' /tmp/output.json
  7. jq '.[4000]' /tmp/output.json
  8. ```
  9.  
  10. # follow a tcp communication between two nodes
  11. ```bash
  12. tshark -r vagrant_up.pcap -z "follow,tcp,hex,192.168.3.200:46168,192.168.3.100:5150" > /tmp/o46168_f5150.follow
  13. ```
  14.  
  15. # capture 100 packets with filter and in json format
  16. ```bash
  17. tshark -i enp0s8 -c 100 -n -T json -e ip.src -e tcp.srcport -e ip.dst -e tcp.dstport -e data.data -e data.len -e udp 'src host (192.168.3.200 or 192.168.3.100)' | tee /tmp/capture100.json
  18. ```
  19.  
  20. # statistics of 1000 packets across nodes
  21. ```bash
  22. tshark -i enp0s8 -c 1000 -n -T json -e frame.number -e frame.time_epoch -e frame.time_delta -e ip.src -e tcp.srcport -e udp.srcport -e ip.dst -e tcp.dstport -e udp.dstport -e data.data -e data.len 'src host (192.168.3.200 or 192.168.3.100 or 192.168.3.123 or 192.168.3.2 or 192.168.3.45) and (tcp or udp)'
  23. ```
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement