tcpdump
Get incoming ICMP packets:
sudo tcpdump -i any icmp and src host $target
Nützliche Parameter
Domains nicht auflösen, IPs anzeigen
-n
Dump der Daten anzeigen
-X
Paket in ASCII anzeigen
-A
Umgang mit Dateien
Dump in Datei schreiben
tcpdump -w file
Dump aus Datei lesen
tcpdump -r file
Standard-Abfragen
tcpdump -n src|dst 10.10.10.10 and port 80 [-r file] tcpdump -i eth0 -w core-10-11-1-234.dump
netsh (Windows)
Capture
netsh trace start capture=yes ... wait some time ... netsh trace stop
Download the the file.Upload it to a system with etl2pcap to convert it for WiresharkConvert it
etl2pcapng.exe NetTrace.etl NetTrace.pcap
Analyse the pcap file.Use PCredz or other sniffing tools to analyze the file.
Analyse captured packets
Use the pcaphistogram.py script to analyse a captured pcap file for entropy.
Leave a Reply
You must be logged in to post a comment.