tcpdump
is an extremely useful tool for validating and troubleshooting packet flows through a system, and through a network. Whether you want to confirm if a process is communicating, review the frequency of network conversations, or explore unexpected flows, tcpdump
is one tool that can help.
Sometimes, it’s necessary to have deeper insight and analysis than what tcpdump
can display in its output. This is where capturing a flow to a PCAP file for review in Wireshark can extend the tool. Exploring a PCAP file in Wireshark provides all the capabilities of a Wireshare live network capture, but through a static capture file, including items such as:
- Frame headers
- Layer 2 protocols
- TCP, UDP, ICMP details
- Application data
The example below shows how o capture a network flow in a PCAP format using tcpdump
:
Where:
-i
is the interface to capture from. For exampleens33
-s
is the number of bytes of data to capture from each packet-w
is the output file of the capture. For examplehttp_traffic.pcap