How to Generate Packet Captures
Determine Which Network Interface to Capture
dave@vm-dave-dev-1:~$ ifconfig
eth0 Link encap:Ethernet HWaddr 08:00:27:69:f3:a6
inet addr:192.168.1.12 Bcast:192.168.1.255 Mask:255.255.255.0
inet6 addr: fe80::a00:27ff:fe69:f3a6/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:216561 errors:0 dropped:0 overruns:0 frame:0
TX packets:44521 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:127096906 (127.0 MB) TX bytes:3891185 (3.8 MB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:905 errors:0 dropped:0 overruns:0 frame:0
TX packets:905 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:84115 (84.1 KB) TX bytes:84115 (84.1 KB)
dave@vm-dave-dev-1:~$Restricting Capture to a Specific Host or Port
Writing Output to a File
Running the Capture
Compress the Capture
Running a Packet Capture from Windows Using Wireshark

Using SCP to Transfer the Output
Last updated