<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://futuragora.org/wiki/index.php?action=history&amp;feed=atom&amp;title=Tcpdump</id>
	<title>Tcpdump - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://futuragora.org/wiki/index.php?action=history&amp;feed=atom&amp;title=Tcpdump"/>
	<link rel="alternate" type="text/html" href="https://futuragora.org/wiki/index.php?title=Tcpdump&amp;action=history"/>
	<updated>2026-05-05T16:54:13Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.44.0</generator>
	<entry>
		<id>https://futuragora.org/wiki/index.php?title=Tcpdump&amp;diff=1906&amp;oldid=prev</id>
		<title>Reset: Created page with &quot;In most cases you will need root permission to be able to capture packets on an interface. Using tcpdump (with root) to capture the packets and saving them to a file to analyz...&quot;</title>
		<link rel="alternate" type="text/html" href="https://futuragora.org/wiki/index.php?title=Tcpdump&amp;diff=1906&amp;oldid=prev"/>
		<updated>2019-11-08T22:42:03Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;In most cases you will need root permission to be able to capture packets on an interface. Using tcpdump (with root) to capture the packets and saving them to a file to analyz...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;In most cases you will need root permission to be able to capture packets on an interface. Using tcpdump (with root) to capture the packets and saving them to a file to analyze with Wireshark (using a regular account) is recommended over using Wireshark with a root account to capture packets on an “untrusted” interface. See the Wireshark security advisories for reasons why.&lt;br /&gt;
&lt;br /&gt;
See the list of interfaces on which tcpdump can listen:&lt;br /&gt;
&lt;br /&gt;
tcpdump -D&lt;br /&gt;
Listen on interface eth0:&lt;br /&gt;
&lt;br /&gt;
tcpdump -i eth0&lt;br /&gt;
Listen on any available interface (cannot be done in promiscuous mode. Requires Linux kernel 2.2 or greater):&lt;br /&gt;
&lt;br /&gt;
tcpdump -i any&lt;br /&gt;
Be verbose while capturing packets:&lt;br /&gt;
&lt;br /&gt;
tcpdump -v&lt;br /&gt;
Be more verbose while capturing packets:&lt;br /&gt;
&lt;br /&gt;
tcpdump -vv&lt;br /&gt;
Be very verbose while capturing packets:&lt;br /&gt;
&lt;br /&gt;
tcpdump -vvv&lt;br /&gt;
Be verbose and print the data of each packet in both hex and ASCII, excluding the link level header:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
tcpdump -v -X&lt;br /&gt;
Be verbose and print the data of each packet in both hex and ASCII, also including the link level header:&lt;br /&gt;
&lt;br /&gt;
tcpdump -v -XX&lt;br /&gt;
Be less verbose (than the default) while capturing packets:&lt;br /&gt;
&lt;br /&gt;
tcpdump -q&lt;br /&gt;
Limit the capture to 100 packets:&lt;br /&gt;
&lt;br /&gt;
tcpdump -c 100&lt;br /&gt;
Record the packet capture to a file called capture.cap:&lt;br /&gt;
&lt;br /&gt;
tcpdump -w capture.cap&lt;br /&gt;
Record the packet capture to a file called capture.cap but display on-screen how many packets have been captured in real-time:&lt;br /&gt;
&lt;br /&gt;
tcpdump -v -w capture.cap&lt;br /&gt;
Display the packets of a file called capture.cap:&lt;br /&gt;
&lt;br /&gt;
tcpdump -r capture.cap&lt;br /&gt;
Display the packets using maximum detail of a file called capture.cap:&lt;br /&gt;
&lt;br /&gt;
tcpdump -vvv -r capture.cap&lt;br /&gt;
Display IP addresses and port numbers instead of domain and service names when capturing packets (note: on some systems you need to specify -nn to display port numbers):&lt;br /&gt;
&lt;br /&gt;
tcpdump -n&lt;br /&gt;
Capture any packets where the destination host is 192.168.1.1. Display IP addresses and port numbers:&lt;br /&gt;
&lt;br /&gt;
tcpdump -n dst host 192.168.1.1&lt;br /&gt;
Capture any packets where the source host is 192.168.1.1. Display IP addresses and port numbers:&lt;br /&gt;
&lt;br /&gt;
tcpdump -n src host 192.168.1.1&lt;br /&gt;
Capture any packets where the source or destination host is 192.168.1.1. Display IP addresses and port numbers:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
tcpdump -n host 192.168.1.1&lt;br /&gt;
Capture any packets where the destination network is 192.168.1.0/24. Display IP addresses and port numbers:&lt;br /&gt;
&lt;br /&gt;
tcpdump -n dst net 192.168.1.0/24&lt;br /&gt;
Capture any packets where the source network is 192.168.1.0/24. Display IP addresses and port numbers:&lt;br /&gt;
&lt;br /&gt;
tcpdump -n src net 192.168.1.0/24&lt;br /&gt;
Capture any packets where the source or destination network is 192.168.1.0/24. Display IP addresses and port numbers:&lt;br /&gt;
&lt;br /&gt;
tcpdump -n net 192.168.1.0/24&lt;br /&gt;
Capture any packets where the destination port is 23. Display IP addresses and port numbers:&lt;br /&gt;
&lt;br /&gt;
tcpdump -n dst port 23&lt;br /&gt;
Capture any packets where the destination port is is between 1 and 1023 inclusive. Display IP addresses and port numbers:&lt;br /&gt;
&lt;br /&gt;
tcpdump -n dst portrange 1-1023&lt;br /&gt;
Capture only TCP packets where the destination port is is between 1 and 1023 inclusive. Display IP addresses and port numbers:&lt;br /&gt;
&lt;br /&gt;
tcpdump -n tcp dst portrange 1-1023&lt;br /&gt;
Capture only UDP packets where the destination port is is between 1 and 1023 inclusive. Display IP addresses and port numbers:&lt;br /&gt;
&lt;br /&gt;
tcpdump -n udp dst portrange 1-1023&lt;br /&gt;
Capture any packets with destination IP 192.168.1.1 and destination port 23. Display IP addresses and port numbers:&lt;br /&gt;
&lt;br /&gt;
tcpdump -n &amp;quot;dst host 192.168.1.1 and dst port 23&amp;quot;&lt;br /&gt;
Capture any packets with destination IP 192.168.1.1 and destination port 80 or 443. Display IP addresses and port numbers:&lt;br /&gt;
&lt;br /&gt;
tcpdump -n &amp;quot;dst host 192.168.1.1 and (dst port 80 or dst port 443)&amp;quot;&lt;br /&gt;
Capture any ICMP packets:&lt;br /&gt;
&lt;br /&gt;
tcpdump -v icmp&lt;br /&gt;
Capture any ARP packets:&lt;br /&gt;
&lt;br /&gt;
tcpdump -v arp&lt;br /&gt;
Capture either ICMP or ARP packets:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
tcpdump -v &amp;quot;icmp or arp&amp;quot;&lt;br /&gt;
Capture any packets that are broadcast or multicast:&lt;br /&gt;
&lt;br /&gt;
tcpdump -n &amp;quot;broadcast or multicast&amp;quot;&lt;br /&gt;
Capture 500 bytes of data for each packet rather than the default of 68 bytes:&lt;br /&gt;
&lt;br /&gt;
tcpdump -s 500&lt;br /&gt;
Capture all bytes of data within the packet:&lt;br /&gt;
&lt;br /&gt;
tcpdump -s 0&lt;br /&gt;
Based on Article first published March 13, 2010. Last updated October 1, 2014 by RationallyPARANOID.com&lt;/div&gt;</summary>
		<author><name>Reset</name></author>
	</entry>
</feed>