Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

pcapdump(1) [debian man page]

pcapdump(1)															       pcapdump(1)

NAME
pcapdump - dedicated packet capture utility SYNOPSIS
pcapdump [OPTIONS]... DESCRIPTION
pcapdump captures packets from a network interface and writes them to a dumpfile. The filename argument given to -w will be formated by strftime(3). PCAPNET OPTIONS
-i interface Input interface to read packets from. -r pcap file Dump file to read packets from. -w pcap file Dump file to write filtered packets to. -f expression BPF expression which selects packets to be filtered. -s snaplen Capture snaplen bytes of data from each packet. -p Disable promiscuous mode sniffing. PROGRAM OPTIONS
-u owner Set the output file's owning user to owner. -g group Set the output file's owning group to group. -m mode Set the output file's mode to mode, specified in octal. -t secs Dump file rotation interval in seconds. -c count Exit after capturing count packets. -T secs Exit after capturing during this amount of seconds. -H Only capture link, network, and transport headers; do not capture application-layer data. -S sample value Sample the packet stream by only dumping 1 in every sample value packets. -R Together with -S, sample the packets randomly, not systematically. -P pidfile Daemonize the process and write its PID to pidfile. -C config file File to read configuration variables from. Instead of passing configuration through the command line, a file can be used to specify values for the bpf, device, filefmt, group, interval, mode, owner, promisc, and snaplen options (not all need to be specified; de- faults will be used otherwise). See /usr/share/doc/pcaputils/examples/pcapdump/eth0 for an example. 9 May 2009 pcapdump(1)

Check Out this Related Man Page

PCAP_OPEN_LIVE(3PCAP)													     PCAP_OPEN_LIVE(3PCAP)

NAME
pcap_open_live - open a device for capturing SYNOPSIS
#include <pcap/pcap.h> char errbuf[PCAP_ERRBUF_SIZE]; pcap_t *pcap_open_live(const char *device, int snaplen, int promisc, int to_ms, char *errbuf); DESCRIPTION
pcap_open_live() is used to obtain a packet capture handle to look at packets on the network. device is a string that specifies the net- work device to open; on Linux systems with 2.2 or later kernels, a device argument of "any" or NULL can be used to capture packets from all interfaces. snaplen specifies the snapshot length to be set on the handle. promisc specifies if the interface is to be put into promiscuous mode. to_ms specifies the read timeout in milliseconds. RETURN VALUE
pcap_open_live() returns a pcap_t * on success and NULL on failure. If NULL is returned, errbuf is filled in with an appropriate error message. errbuf may also be set to warning text when pcap_open_live() succeeds; to detect this case the caller should store a zero-length string in errbuf before calling pcap_open_live() and display the warning to the user if errbuf is no longer a zero-length string. errbuf is assumed to be able to hold at least PCAP_ERRBUF_SIZE chars. SEE ALSO
pcap(3PCAP), pcap_create(3PCAP), pcap_activate(3PCAP) 5 April 2008 PCAP_OPEN_LIVE(3PCAP)
Man Page

13 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Occasional Core Dump

Hi, We have one application (c language) installed on our AIX 5.2. When we enter some large amount of data in one screen and do update, it is dumping core some times without any error (like bus error, segmentation fault). Next we open the application again and enter the same data and do update.... (4 Replies)
Discussion started by: venkatmyname
4 Replies

2. Shell Programming and Scripting

how do we retrieve a line from a file in unix

we need to capture a record from a file in to a variable and do modifications to it .. so capturing line by line in a file in to some variable (2 Replies)
Discussion started by: lmadhuri
2 Replies

3. Shell Programming and Scripting

Need Help to count the deployments

Hi, Need help for a script that count no of deployments from the below Sample Input file. Below is my sample input file. Not sure whether it works or not. Note: (We can use a seperator if needed) My output should come like for each Store: Output should look like: Store_MS1: 4 Deployments... (6 Replies)
Discussion started by: amiri2000
6 Replies

4. Programming

Packet capturing using pcap

Hi, i am using a linux CentOS machine. I have 2 real network interfaces eth0, eth1 and 2 virtual interfaces tap0 and tap1. I am using PCAP library to capture the packets on theses interfaces. If i specify the interface as "any", i cannot find a way to know from which interface the packet... (1 Reply)
Discussion started by: rahulnitk2004
1 Replies

5. Infrastructure Monitoring

capture snmp packets in AIX

Hi, I want to capture snmp packets in AIX. When i give print from AIX6.1, Printer will give its response thru' snmp. I used iptrace command like below, but it is not capturing snmp packets other packets are captured like udp, tcp.. 1. iptrace command: /usr/sbin/iptrace -a -i en0... (1 Reply)
Discussion started by: meeraramanathan
1 Replies

6. Shell Programming and Scripting

Awk - Compare fields and increment variables

Hi, My first post to this group... I have a need to to parse a source file which is a capture from a network analyser. I have two fields that need to be checked: - Field 7 represents the packet length (an integer), and Field 4 represents a network address (e.g. 192.168.25.3) - The... (10 Replies)
Discussion started by: mv652
10 Replies

7. IP Networking

tcpdump -w file is not capturing all the packets

I am trying to capture tcpdump for traffic to a port in a file but this does not seem to capture all the packets. Command I use is : tcpdump -w tdump.dat port 22 Why is it not capturing all the packets ? Here is my experiment: root@pmode-client6 adc-demo]# tcpdump port 22 tcpdump:... (5 Replies)
Discussion started by: radiatejava
5 Replies

8. Shell Programming and Scripting

capturing the value in file before string(*) and the similar value in next line only

I've the output in the file like below. I want to capture the value in file before string(*) and the similar value in next line only. cat test1.txt 0003 Not Visible (M) 0 00 03F 0005 Not Visible (M) 0 00 040 - AVAILABLE 0 00... (1 Reply)
Discussion started by: sai_1712
1 Replies

9. Red Hat

capturing data of nethogs

I have installed nethogs to see which process is sending load on the network. i would like to know how can i capture its data in a log file. Or is there is a unix command like script or tee which can help me to capture the data using cronjob (0 Replies)
Discussion started by: anshus1
0 Replies

10. Programming

Why am i getting these strange packets while running my packet capture module written in c.?

I have made an packet capture application running on intel machine, it is capturing packets with src address- 17.0.0.0 destination ip- 66.0.0.0, source port- 0, destination port- 0, and protocol- 0 what does these packets mean ? The code written to interpreter captured bytes is given below.... (5 Replies)
Discussion started by: arunpushkar
5 Replies

11. Shell Programming and Scripting

De-group data

Hi, some help is highly appreciated, I want to de-group my data for statistical analysis. I made up some sample data, there shouldnt be repeated lines in the output. My data is in excel but I can make it tab-delimited text. A B,C A B,D,E X Y X Y,ZExpected output A B A C A D A E X Y... (3 Replies)
Discussion started by: ritakadm
3 Replies

12. IP Networking

TCPdump

I've recently started learning to use TCPdump, and I find it pretty interesting. There's one thing I don't understand. When I tell it to capture packets on, say, the WiFi interface en1, it often captures packets sent or received by other hosts on the network. How can it do this? My... (3 Replies)
Discussion started by: Ultrix
3 Replies

13. UNIX for Dummies Questions & Answers

Difference between non promiscous and promiscous modes in packet sniffing?

I am using a packet sniffing program. When i use the promiscous mode, i can see in the packets that there is an IP involved(192.168.1.73) in either "from" or "to", which is not my machine's IP( 192.168.1.185). However, in the non promiscous mode, only packets involving my machine's IP are... (1 Reply)
Discussion started by: syncmaster
1 Replies