Sponsored Content
Operating Systems Linux Debian tcpdump filter (mis)behaviour Post 302505374 by Hollinch on Thursday 17th of March 2011 07:30:32 AM
Old 03-17-2011
As above,

tcp port 80
tcp port http

Or simply
port 80
or
port 22
Etc

---------- Post updated at 12:30 PM ---------- Previous update was at 12:53 AM ----------

Just thinking. If tcpdump and libpcap are not at fault here (as I have used two different versions of both with the same result), the only thing remaining would be the network card driver I suppose. Can this be of influence in this behaviour? I would expect not, as the filter applies to libpcap, but...?

Thanks

Last edited by Hollinch; 03-17-2011 at 08:25 AM..
 

7 More Discussions You Might Find Interesting

1. Programming

How To Use tcpdump

I have two net-card. one is 172.16.24.99(ENG) ,another is 172.16.25.99(ENG-B). Both masks is 255.255.255.0. I will monitor data on the tcp port 8055 in ENG, How do I set option of tcpdump command (2 Replies)
Discussion started by: chenhao_no1
2 Replies

2. UNIX for Dummies Questions & Answers

tcpdump

does anybody know what the -d -dd and -ddd options are used for ? thanks (2 Replies)
Discussion started by: ant04
2 Replies

3. Shell Programming and Scripting

Report a missing property and property value mis match script.

Hi All, I have 2 properties files - one is a master templete and other one is a node specific properties file, I need to comapre these 2 properties files and make sure the node Specific properties file contains all the properties in the master temple properties file else report the missing... (5 Replies)
Discussion started by: jayka
5 Replies

4. Debian

Tcpdump Help !

Hi. Need Help with TcpDump Trying to sniff associatio-request with tcpdump but when i run this tcpdump -i eth0 wlan subtype assoc-req i get this error can anyone help me with this error ? Thanks alot !!:) (1 Reply)
Discussion started by: SoulZB
1 Replies

5. IP Networking

TCPdump

I've recently started learning to use TCPdump, and I find it pretty interesting. There's one thing I don't understand. When I tell it to capture packets on, say, the WiFi interface en1, it often captures packets sent or received by other hosts on the network. How can it do this? My... (3 Replies)
Discussion started by: Ultrix
3 Replies

6. Shell Programming and Scripting

sed to remove newline chars based on pattern mis-match

Greetings Experts, I am in AIX; I have a file generated through awk after processing the input files. Now I need to replace or remove the new-line characters on all lines that doesn't have a ; which is the last character on the line. I tried to use sed 's/\n/ /g' After checking through the... (6 Replies)
Discussion started by: chill3chee
6 Replies

7. War Stories

The (Mis)Information Age – The End of the World as We Know It and What Vault7 Teaches Us

I hope you will enjoy reading this essay I wrote: The (Mis)Information Age – The End of the World as We Know It and What Vault7 Teaches Us If you are a true "IT person" i.e. a software developer, code or deep system admin, I think you will resonate with the theme of my essay. I could... (8 Replies)
Discussion started by: Neo
8 Replies
tcptrack(1)						      General Commands Manual						       tcptrack(1)

NAME
tcptrack - Monitor TCP connections on the network SYNOPSIS
tcptrack [ -dfhvp ] [ -r seconds ] -i interface [ filter expression ] DESCRIPTION
tcptrack displays the status of TCP connections that it sees on a given network interface. tcptrack monitors their state and displays information such as state, source/destination addresses and bandwidth usage in a sorted, updated list very much like the top(1) command. The filter expression is a standard pcap filter expression (identical to the expressions used by tcpdump(8)) which can be used to filter down the characteristics of TCP connections that tcptrack will see. See tcpdump(8) for more information about the syntax of this expres- sion. OPTIONS
-d Only track connections that were started after tcptrack was started. Do not try to detect existing connections. -f Enable fast average recalculation. TCPTrack will calculate the average speeds of connections by using a running average. TCPTrack will use more memory and CPU time, but averages will seem closer to real time and will be updated more than once per second and may be more accurate under heavy load. The number of times per second that averages will be recalculated in fast mode is a compile-time setting that defaults to 10 times per second. -h Display command line help -i [interface] Sniff packets from the specified network interface. -T [pcap file] Read packets from the specified file instead of sniffing from the network. Useful for testing. -p Do not put the interface being sniffed into promiscuous mode. -r [seconds] Wait this many seconds before removing a closed connection from the display. Defaults to 2 seconds. See also the pause interactive command (below). -v Display tcptrack version INTERACTIVE COMMANDS
The following keys may be pressed while tcptrack is running to change runtime options: p - Pause/unpause display. No new connections will be added to the display, and all currently displayed connections will remain in the dis- play. q - Quit tcptrack. s - Cycle through the sorting options: unsorted, sorted by rate, sorted by total bytes. The options for pausing and toggling sorting are useful if you're watching a very busy network and want to look at the display without con- nections jumping around (due to sorting and new connections being added) and disappearing (due to being closed for a certain time). When paused (via the p command) no new connections will be displayed, however tcptrack will still monitor and track all connections it sees as usual. This option affects the display only, not internals. When you unpause, the display will be updated with all current information that tcptrack has been gathering all along. EXAMPLES
tcptrack requires only one parameter to run: the -i flag followed by an interface name that you want tcptrack to monitor. This is the most basic way to run tcptrack: # tcptrack -i eth0 tcptrack can also take a pcap filter expression as an argument. The format of this filter expression is the same as that of tcpdump(8) and other libpcap-based sniffers. The following example will only show connections from host 10.45.165.2: # tcptrack -i eth0 src or dst 10.45.165.2 The next example will only show web traffic (ie, traffic on port 80): # tcptrack -i eth0 port 80 SEE ALSO
tcpdump(8), pcap(3), http://www.rhythm.cx/~steve/devel/tcptrack BUGS
When picking up a connection that was already running before tcptrack was started, there is no way tcptrack can know for sure which end of the connection is the client (ie, which peer started the connection) and which is the server (ie, which peer was listening). tcptrack makes a crude guess at which is which by looking at the port numbers; whichever end has the lower port number is considered the server side. This isn't always accurate of course, but future versions may have better heuristics to figure out which end is which. Currently the interface is not very flexible. Display timing settings (such as the refresh interval) can only be changed by editing the source code (defs.h in particular). See the TODO file included with the source distribution for further bugs. tcptrack(1)
All times are GMT -4. The time now is 05:28 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy