Tools/Commands
Tool
tshark
arpspoof
Commands
tshark -D // list interfaces
sudo tshark -i eth0
tshark -r <file>.pcap
tshark -r <file>.pcap -z io,phs -q
tshark -r <file>.pcap -Y 'http'
tshark -r <file>.pcap -Y 'ip.src==<ip> && ip.dst==<ip>'
tshark -r <file>.pcap -Y 'http.request.method==<httpmethod>' // filter
tshark -r <file>.pcap -Y 'http.request.method==<httpmethod>' -Tfields -e frame.time -e ip.src -e http.request.full_uri' // filter with field selection
tshark -r <file>.pcap -Y 'http contains password'
tshark -r <file>.pcap -Y 'http.request.method==<httpmethod> && http.host==<host>'
tshark -r <file>.pcap -Y 'ip contains amazon.in && ip.src=<ip>' -Tfields -e ip.src -e http.cookie -e http.user_agent
echo 1 > /proc/sys/net/ipv4/ip_forward //
arpspoof -i <interface> -t <target ip> -r <reply ip>
tshark -r <file>.pcap -Y 'wlan'
tshark -r <file>.pcap -Y 'wlan.fc.type_subtype==0x000c'
tshark -r <file>.pcap -Y 'wlan.fc.type_subtype==0x000c' -Tfields -e wlan.ra
tshark -r <file>.pcap -Y 'wlan.ssid==LazyArtists' -Tfields -e wlan.bssid -e wlan_radio.channel
tshark -r <file>.pcap -Y 'wlan.fc.type_subtype==8' -Tfields -e wlan.ssid -e wlan.bssid
Last updated