SlideShare a Scribd company logo
TCPdump ® By: Tomasz Politowski Kl IVA.
What is it??? Tcpdump-  is a common packet sniffer that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. It was originally written by Van Jacobson, Craig Leres and Steven McCanne who were, at the time, working in the Lawrence Berkeley Laboratory Network Research Group.
Common uses of tcpdump. Tcpdump  is frequently used to debug applications that generate or receive network traffic. It can also be used for debugging the network setup itself, by determining whether all necessary routing is occurring properly, allowing the user to further isolate the source of a problem. It is also possible to use tcpdump for the specific purpose of intercepting and displaying the communications of another user or computer. A user with the necessary privileges on a system acting as a router or gateway through which unencrypted traffic such as TELNET or HTTP passes can use tcpdump to view login IDs, passwords, the URLs and content of websites being viewed, or any other unencrypted information.
Example of Use tcpdump command: After you type the command tcpdump displays all received packets. To filter packets, you can specify the type of quotation marks in the protocol (ARP, RARP, TCP, UDP, IPX, etc.), port (eg port 21, portrange 100-200), for example: root@TEAM:/home/a# tcpdump 'tcp portrange 3000-5000' tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 11:52:01.178363 IP xdsl-2581.lubin.dialog.net.pl.4858 > 192.168.0.17.41857: S 2934274754:2934274754(0) win 65535 <mss 1460,nop,nop,sackOK> 11:52:01.362946 IP mcast-62-eit.man.poznan.pl.3792 > 192.168.0.17.41857: S 4223811393:4223811393(0) win 65535 <mss 1460,nop,nop,sackOK> 11:52:04.033362 IP xdsl-2581.lubin.dialog.net.pl.4858 > 192.168.0.17.41857: S 2934274754:2934274754(0) win 65535 <mss 1460,nop,nop,sackOK> 11:52:04.279834 IP mcast-62-eit.man.poznan.pl.3792 > 192.168.0.17.41857: S 4223811393:4223811393(0) win 65535 <mss 1460,nop,nop,sackOK> 11:52:04.560306 IP aotm.npgo.pl.40000 > 192.168.0.17.3894: P 2678547069:2678547239(170) ack 889594676 win 65535 5 packets captured 12 packets received by filter 0 packets dropped by kernel
USAGE:       * Bug tracking application that uses network communications       * Analyze the network configuration such as routing       * Intercept network communications of other users. Some protocols such as HTTPor telnet send the information in unencrypted form. You control router or gateway on the way the transmission can use tcpdump to capture information such as login or password.
Thanks you for your attention!!!

More Related Content

PDF
Tcpdump
PPTX
Tcpdump
PDF
Introduction to tcpdump
PPTX
PPTX
PPT
TCPdump-Wireshark
PPTX
Using metasploit
PPTX
Firewalls rules using iptables in linux
Tcpdump
Tcpdump
Introduction to tcpdump
TCPdump-Wireshark
Using metasploit
Firewalls rules using iptables in linux

What's hot (20)

PDF
Packet Filtering Using Iptables
PDF
Dhcp
PPT
Tc pdump mod
PDF
Linux internet server security and configuration tutorial
PDF
Network Mapper (NMAP)
PPT
Networking session-4-final by aravind.R
PPT
Nmap(network mapping)
PPTX
Understanding NMAP
DOCX
Network scanning with nmap
PPT
Iptables
PDF
Nmap Hacking Guide
PPT
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
DOCX
Tftp client server communication
PPTX
Nmap and metasploitable
PPTX
Network configuration
PPTX
Introduction to tcp ip linux networking
PPTX
N map presentation
PPT
IPTABLES
ODP
Networking in Gnu/Linux
PDF
Hacking With Nmap - Scanning Techniques
Packet Filtering Using Iptables
Dhcp
Tc pdump mod
Linux internet server security and configuration tutorial
Network Mapper (NMAP)
Networking session-4-final by aravind.R
Nmap(network mapping)
Understanding NMAP
Network scanning with nmap
Iptables
Nmap Hacking Guide
OSTU - Quickstart Guide for Wireshark (by Tony Fortunato)
Tftp client server communication
Nmap and metasploitable
Network configuration
Introduction to tcp ip linux networking
N map presentation
IPTABLES
Networking in Gnu/Linux
Hacking With Nmap - Scanning Techniques
Ad

Viewers also liked (18)

PDF
Tcpdump basico
PDF
tcpdump & xtrabackup @ MySQL Casual Talks #1
PDF
PPT
Addition
PPTX
Cybersecurity cyberlab1
PPT
Cain abel
PPT
Freeware Security Tools You Need
PPTX
Cain and abel
PPTX
Kismet
PPTX
Cain
PPT
09 Cain And Abel
PPTX
Tcpdump hunter
PPTX
Wireshark
PPT
Tcpdump
PPTX
Wireshark
PPTX
Network Packet Analysis with Wireshark
PPTX
Advantages and disadvantages of social media
PPTX
Packet sniffers
Tcpdump basico
tcpdump & xtrabackup @ MySQL Casual Talks #1
Addition
Cybersecurity cyberlab1
Cain abel
Freeware Security Tools You Need
Cain and abel
Kismet
Cain
09 Cain And Abel
Tcpdump hunter
Wireshark
Tcpdump
Wireshark
Network Packet Analysis with Wireshark
Advantages and disadvantages of social media
Packet sniffers
Ad

Similar to Tomasz P from Poland (20)

PPT
Traffic monitoring
PPTX
Packet capture in network security
PPT
Traffic-Monitoring.ppt
PPT
Traffic-Monitoring.ppt
PPT
Traffic-Monitoring.ppt
PDF
Pcapy and dpkt - tcpdump on steroids - Ran Leibman - DevOpsDays Tel Aviv 2018
PPT
Day2
PPT
OSTU - Sake Blok on Packet Capturing with Tshark
PDF
Ceh V5 Module 07 Sniffers
PDF
Fundamentals of TCP, and dump analysis
PPTX
Abandon Decades-Old TCPdump for Modern Troubleshooting
PDF
wireshark.pdf
DOCX
Chapter 3. sensors in the network domain
PPTX
F5 tcpdump
PDF
Open Source Debugging v1.3.2
PPT
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
PPT
Module 3 Scanning
PDF
Chapter 3 footprinting
PPTX
Wireshark
DOCX
Traffic monitoring
Packet capture in network security
Traffic-Monitoring.ppt
Traffic-Monitoring.ppt
Traffic-Monitoring.ppt
Pcapy and dpkt - tcpdump on steroids - Ran Leibman - DevOpsDays Tel Aviv 2018
Day2
OSTU - Sake Blok on Packet Capturing with Tshark
Ceh V5 Module 07 Sniffers
Fundamentals of TCP, and dump analysis
Abandon Decades-Old TCPdump for Modern Troubleshooting
wireshark.pdf
Chapter 3. sensors in the network domain
F5 tcpdump
Open Source Debugging v1.3.2
Exploiting Network Protocols To Exhaust Bandwidth Links 2008 Final
Module 3 Scanning
Chapter 3 footprinting
Wireshark

More from irenazd (15)

PPT
Gdansk By Mariusz H
PPT
Grzegorz M Gdansk Presentation
PDF
Quality Label Ic Tproject
PPT
Specialization by GrzegorzM
PPT
It lessons by Mariusz H
PPT
Gdansk Damian F
PPT
Presentation About Gdansk Maciek D
PPS
Presentation of Gdansk made by Michal B. from Poland
PPT
Przemek P - presentation from Poland
ODP
Presentation made by Marcin R.from Poland
PPT
"Internet Protocol Suite" prepared by Szymon M. from Poland
PPT
Internet Applications
PPT
Web database application
PPT
DNS presentation
PPT
My Sql
Gdansk By Mariusz H
Grzegorz M Gdansk Presentation
Quality Label Ic Tproject
Specialization by GrzegorzM
It lessons by Mariusz H
Gdansk Damian F
Presentation About Gdansk Maciek D
Presentation of Gdansk made by Michal B. from Poland
Przemek P - presentation from Poland
Presentation made by Marcin R.from Poland
"Internet Protocol Suite" prepared by Szymon M. from Poland
Internet Applications
Web database application
DNS presentation
My Sql

Recently uploaded (20)

PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Mushroom cultivation and it's methods.pdf
PDF
Encapsulation theory and applications.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
A Presentation on Touch Screen Technology
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PPTX
Tartificialntelligence_presentation.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
August Patch Tuesday
PDF
Encapsulation_ Review paper, used for researhc scholars
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Mushroom cultivation and it's methods.pdf
Encapsulation theory and applications.pdf
1 - Historical Antecedents, Social Consideration.pdf
DP Operators-handbook-extract for the Mautical Institute
A Presentation on Touch Screen Technology
Group 1 Presentation -Planning and Decision Making .pptx
Tartificialntelligence_presentation.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
1. Introduction to Computer Programming.pptx
A comparative study of natural language inference in Swahili using monolingua...
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
SOPHOS-XG Firewall Administrator PPT.pptx
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Programs and apps: productivity, graphics, security and other tools
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
cloud_computing_Infrastucture_as_cloud_p
Agricultural_Statistics_at_a_Glance_2022_0.pdf
August Patch Tuesday
Encapsulation_ Review paper, used for researhc scholars

Tomasz P from Poland

  • 1. TCPdump ® By: Tomasz Politowski Kl IVA.
  • 2. What is it??? Tcpdump- is a common packet sniffer that runs under the command line. It allows the user to intercept and display TCP/IP and other packets being transmitted or received over a network to which the computer is attached. It was originally written by Van Jacobson, Craig Leres and Steven McCanne who were, at the time, working in the Lawrence Berkeley Laboratory Network Research Group.
  • 3. Common uses of tcpdump. Tcpdump is frequently used to debug applications that generate or receive network traffic. It can also be used for debugging the network setup itself, by determining whether all necessary routing is occurring properly, allowing the user to further isolate the source of a problem. It is also possible to use tcpdump for the specific purpose of intercepting and displaying the communications of another user or computer. A user with the necessary privileges on a system acting as a router or gateway through which unencrypted traffic such as TELNET or HTTP passes can use tcpdump to view login IDs, passwords, the URLs and content of websites being viewed, or any other unencrypted information.
  • 4. Example of Use tcpdump command: After you type the command tcpdump displays all received packets. To filter packets, you can specify the type of quotation marks in the protocol (ARP, RARP, TCP, UDP, IPX, etc.), port (eg port 21, portrange 100-200), for example: root@TEAM:/home/a# tcpdump 'tcp portrange 3000-5000' tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes 11:52:01.178363 IP xdsl-2581.lubin.dialog.net.pl.4858 > 192.168.0.17.41857: S 2934274754:2934274754(0) win 65535 <mss 1460,nop,nop,sackOK> 11:52:01.362946 IP mcast-62-eit.man.poznan.pl.3792 > 192.168.0.17.41857: S 4223811393:4223811393(0) win 65535 <mss 1460,nop,nop,sackOK> 11:52:04.033362 IP xdsl-2581.lubin.dialog.net.pl.4858 > 192.168.0.17.41857: S 2934274754:2934274754(0) win 65535 <mss 1460,nop,nop,sackOK> 11:52:04.279834 IP mcast-62-eit.man.poznan.pl.3792 > 192.168.0.17.41857: S 4223811393:4223811393(0) win 65535 <mss 1460,nop,nop,sackOK> 11:52:04.560306 IP aotm.npgo.pl.40000 > 192.168.0.17.3894: P 2678547069:2678547239(170) ack 889594676 win 65535 5 packets captured 12 packets received by filter 0 packets dropped by kernel
  • 5. USAGE:      * Bug tracking application that uses network communications      * Analyze the network configuration such as routing      * Intercept network communications of other users. Some protocols such as HTTPor telnet send the information in unencrypted form. You control router or gateway on the way the transmission can use tcpdump to capture information such as login or password.
  • 6. Thanks you for your attention!!!