Traffic Capture
CLI-tools
# Capture the HTTP-related traffic on the tun0 interface
sudo tcpdump -i tun0 port 80 -n -w http_traffic.pcap# Capture the HTTP-related traffic on the tun0 interface
sudo tshark -i tun0 -f "port 80" -n -w http_traffic.pcapWireShark
# HTTP traffic only
http
# HTTPS traffic (TLS/SSL)
ssl or tls
# SMB protocol traffic
smb || smb2
# LDAP traffic
ldap
# RDP traffic
tcp.port == 3389
# NTML authentication
ntlmssp
# Base64 encoded strings (common in HTTP headers)
frame contains "Basic "
# FTP credentials (user/pass)
ftp.request.command == "USER" || ftp.request.command == "PASS"
# HTTP POST requests (often contain data submission)
http.request.method == "POST"
# Kerberos tickets (useful for Kerberoasting)
kerberos
# IP addresses
ip.addr == 192.168.1.10
ip.dst == 192.168.1.10
ip.src == 192.168.1.10
# TCP traffic with data (non-empty payloads)
tcp.len > 0
# HTTP traffic on non-standard ports
http && tcp.port != 80SQLi Example




Last updated