TCPDump: analizado de paquetes en red
¿Qué es TCPDUMP?
TCPdump es un analizador de paquetes de línea de comandos ampliamente utilizado para capturar y analizar el tráfico de red. Es una herramienta esencial para la solución de problemas de red y el análisis de seguridad.
A continuación exploramos algunos casos de uso comunes:
Instalación de TCPDump
Casos de uso
Filter Traffic by Destination IP:
$ tcpdump dst 192.168.0.1
Capture packets destined for a specific IP address, e.g., 192.168.0.1.
Filter Traffic by Port:
$ tcpdump port 80
Capture packets with a specific port number, like port 80 (HTTP).
Filter Traffic by Protocol:
$ tcpdump icmp
Capture packets using a specific network protocol, such as ICMP (ping).
Display Traffic in ASCII:
$ tcpdump -A
Display packet contents in ASCII format for better readability.
Display Traffic in Hexadecimal:
$ tcpdump -X
Show packet contents in hexadecimal and ASCII format.
Número específico de captura de paquetes:
$ tcpdump -c 100
Capture solo los primeros 100 paquetes y luego salga.
Capture and Display IPv6 Traffic:
$ tcpdump -6
Capture and analyze IPv6 packets for comprehensive network analysis.
Capture Traffic on a Specific Interface:
$ tcpdump -i wlan0
Capture network traffic on a specific interface, such as wlan0 (wireless interface).
Capture Specific Protocol and Port:
$ tcpdump tcp port 443
Capture only TCP packets on port 443 (HTTPS) for analysis.
Filter Traffic by Source and Destination:
$ tcpdump src 192.168.0.1 and dst 192.168.0.2
Capture packets between a specific source IP (192.168.0.1) and destination IP (192.168.0.2).
TCPdump ofrece capacidades avanzadas para un análisis de red en profundidad. Exploremos algunos ejemplos complejos que demuestran el poder y la flexibilidad de TCPdump para capturar y diseccionar paquetes de red. ¡Prepárese para un emocionante viaje hacia el análisis avanzado de redes!
Capture HTTP Request and Response Headers:
$ tcpdump -i eth0 -s 0 -A -n 'tcp dst port 80'
Capture and display HTTP traffic on port 80, including both request and response headers (-A for ASCII output).
Filter Traffic by IP Range and Protocol:
$ tcpdump -i eth0 'net 192.168.0.0/24 and (tcp port 22 or icmp)'
Capture packets within the IP range 192.168.0.0/24, filtering for SSH (port 22) and ICMP traffic.
Capture DNS Traffic and Resolve Hostnames:
$ tcpdump -i eth0 'udp port 53' -nnvvv
Capture DNS packets on port 53 and display verbose output (-nnvvv) without hostname resolution.
Capture FTP Control Channel Traffic:
$ tcpdump -i eth0 -s 0 'tcp port 21'
Capture FTP control channel traffic on port 21, which includes commands and responses exchanged between the FTP client and server.
5) Monitor SSH Connections:
$ tcpdump -i eth0 'tcp port 22' -l -e
Monitor SSH connections by capturing packets on port 22, displaying them in real-time (-l), and including Ethernet headers (-e).
Última actualización