Capture and analyze network traffic with Wireshark and TCPDump for credential interception and protocol analysis.
tcpdump -i eth0
tcpdump -i any
tcpdump -i eth0 -w capture.pcap
tcpdump -i eth0 -w capture.pcap -s 0
tcpdump -i eth0 host 10.10.10.1
tcpdump -i eth0 port 80
tcpdump -i eth0 port 443
tcpdump -i eth0 "port 21 or port 23 or port 110"
tcpdump -i eth0 -nn src net 192.168.1.0/24
tcpdump -i eth0 -A port 80
tcpdump -i eth0 -X port 80 | head -100
tcpdump -r capture.pcap
http
http.request.method == "POST"
ip.addr == 10.10.10.1
tcp.port == 4444
tcp.flags.syn == 1 && tcp.flags.ack == 0
http contains "password"
ftp || telnet || pop || imap
dns
smb || smb2
frame contains "NTLMSSP"
!(arp or icmp or dns)
tcp.analysis.flags && !tcp.analysis.window_update
tshark -i eth0 -w capture.pcap
tshark -r capture.pcap -Y "http.request" -T fields -e ip.dst -e http.request.uri
tshark -r capture.pcap -Y "http.request.method==POST" -T fields -e tcp.payload
tshark -r capture.pcap -Y "ftp" -T fields -e ftp.request.command -e ftp.request.arg
tshark -r capture.pcap --export-objects http,./exported/