TCPDump: Capture and Record Specific Protocols / Port

by on August 31, 2008 · 8 comments· LAST UPDATED August 31, 2008

in , ,

Q. How do I capture specific protocol or port such as 80 ( http ) using TCPDump tool under Linux / UNIX? How do I recording Traffic with TCPDump and find problems later on?

A. TCPDump is a tool for network monitoring and data acquisition. It can save lots of time and can be used for debugging network or server related problems. Tcpdump prints out a description of the contents of packets on a network interface that match the boolean expression.

Monitor all packets on eth1 interface

tcpdump -i eth1

Monitor all traffic on port 80 ( HTTP )

tcpdump -i eth1 'port 80'

Monitor all traffic on port 25 ( SMTP )

tcpdump -vv -x -X -s 1500 -i eth1 'port 25'
Where,

  • -vv : More verbose output
  • -x : When parsing and printing, in addition to printing the headers of each packet, print the data of each packet.
  • -X : hen parsing and printing, in addition to printing the headers of each packet, print the data of each packet (minus its link level header) in hex and ASCII. This is very handy for analysing new protocols.
  • -s 1500: Snarf snaplen bytes of data from each packet rather than the default of 68. This is useful to see lots of information.
  • -i eth1 : Monitor eth1 interface

Capturing traffic information using cronjobs

tcpdump can be used to find out about attacks and other problems. Let us say your webserver facing problem everday at midnight. Enter following command into cron. It will schedule capturing of 30,000 packets and writing raw data to a file called port.80.debug.txt:
@midnight /usr/sbin/tcpdump -n -c 30000 -w /root/port.80.debug.txt
Next day you can log into your box and read the /root/port.80.debug.txt file:
tcpdump -X -vv -r /root/port.80.debug.txt
This simple technique can be used record and debug problems.

Further readings:

  • man page tcpdump
TwitterFacebookGoogle+PDF versionFound an error/typo on this page? Help us!

{ 8 comments… read them below or add one }

1 Gagan Brahmi September 1, 2008 at 11:08 am

hey Vivek,

Nice read. One question that I need the answer for. What are the possible details that we can get from the tcpdump output?

I can see that it contains a whole lot of information, but not sure what is the important part of it.

Reply

2 Dylan October 2, 2008 at 2:18 am

Remember to load the saved capture file into Wireshark for a great help on analysis.
Nice article thanks.

Reply

3 lady February 19, 2009 at 3:39 am

hye dylan,
can u tell me how to save the capture file from tcpdump?
i tried this command:tcpdump -w new.pcap -i eth1
but the result is this:tcpdump: socket: Operation not permitted
what i did wrong?
should i create the folder first?

Reply

4 nixCraft February 19, 2009 at 6:45 am

you must run it as root user.

Reply

5 Fer March 9, 2009 at 1:27 am

Hi!
Nice explanation … I wonder, could I use it to capture squid proxy traffic? and use it to resolve user/pass data?
Dont get me wrong… I have a traitor on my organization so I’m trying to figure out who is it.
Sorry if this question is out ettical for you
FER

Reply

6 Kiambang October 24, 2011 at 11:38 am

….or using justniffer. http://justniffer.sourceforge.net/

Kyam

Reply

7 Ben November 11, 2011 at 12:02 am

Am doing a project to analyze network traffic of bit torrent clients . So I when I initiate a download from my comp (using my wireless internet connection) , I need to start collection the tcpdump and I need to store it in another file .
i tried using sudo tcpdump –i wlan0 –w xyz.dmp , but doesnt work ..what do I do ?

Reply

8 Panda September 6, 2012 at 9:49 pm

Ben try this:

sudo tcpdump -D

change wlan0 for something else :D

Reply

Leave a Comment

Tagged as: , , , , , , , , , , ,

Previous Faq:

Next Faq: