Linux Security: Packet Capture and Analysis
![Linux Security: Packet Capture and Analysis](/content/images/size/w1200/2020/08/linux-security-670x335-1-5.jpg)
It’s crucial for any security or systems administrator to be able to capture and analyze network traffic. This allows for advanced troubleshooting as well as security review.
Use a tshark
capture filter to collect TCP traffic on port 80.
- Use a
tshark
capture filter to collect TCP traffic on port 80. Store the capture command output in/root/http_out
.
tshark -f "tcp port 80" -V -R http > http_out
- In another SSH session, run
curl www.exapmle.com/index.html
during the capture
curl www.example.com/index.html
Use a tshark
display filter to collect HTTP traffic and print only HTTP response codes.
- Use a
tshark
display filter to collect HTTP traffic and print only HTTP response codes. Store the capture command output in/root/http_response
.
tshark -Y http -Tfields -e http.response.code > http_resopnse
curl www.example.com/index.html curl www.example.com/error.html
- In a separate SSH session, run
curl www.example.com/index.html
and thencurl www.example.com/error.html
during the capture:
Use a tshark
capture filter that prints the IP address of hosts sending traffic to the test workstation on TCP port 22.
Use a tshark
capture filter that prints the IP address of hosts sending traffic to the test workstation on TCP port 22. Observe any IP addresses printed after several seconds.
tshark -f "tcp src port 22" -Tfields -e ip.dst
Add the IP address(es) to /root/ssh_ip
in a newline-delimited format.