Difference between revisions of "SIP Capture with TCPDump"
From Kolmisoft Wiki
Jump to navigationJump to search
(Created page with '<br><br> =About= Tcpdump, a powerful command-line packet analyzer already installed and working on your system by default. <br><br> =How to use it?= Login to your server and…') |
m |
||
(5 intermediate revisions by the same user not shown) | |||
Line 2: | Line 2: | ||
=About= | =About= | ||
Tcpdump, a powerful command-line packet analyzer already installed and working on your system by default. | Tcpdump, a powerful command-line packet analyzer already installed and working on your system by default. | ||
<br><br> | <br><br> | ||
=How to use it?= | ==How to use it?== | ||
<br> | |||
Login to your server and put this command into terminal: | Login to your server over [http://wiki.kolmisoft.com/index.php/What_is_SSH%3F ssh] and put this command into terminal: | ||
tcpdump -i eth0 -n -s 0 port 5060 -vvv -w /home/capture_file_name | tcpdump -i eth0 -n -s 0 port 5060 -vvv -w /home/capture_file_name | ||
Line 13: | Line 11: | ||
Packets will be saved to directory /home/capture_file_name | Packets will be saved to directory /home/capture_file_name | ||
You can send captured file capture.pcap from your server and open with Wireshark GUI and analyse the packets. | You can send captured file capture.pcap from your server to your PC and open with Wireshark GUI and analyse the packets. | ||
<br><br> | <br><br> | ||
=Full command explaining= | ==Full command explaining== | ||
<br> | |||
You can find full command | You can find full command explanation here: | ||
http://nil.uniza.sk/network-security/analyzers/using-tcpdump-sip-diagnostic | |||
See also | ===See also=== | ||
* [[How to capture packets using wireshark]] | * [[How to capture packets using wireshark]] |
Latest revision as of 05:28, 3 May 2012
About
Tcpdump, a powerful command-line packet analyzer already installed and working on your system by default.
How to use it?
Login to your server over ssh and put this command into terminal:
tcpdump -i eth0 -n -s 0 port 5060 -vvv -w /home/capture_file_name
Packets will be saved to directory /home/capture_file_name
You can send captured file capture.pcap from your server to your PC and open with Wireshark GUI and analyse the packets.
Full command explaining
You can find full command explanation here:
http://nil.uniza.sk/network-security/analyzers/using-tcpdump-sip-diagnostic