

In similar lines, let’s try to generate and capture the SSH packets from the loopback interface: $ ssh localhostĠ6:30:52.419160 IP localhost.43398 > localhost. Simple to use Usage You will need administrator privileges to run RawCap. Although this tutorial describes tcpdump. In the first session, we initiate the packet capture on the loopback interface, then we will execute a simple ping to localhost: $ ping -c 1 localhostĠ6:24:36.453843 IP localhost > localhost: ICMP echo request, id 19865, seq 1, length 64Ġ6:24:36.453854 IP localhost > localhost: ICMP echo reply, id 19865, seq 1, length 64 Begin in a new terminal window by installing tcpdump, a command-line tool for capturing and displaying network traffic. If we want to monitor the packets from the specific interface, we can use option -i.įor the sake of demonstration, let’s open two PuTTY sessions.


Tcpdump has many options to parse, search and filter the network interface traffic.
