I tried this:
tcpdump -s 1500 -A -l -i eth0 '(port 6667) and (length > 74)' I need only the ascii part of it. How do I remove the rest?
I tried this:
tcpdump -s 1500 -A -l -i eth0 '(port 6667) and (length > 74)' I need only the ascii part of it. How do I remove the rest?
As Josh suggests, tcpflow can print just the TCP packet data to a file or STDOUT. You can pipe tcpdump to tcpflow like this:
tcpdump -i lo -l -w - port 23 | tcpflow -C -r - To only view one side of the conversation, you can use filters for tcpdump, e.g. dst port 23.
tcpflow as root? I feel the most elegant solution is just to ditch tcpdump. No pipes of any kind:
tcpflow -c port 6667 And that's it.
-D to print the data in hex, in case your traffic isn't textual. tcpflow -Dc host xx.xx.xx.x I'm not sure about the exact syntax for tcpdump... in fact, I have marked this question as a favorite because I would like to know! But as an alternative solution, you could try using tcpflow instead. It works essentially the same way, but it prints ASCII output much better; it excluded the headers and prints packets sequentially as a flow, so it's easier to read and follow at times than tcpdump.
A quick and dirty way to do this is to filter the output through strings:
tcpdump -nli eth0 '(port 6667) and (length > 74)' -s 0 -w - | strings Sometimes you don't have other tools and for a quick peek into the payload this is enough. It's no good if you need the exact payload for injection or an exact analysis, of course.
If you need only the ASCII part you can use: tcpdump -s 1500 -A -l -i eth0 '(port 6667) and (length > 74)'|sed 's/\.//g' or with ngrep: ngrep -d eth0 -lq . '(port 6667) and (length > 74)' |sed -rn '/^ /s/\.//gp'
I had the same problem last week - I used the wireshark gui instead and did a "copy readable ascii" for the interesting packets.
I was (successfully) trying to pin down a problem with a http request to a web-service and its XML-answer.