Termshark is a terminal user-interface for tshark, inspired by Wireshark.
If you’re debugging on a remote machine with a large pcap and no desire to scp it back to your desktop, it can help!
Features
Also Read : HostHunter : To Discover Hostnames Using OSINT
Installation (FreeBSD)
It is in the FreeBSD ports tree! To install the package, run:
pkg install termshark
To build/install the port, run:
cd /usr/ports/net/termshark/ && make install clean
Building
It uses Go modules, so it’s best to compile with Go 1.11 or higher. Set GO111MODULE=on then run:
go get github.com/gcla/termshark/cmd/termshark
Then add ~/go/bin/ to your PATH.
For all packet analysis, it depends on tshark from the Wireshark project. Make sure tshark is in your PATH.
Quick Start
Inspect a local pcap:
termshark -r test.pcap
Capture ping packets on interface eth0:
termshark -i eth0 icmp
Run termshark -h for options.
Dependencies
It depends on these open-source packages:
Note that tshark is a run-time dependency, and must be in your PATH for it to function. Version 1.10.2 or higher is required (approx 2013).
Credits: Graham Clark
Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
If you are working with Linux or writing bash scripts, one of the most common…
What is a bash case statement? A bash case statement is a way to control…
Why Do We Check Files in Bash? When writing a Bash script, you often work…