Termshark is a terminal user-interface for tshark, inspired by Wireshark.
If you’re debugging on a remote machine with a large pcap and no desire to scp it back to your desktop, it can help!
Features
Also Read : HostHunter : To Discover Hostnames Using OSINT
Installation (FreeBSD)
It is in the FreeBSD ports tree! To install the package, run:
pkg install termshark
To build/install the port, run:
cd /usr/ports/net/termshark/ && make install clean
Building
It uses Go modules, so it’s best to compile with Go 1.11 or higher. Set GO111MODULE=on then run:
go get github.com/gcla/termshark/cmd/termshark
Then add ~/go/bin/ to your PATH.
For all packet analysis, it depends on tshark from the Wireshark project. Make sure tshark is in your PATH.
Quick Start
Inspect a local pcap:
termshark -r test.pcap
Capture ping packets on interface eth0:
termshark -i eth0 icmp
Run termshark -h for options.
Dependencies
It depends on these open-source packages:
Note that tshark is a run-time dependency, and must be in your PATH for it to function. Version 1.10.2 or higher is required (approx 2013).
Credits: Graham Clark
Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…
Ubuntu users often download software directly from developer websites instead of using the default app…
Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…