tcpdump
Packet Capture
tcpdump tcp dst [ip] [port] and tcp dst [ip] [port]
tcpdump tcp dst 192.168.1.7 80 and tcp dst 10.5.5.252 21
Open a PCAP
tcpdump -r password_cracking_filtered.pcap
Cut only IP addresses from the traffic
tcpdump -r password_cracking_filtered.pcap | awk-‐F" " '{print $3}' | sort -‐u | head
Filter Destination or Source
tcpdump -n src host <ip> -r password_cracking_filtered.pcap
tcpdump -n dst host <ip> ‐r password_cracking_filtered.pcap
tcpdump -n port <port> -r password_cracking_filtered.pcap
tcpdump -A -n 'tcp[13] = 24' -‐r password_cracking_filtered.pcap

Other important flags
-nn stop DNS and service names lookup (performance+)
-X and -XX can be used to print each packet in hex and ascii
-A print packets in ASCII
-S to print absolute sequence numbers
-s can be used to increase the default snap-length from 262144 to higher
-s 0 to capture full packet