Dumpcap识别与过滤恶意流量的正确方式
核心结论与定位
用捕获过滤器缩小可疑流量
sudo dumpcap -i eth0 -w capture.pcap -f "tcp port 80 or tcp port 443"sudo dumpcap -i eth0 -w capture.pcap -f "host 192.168.1.100"sudo dumpcap -i eth0 -w output.pcap -f "tcp and host 192.168.1.100"sudo dumpcap -i eth0 -w dns.pcap -f "port 53"echo "tcp and host 192.168.1.100" > myfilter && sudo dumpcap -i eth0 -w out.pcap -F myfilter识别与深入分析的组合方案
tshark -r capture.pcap -Y "http.request or dns.qry.name contains "malicious""实用命令清单
sudo dumpcap -i any -w all.pcapsudo dumpcap -i eth0 -w session.pcap -a filesize:100 -a files:10sudo dumpcap -i eth0 -w web.pcap -f "tcp port 80 or tcp port 443 and host 192.168.1.100"sudo dumpcap -i eth0 -w dns.pcap -f "port 53"echo "tcp and host 10.0.0.5" > f.txt && sudo dumpcap -i eth0 -w out.pcap -F f.txttshark -r capture.pcap -Y "http or dns"注意事项