A tcpdump Tutorial with Examples

50 ways to isolate traffic for cybersecurity, network administration, and other technical roles

ip header 2021

The TCP/IP Header

UPDATED: August 27, 2023

Table of Contents

  1. Introduction

    • Overview of tcpdump

    • Basics of traffic isolation

  2. Getting Started with tcpdump

    • Viewing traffic on an interface

    • Viewing HTTPS traffic

    • Limiting packets

  3. Information Security Examples

    • Capturing credentials

    • Monitoring suspicious domain traffic

    • SMB Traffic

    • Capturing TCP RESET-ACK Packets

  4. Filtering & Searching Traffic

    • Filtering by IP

    • Filtering by Source/Destination

    • Filtering by Network

    • Filtering by Port

  5. Common Options in tcpdump

    • Overview of key options

  6. Advanced Techniques

    • Combinations of filters: AND, OR, EXCEPT

    • Isolating TCP Flags

    • Raw output view

  7. Everyday Recipe Examples

    • Capturing HTTP User Agents

    • Identifying cleartext passwords

    • Finding traffic with the "Evil Bit"

  8. Reading/Writing to PCAP files

    • Writing to a file

    • Reading from a file

tcpdump is the world’s premier network analysis tool—combining both power and simplicity into a single command-line interface.

This guide will show you how to isolate traffic in multiple ways—including by IP, port, protocol, or application to help you find what you’re looking for.

Traffic isolation examples

Just see what’s going on, by looking at what’s hitting your interface.

tcpdump -i eth0

Or get all interfaces with -i any. Or here’s a basic command that will get us HTTPS traffic:

tcpdump -nnSX port 443
04:45:40.573686 IP > Flags [.], ack 
278239097, win 28, options [nop,nop,TS val 939752277 ecr 1208058112], length 0
    0x0000:  4500 0034 0014 0000 2e06 c005 4e8e d16e  E..4........N..n
    0x0010:  ac1e 0090 6c86 01bb 8e0a b73e 1095 9779  ....l......>...y
    0x0020:  8010 001c d202 0000 0101 080a 3803 7b55  ............8.{U
    0x0030:  4801 8100

You can get a single packet with -c 1, or n number with -c n.

This showed some HTTPS traffic, with a hex display visible on the right portion of the output (alas, it’s encrypted). Just remember—when in doubt, run the command above with the port you’re interested in, and you should be on your way.

Add -A to see the output in ASCII.

Now that you are able to get basic traffic, let’s step through numerous examples that you are likely to need during your job in networking, security, or as any type of PacketWizard™.

Information Security Examples

One of the fields that uses tcpdump the most is information security. Here are a number of useful examples that come in handy in cybersecurity.

Capture Credentials in Plain Text

Potential passwords and usernames in unencrypted traffic (HTTP, FTP, TELNET). This could identify insecure protocols in use or leaked credentials.

tcpdump -A -i eth0 'port http or port ftp or port telnet' | grep -i 'user\|pass\|login'

Monitor Traffic to a Suspicious Domain

Monitor traffic to a known malicious domain or an untrusted site.

tcpdump -i eth0 dst host suspicious.com

Capture Traffic from a Specific IP Range

Useful for identifying traffic originating from or destined to specific countries or organizations.

tcpdump src net {IP_RANGE_OF_COUNTRY}

Monitor SMB Traffic

Capture Server Message Block (SMB) traffic on port 445. SMB traffic can indicate file sharing or potential vulnerabilities like the WannaCry exploit.

tcpdump -nn -i eth0 port 445

Capture TCP RESET-ACK Packets

Identify packets that are both RESET and ACK, which could be indicative of certain kinds of attacks or misconfigurations.

tcpdump 'tcp[13] = 41'

One of the most common queries, using host, you can see traffic that’s going to or from

Expression Types include host, net, and port.

Types:host, net, and port. Protocols:tcp, udp, icmp, and many more.

tcpdump host
06:20:25.593207 IP > one.one.one.one.domain: 
12790+ A? google.com. 
(28) 06:20:25.594510 IP one.one.one.one.domain > 
12790 1/0/0 A (44)

If you only want to see traffic in one direction or the other, you can use src and dst.

tcpdump src dst

To find packets going to or from a particular network or subnet, use the net option.

Directions are src and dst.

You can combine this with the src and dst options as well.

tcpdump net

Hex output is useful when you want to see the content of the packets in question, and it’s often best used when you’re isolating a few candidates for closer scrutiny.

tcpdump -c 1 -X icmp
single icmp

A single ICMP packet captured by tcpdump

Possible protocols include




You can find specific port traffic by using the port option followed by the port number.

tcpdump  port 3389
tcpdump  src port 1025

Common Options:

  • -nn : Don’t resolve hostnames or port names

  • -S : Get the entire packet.

  • -X : Get hex output.

If you’re looking for one particular kind of traffic, you can use tcp, udp, icmp, and many others as well.

tcpdump icmp

You can also find all IP6 traffic using the protocol option.

tcpdump ip6

You can also use a range of ports to find traffic.

tcpdump  portrange 21-23

If you’re looking for packets of a particular size you can use these options. You can use less, greater, or their associated symbols that you would expect from mathematics.

tcpdump 'len > 32 and len < 64'

It’s often useful to save packet captures into a file for analysis in the future. These files are known as PCAP (PEE-cap) files, and they can be processed by hundreds of different applications, including network analyzers, intrusion detection systems, and of course by tcpdump itself. Here we’re writing to a file called capture_file using the -w switch.

tcpdump  port 80 -w capture_file

You can read PCAP files by using the -r switch. Note that you can use all the regular commands within tcpdump while reading in a file; you’re only limited by the fact that you can’t capture and process what doesn’t exist in the file already.

tcpdump  -r capture_file

Now that we’ve seen what we can do with the basics through some examples, let’s look at some more advanced stuff.

More options

Here are some additional ways to tweak how you call tcpdump.

  • -X : Show the packet’s contents in both hex and ASCII.

  • -XX : Same as -X, but also shows the ethernet header.

  • -D : Show the list of available interfaces

  • -l : Line-readable output (for viewing as you save, or sending to other commands)

  • -q : Be less verbose (more quiet) with your output.

  • -t : Give human-readable timestamp output.

  • -tttt : Give maximally human-readable timestamp output.

  • -i eth0 : Listen on the eth0 interface.

  • -vv : Verbose output (more v’s gives more output).

  • -c : Only get x number of packets and then stop.

  • -s : Define the snaplength (size) of the capture in bytes. Use -s0 to get everything, unless you are intentionally capturing less.

  • -S : Print absolute sequence numbers.

  • -e : Get the ethernet header as well.

  • -q : Show less protocol information.

  • -E : Decrypt IPSEC traffic by providing an encryption key.

It’s All About the Combinations

Being able to do these various things individually is powerful, but the real magic of tcpdump comes from the ability to combine options in creative ways in order to isolate exactly what you’re looking for. There are three ways to do combinations, and if you’ve studied programming at all they’ll be pretty familiar to you.

  1. AND: and or &&

  2. OR: or or ||

  3. EXCEPT: not or !

Use this combination to see verbose output, with no resolution of hostnames or port numbers, using absolute sequence numbers, and showing human-readable timestamps.

tcpdump -ttnnvvS

Here are some examples of combined commands.

Let’s find all traffic from going to any host on port 3389.

tcpdump -nnvvS src and dst port 3389

Let’s look for all traffic coming from 192.168.x.x and going to the 10.x or 172.16.x.x networks, and we’re showing hex output with no hostname resolution and one level of extra verbosity.

tcpdump -nvX src net and dst net or

This will show us all traffic going to that is not ICMP.

tcpdump dst and src net and not icmp

This will show us all traffic from a host that isn’t SSH traffic (assuming default port usage).

tcpdump -vv src mars and not dst port 22

As you can see, you can build queries to find just about anything you need. The key is to first figure out precisely what you’re looking for and then to build the syntax to isolate that specific type of traffic.

Keep in mind that when you’re building complex queries you might have to group your options using single quotes. Single quotes are used in order to tell tcpdump to ignore certain special characters—in this case below the “( )” brackets. This same technique can be used to group using other expressions such as host, port, net, etc.

tcpdump 'src and (dst port 3389 or 22)'

You can also use filters to isolate packets with specific TCP flags set.

Isolate TCP RST flags.

The filters below find these various packets because tcp[13] looks at offset 13 in the TCP header, the number represents the location within the byte, and the !=0 means that the flag in question is set to 1, i.e. it’s on.

tcpdump 'tcp[13] & 4!=0'tcpdump 'tcp[tcpflags]  == tcp-rst'

Isolate TCP SYN flags.

tcpdump 'tcp[13] & 2!=0'tcpdump 'tcp[tcpflags]  == tcp-syn'

Isolate packets that have both the SYN and ACK flags set.

tcpdump 'tcp[13]=18'

Only the PSH, RST, SYN, and FIN flags are displayed in tcpdump‘s flag field output. URGs and ACKs are displayed, but they are shown elsewhere in the output rather than in the flags field.

Isolate TCP URG flags.

tcpdump 'tcp[13] & 32!=0'tcpdump 'tcp[tcpflags]  == tcp-urg'

Isolate TCP ACK flags.

tcpdump 'tcp[13] & 16!=0' tcpdump 'tcp[tcpflags]  == tcp-ack'

Isolate TCP PSH flags.

tcpdump 'tcp[13] & 8!=0' tcpdump 'tcp[tcpflags]  == tcp-push'

Isolate TCP FIN flags.

tcpdump 'tcp[13] & 1!=0'tcpdump 'tcp[tcpflags]  == tcp-fin'

Because tcpdump can output content in ASCII, you can use it to search for cleartext content using other command-line tools like grep.

Finally, now that we the theory out of the way, here are a number of quick recipes you can use for catching various kinds of traffic.

tcpdump 'tcp[13] = 6'

The -l switch lets you see the traffic as you’re capturing it, and helps when sending to commands like grep.

tcpdump -vvAls0 | grep 'User-Agent:'
tcpdump -vvAls0 | grep 'GET'
tcpdump -vvAls0 | grep 'Host:'
tcpdump -vvAls0 | grep 'Set-Cookie|Host:|Cookie:'

This one works regardless of what port the connection comes in on, because it’s getting the banner response.

tcpdump 'tcp[(tcp[12]>>2):4] = 0x5353482D'
tcpdump -vvAs0 port 53
tcpdump -vvAs0 port ftp or ftp-data
tcpdump -vvAs0 port 123
tcpdump port http or port ftp or port smtp or port imap or port pop3 or port telnet -lA | egrep -i -B5 
'pass=|pwd=|log=|login=|user=|username=|pw=|passw=|passwd=|password=|pass:|user:|username:|password:|login:|pass |user ' 

There’s a bit in the IP header that never gets set by legitimate applications, which we call the “Evil Bit”. Here’s a fun filter to find packets where it’s been toggled.

tcpdump 'ip[6] & 128 != 0'


Here are the takeaways.

  1. tcpdump is a valuable tool for anyone looking to get into networking or information security.

  2. The raw way it interfaces with traffic, combined with the precision it offers in inspecting packets make it the best possible tool for learning TCP/IP.

  3. Protocol Analyzers like Wireshark are great, but if you want to truly master packet-fu, you must become one with tcpdump first.

Well, this primer should get you going strong, but the man page should always be handy for the most advanced and one-off usage scenarios. I truly hope this has been useful to you, and feel free to contact me if you have any questions.


  1. I’m currently (sort of) writing a book on tcpdump for No Starch Press.

  2. The leading image is from SecurityWizardry.com.

  3. Some of the isolation filters borrowed from Sébastien Wains.

  4. Thanks to Peter at hackertarget.com for inspiration on the new table of contents (simplified), and also for some additional higher-level protocol filters added in July 2018.

  5. An anagram for the TCP flags is:  Unskilled Attackers Pester Real Security Folk.