Skip to content

Instantly share code, notes, and snippets.

View katgalraghu's full-sized avatar

katgalraghu

  • Peak XV Networks Pvt Ltd
  • Bangalore
  • 08:17 (UTC +05:30)
View GitHub Profile
@katgalraghu
katgalraghu / VMware Workstation KEYS
Created April 5, 2025 02:27 — forked from dapize/VMware Workstation KEYS
key VMware® Workstation 16 Player (16.1.1 build-17801498)
VMware® Workstation 16 Player (16.1.1 build-17801498)
FA1M0-89YE3-081TQ-AFNX9-NKUC0
VMware Workstation Pro v16 Serial Key - DiamondMonday
ZF3R0-FHED2-M80TY-8QYGC-NPKYF
YF390-0HF8P-M81RQ-2DXQE-M2UT6
@katgalraghu
katgalraghu / curl.md
Created July 2, 2023 16:04 — forked from tuxfight3r/curl.md
curl POST examples

Common Options

-#, --progress-bar Make curl display a simple progress bar instead of the more informational standard meter.

-b, --cookie <name=data> Supply cookie with request. If no =, then specifies the cookie file to use (see -c).

-c, --cookie-jar <file name> File to save response cookies to.

tcpdump examples

See the list of interfaces on which tcpdump can listen:

tcpdump -D

Listen on interface eth0:

tcpdump -i eth0

Listen on any available interface (cannot be done in promiscuous mode. Requires Linux kernel 2.2 or greater):

Tcpdump is a CLI tool to capture raw network packets. This is useful for various forms of network troubleshooting. This cheat sheet covers all the basic and advanced options for tcpdump.

Tcpdump cheat sheet

how-to-use-tcpdump

Tcpdump command is a famous network packet analyzing tool that is used to display TCP\IP & other network packets being transmitted over the network attached to the system on which tcpdump has been installed. Tcpdump uses libpcap library to capture the network packets & is available on almost all Linux/Unix flavors.

Capture ICMP Packets With Tcpdump

@katgalraghu
katgalraghu / tcpdump cheat sheet
Created October 23, 2022 03:58 — forked from githubfoam/tcpdump cheat sheet
tcpdump cheat sheet
----------------------------------------------------------------------------------------------------
tcpdump -ni tap55ec3c7f-91 ip6 #locate the ICMPv6 packets
tcpdump -s0 -n -i any -w /tmp/$(hostname)-smbtrace.pcap #if the SMB client or SMB server is a Unix host,Troubleshooting Server Message Block (SMB)
tcpdump -D #Print the list of the network interfaces available on the system and on which tcpdump can capture packet
tcpdump -X -vvv -n -i eth0
#client-side traffic to a specific SSL virtual server listening on the VLAN external
# filters on the virtual server's IP address and port
@katgalraghu
katgalraghu / tcp_flags.txt
Created October 23, 2022 03:56 — forked from tuxfight3r/tcp_flags.txt
tcpdump - reading tcp flags
##TCP FLAGS##
Unskilled Attackers Pester Real Security Folks
==============================================
TCPDUMP FLAGS
Unskilled = URG = (Not Displayed in Flag Field, Displayed elsewhere)
Attackers = ACK = (Not Displayed in Flag Field, Displayed elsewhere)
Pester = PSH = [P] (Push Data)
Real = RST = [R] (Reset Connection)
Security = SYN = [S] (Start Connection)