Makes output from the tcpdump program easier to read and parse. This software is now redundant as ASCII support has since been added to tcpdump in version 3.8. Features: - Coloured console output - Directly accepts tcpdump options (including parsing from packet files) - Fully customisable output Requirements: - Linux operating system - Perl installed - tcpdump program installed - Privileges in order to run tcpdump For help, run the following command: ./sniff -h Sniff options should be placed before the double dash (--) and tcpdump options should be placed after. Examples of how to use sniff: - Capture all incoming FTP packets on eth1 without using colour: ./sniff -c -- -i eth1 tcp port 21 - Real-time logging to a CSV file: ./sniff -e" -n, -s -t0 -c > /tmp/dump.csv - Converting a tcpdump dump file into CSV format: ./sniff -e" -n, -s -t0 -c -- -r /tmp/dump.txt > /tmp/dump.csv
Common questions about Sniff including features, pricing, alternatives, and user reviews.
Sniff is Makes output from the tcpdump program easier to read and parse. It is a Network Security solution designed to help security teams with Linux, Packet Capture, Network Monitoring.
Sniff is a free Network Security tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://www.thedumbterminal.co.uk/software/sniff.html for download and installation instructions.
Popular alternatives to Sniff include:
Compare these tools and more at https://cybersectools.com/categories/network-security
Sniff is for security teams and organizations that need Linux, Packet Capture, Network Monitoring. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Network Security tools can be found at https://cybersectools.com/categories/network-security
Network detection and response platform with IDS, NSM, and threat intel.
Modular network observability platform for packet brokering, capture & analytics.
Packet broker, capture & observability suite for hybrid network security.