<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="FeedCreator 1.8" -->
<?xml-stylesheet href="https://techdoku.nogafam.es/lib/exe/css.php?s=feed" type="text/css"?>
<rdf:RDF
    xmlns="http://purl.org/rss/1.0/"
    xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
    xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
    xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel rdf:about="https://techdoku.nogafam.es/feed.php">
        <title>NoBIGTech Wiki Técnico - docu:csheet:ofsec</title>
        <description></description>
        <link>https://techdoku.nogafam.es/</link>
        <image rdf:resource="https://techdoku.nogafam.es/lib/exe/fetch.php?media=wiki:dokuwiki.svg" />
       <dc:date>2026-05-01T02:38:19+00:00</dc:date>
        <items>
            <rdf:Seq>
                <rdf:li rdf:resource="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:pcap&amp;rev=1584826214&amp;do=diff"/>
                <rdf:li rdf:resource="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:wshark_live_cap_ssh&amp;rev=1598366572&amp;do=diff"/>
                <rdf:li rdf:resource="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:wshark_tls_client_hello&amp;rev=1645129980&amp;do=diff"/>
            </rdf:Seq>
        </items>
    </channel>
    <image rdf:about="https://techdoku.nogafam.es/lib/exe/fetch.php?media=wiki:dokuwiki.svg">
        <title>NoBIGTech Wiki Técnico</title>
        <link>https://techdoku.nogafam.es/</link>
        <url>https://techdoku.nogafam.es/lib/exe/fetch.php?media=wiki:dokuwiki.svg</url>
    </image>
    <item rdf:about="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:pcap&amp;rev=1584826214&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-03-21T21:30:14+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>pcap</title>
        <link>https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:pcap&amp;rev=1584826214&amp;do=diff</link>
        <description>Dumpcap common snippets



This post contains some dumpcap snippets for capturing packets in the pcap format to be analized later on wireshark.


dumpcap -f &quot;ether host 00:22:68:18:b9:13 or broadcast&quot; -w pentest -b filesize:10000</description>
    </item>
    <item rdf:about="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:wshark_live_cap_ssh&amp;rev=1598366572&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2020-08-25T14:42:52+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wshark_live_cap_ssh</title>
        <link>https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:wshark_live_cap_ssh&amp;rev=1598366572&amp;do=diff</link>
        <description>Capture live packets from server using Wireshark and SSH tunnel



In case you want to capture directly over an SSH tunnel on your Wireshark GUI tool, you can use ssh tunneling and netcat to do so, by:


# in one terminal, run
nc -lp 4567 | sudo wireshark -k -i -

# on another terminal, run
ssh -R 127.1:4567:127.1:4567 your-server.net
\__ tcpdump -iany -nn -w - | nc 127.0.0.1 4567</description>
    </item>
    <item rdf:about="https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:wshark_tls_client_hello&amp;rev=1645129980&amp;do=diff">
        <dc:format>text/html</dc:format>
        <dc:date>2022-02-17T20:33:00+00:00</dc:date>
        <dc:creator>Anonymous (anonymous@undisclosed.example.com)</dc:creator>
        <title>wshark_tls_client_hello</title>
        <link>https://techdoku.nogafam.es/doku.php?id=docu:csheet:ofsec:wshark_tls_client_hello&amp;rev=1645129980&amp;do=diff</link>
        <description>Filter tls client hello on Wireshark

In case you want to view TLS client hello packets (to view websites visited), you can do so by using this filter in Wireshark GUI




tls and tls.handshake.type == 1</description>
    </item>
</rdf:RDF>
