<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.steffe.net/index.php?action=history&amp;feed=atom&amp;title=TCPdump</id>
	<title>TCPdump - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.steffe.net/index.php?action=history&amp;feed=atom&amp;title=TCPdump"/>
	<link rel="alternate" type="text/html" href="https://wiki.steffe.net/index.php?title=TCPdump&amp;action=history"/>
	<updated>2026-04-28T12:51:16Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://wiki.steffe.net/index.php?title=TCPdump&amp;diff=277&amp;oldid=prev</id>
		<title>Steffe: Created page with &quot;== Basic capture == Typical usage to capture network traffic going to a specific host:  sudo tcpdump host xxx.xxx.xxx.xxx -w output.pcap  == TLS capture == In case the traffic is encrypted using TLS or similar, you may be able to use the SSLKEYLOGFILE environment variable when running your client (or server) binary:  SSLKEYLOGFILE=sslkeylogfile.log ./testapplication.py If this produces a sslkeylogfile.log file, you can use that to decrypt the TLS traffic. Open wireshark...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.steffe.net/index.php?title=TCPdump&amp;diff=277&amp;oldid=prev"/>
		<updated>2025-02-18T11:55:38Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;== Basic capture == Typical usage to capture network traffic going to a specific host:  sudo tcpdump host xxx.xxx.xxx.xxx -w output.pcap  == TLS capture == In case the traffic is encrypted using TLS or similar, you may be able to use the SSLKEYLOGFILE environment variable when running your client (or server) binary:  SSLKEYLOGFILE=sslkeylogfile.log ./testapplication.py If this produces a sslkeylogfile.log file, you can use that to decrypt the TLS traffic. Open wireshark...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== Basic capture ==&lt;br /&gt;
Typical usage to capture network traffic going to a specific host:&lt;br /&gt;
 sudo tcpdump host xxx.xxx.xxx.xxx -w output.pcap&lt;br /&gt;
&lt;br /&gt;
== TLS capture ==&lt;br /&gt;
In case the traffic is encrypted using TLS or similar, you may be able to use the SSLKEYLOGFILE environment variable when running your client (or server) binary:&lt;br /&gt;
 SSLKEYLOGFILE=sslkeylogfile.log ./testapplication.py&lt;br /&gt;
If this produces a sslkeylogfile.log file, you can use that to decrypt the TLS traffic. Open wireshark and go to Edit - Preferences - Protocol - TLS -  (Pre)-Master-Secret log filename and specify your sslkeylogfile.log file. Then open your package dump and it will be decrypted.&lt;/div&gt;</summary>
		<author><name>Steffe</name></author>
	</entry>
</feed>