This document provides an overview of the tcpdump network traffic analysis tool. It discusses how tcpdump can be used to capture and filter network packets, highlights some common workflows and options, describes the underlying Berkeley Packet Filter (BPF) architecture, and addresses some common issues and questions. The key points are:
- Tcpdump allows users to capture and filter live network traffic or read from saved packet capture (pcap) files.
- Common options include -n to disable DNS resolution for faster display, -s1500 to set the snapshot length, -X to print packets in hex/ascii, and various filters like port 80.
- Workflows include online analysis of live traffic or offline analysis of saved captures