... | ... | @@ -24,7 +24,7 @@ Another option is to observe the traffic as it flows. For that you can use tools |
|
|
sudo tshark -i <interface_name>
|
|
|
```
|
|
|
|
|
|
### *Tcpdump*:
|
|
|
### *Tcpdump*
|
|
|
|
|
|
Similarly, and if you prefer, you can use `tcpdump` (also already installed in the VM). To capture traffic with tcpdump run (shows link-layer information and does not resolve addresses):
|
|
|
|
... | ... | |