F5 DUMP‎ > ‎

TCPdump and SSLdump

posted 10 Sept 2017, 09:57 by Donald Ross   [ updated 25 Jan 2018, 04:56 ]

***See if tcpdump is running:***
ps -e | grep tcpdump

***Stop tcpdump process:***
kill 4222

***clears buffers***
tcpdump -s -ni 0.0 proto 3

***Find self IPs***
list net self

***Find snat pool***
list ltm virtual

ltm virtual web1_dc1_443_vs {
    ip-protocol tcp
    ip-protocol tcp
    persist {
        cookie {
            default yes
    pool web1_dc1_443_pool
    profiles {
        http { }
        tcp { }
        test { }
        web1_dc1_443_client_ssl {
            context clientside
        web1_dc1_443_server_ssl {
            context serverside
    rules {
    source-address-translation {
        pool snat-pool-south
        type snat
    translate-address enabled
    translate-port enabled
    vs-index 19

list ltm snatpool snat-pool-south
ltm snatpool snat-pool-south {
    members {

tcpdump -i 0.0 -vvv -nn -w /shared/tmp/$(date +%Y-%m-%d_%H:%M:%S)lab100.pcap -C100 -W10 'port 443 and not (host or host'

Don’t convert protocol and port numbers etc. to names either.

-i interface
Listen on interface

Even more verbose output.

w file
Write the raw packets to file rather than parsing and printing them out.
-C file_size
Before writing a raw packet to a savefile, check whether the file is currently larger than file_size and, if so, close the current savefile and open a new one. Savefiles after the first savefile will have the name specified with the -w flag, with a number after it, starting at 1 and continuing upward. The units of file_size are millions of bytes (1,000,000 bytes, not 1,048,576 bytes).
Used in conjunction with the -C option, this will limit the number of files created to the specified number, and begin overwriting files from the beginning, thus creating a 'rotating' buffer. In addition, it will name the files with enough leading 0s to support the maximum number of files, allowing them to sort correctly.

With the "p" flag you can set a filter on a clientside parameter, i.e. client IP or virtual server IP and the trace will include the related serverside traffic as well, SNATed or not.
-s 0 parameter for packet size specification. Set it to "0" to capture the full packet length. 

***displays all of the SSL record messages found in the tcpdump capture file***
ssldump -nr /shared/tmp/$(date +%Y-%m-%d_%H:%M:%S)lab100.pcap


if you are trying to use the private key in wireshark and then decrypt the conversation it will not work if you are using DH keys.
with DH the session key is never be transmitted so you won't be able to intercept it and use it for decryption in wireshark

 tcpdump -i 0.0:nnnp -vvv -s 0 host

ssldump Anr -i 0.0