'\" t .\" Title: udpdump .\" Author: [see the "AUTHOR(S)" section] .\" Generator: Asciidoctor 2.0.20 .\" Date: 2024-04-26 .\" Manual: \ \& .\" Source: \ \& .\" Language: English .\" .TH "UDPDUMP" "1" "2024-04-26" "\ \&" "\ \&" .ie \n(.g .ds Aq \(aq .el .ds Aq ' .ss \n[.ss] 0 .nh .ad l .de URL \fI\\$2\fP <\\$1>\\$3 .. .als MTO URL .if \n[.g] \{\ . mso www.tmac . am URL . ad l . . . am MTO . ad l . . . LINKSTYLE blue R < > .\} .SH "NAME" udpdump \- Provide a UDP receiver that gets packets from network devices (like Aruba routers) and exports them in PCAP format. .SH "SYNOPSIS" .sp \fBudpdump\fP [\~\fB\-\-help\fP\~] [\~\fB\-\-version\fP\~] [\~\fB\-\-extcap\-interfaces\fP\~] [\~\fB\-\-extcap\-dlts\fP\~] [\~\fB\-\-extcap\-interface\fP=\~] [\~\fB\-\-extcap\-config\fP\~] [\~\fB\-\-capture\fP\~] [\~\fB\-\-fifo\fP=\~] [\~\fB\-\-port\fP=\~] [\~\fB\-\-payload\fP=\~] .SH "DESCRIPTION" .sp \fBudpdump\fP is a extcap tool that provides a UDP receiver that listens for exported datagrams coming from any source (like Aruba routers) and exports them in PCAP format. This provides the user two basic functionalities: the first one is to have a listener that prevents the localhost to send back an ICMP port\-unreachable packet. The second one is to strip out the lower layers (layer 2, IP, UDP) that are useless (are used just as export vector). The format of the exported datagrams are EXPORTED_PDU, as specified in .URL "https://gitlab.com/wireshark/wireshark/\-/raw/master/epan/exported_pdu.h" "" "" .SH "OPTIONS" .sp \-\-help .RS 4 Print program arguments. .RE .sp \-\-version .RS 4 Print program version. .RE .sp \-\-extcap\-interfaces .RS 4 List available interfaces. .RE .sp \-\-extcap\-interface= .RS 4 Use specified interfaces. .RE .sp \-\-extcap\-dlts .RS 4 List DLTs of specified interface. .RE .sp \-\-extcap\-config .RS 4 List configuration options of specified interface. .RE .sp \-\-capture .RS 4 Start capturing from specified interface save saved it in place specified by \-\-fifo. .RE .sp \-\-fifo= .RS 4 Save captured packet to file or send it through pipe. .RE .sp \-\-port= .RS 4 Set the listener port. Port 5555 is the default. .RE .sp \-\-payload= .RS 4 Set the payload of the exported PDU. Default: data. .RE .SH "EXAMPLES" .sp To see program arguments: .sp .if n .RS 4 .nf .fam C udpdump \-\-help .fam .fi .if n .RE .sp To see program version: .sp .if n .RS 4 .nf .fam C udpdump \-\-version .fam .fi .if n .RE .sp To see interfaces: .sp .if n .RS 4 .nf .fam C udpdump \-\-extcap\-interfaces .fam .fi .if n .RE .sp .B Example output .br .sp .if n .RS 4 .nf .fam C interface {value=udpdump}{display=UDP Listener remote capture} .fam .fi .if n .RE .sp To see interface DLTs: .sp .if n .RS 4 .nf .fam C udpdump \-\-extcap\-interface=udpdump \-\-extcap\-dlts .fam .fi .if n .RE .sp .B Example output .br .sp .if n .RS 4 .nf .fam C dlt {number=252}{name=udpdump}{display=Exported PDUs} .fam .fi .if n .RE .sp To see interface configuration options: .sp .if n .RS 4 .nf .fam C udpdump \-\-extcap\-interface=udpdump \-\-extcap\-config .fam .fi .if n .RE .sp .B Example output .br .sp .if n .RS 4 .nf .fam C arg {number=0}{call=\-\-port}{display=Listen port}{type=unsigned}{range=1,65535}{default=5555}{tooltip=The port the receiver listens on} .fam .fi .if n .RE .sp To capture: .sp .if n .RS 4 .nf .fam C udpdump \-\-extcap\-interface=randpkt \-\-fifo=/tmp/randpkt.pcapng \-\-capture .fam .fi .if n .RE .if n .sp .RS 4 .it 1 an-trap .nr an-no-space-flag 1 .nr an-break-flag 1 .br .ps +1 .B Note .ps -1 .br .sp To stop capturing CTRL+C/kill/terminate the application. .sp .5v .RE .SH "SEE ALSO" .sp wireshark(1), tshark(1), dumpcap(1), extcap(4) .SH "NOTES" .sp \fBudpdump\fP is part of the \fBWireshark\fP distribution. The latest version of \fBWireshark\fP can be found at \c .URL "https://www.wireshark.org" "" "." .sp HTML versions of the Wireshark project man pages are available at .URL "https://www.wireshark.org/docs/man\-pages" "" "." .SH "AUTHORS" .sp .B Original Author .br Dario Lombardo