| - | Download the TCPDUMP.EXE |
| |
| - | Identify the interface to scan: |
| | o | netsh interface ip show interface "Local Area Connection" | findstr /i "index" |
|
| - | Before running the executable, I found I had to disable antivirus first because some can block this program from running. |
| - | Run the command: (Change the "-i" value to the appropriate Interface #) |
| | o | tcpdump -nn -v -i # -s 1500 -c 1 ether[20:2] == 0x2000 |
|
| - | The results may be similar to as follows |
| | tcpdump: listening on \Device\{GUID Displayed of Interface} |
| | 12:27:13.751768 CDPv2, ttl: 180s, checksum: 692 (unverified), length 284 |
| | Device-ID (0x01), length: 20 bytes: 'DEVICEID(CISCO SWITCH/CORE NAME)' |
| | Address (0x02), length: 13 bytes: IPv4 (1) CORE IP ADDRESS |
| | Port-ID (0x03), length: 4 bytes: 'BLADE/PORT#' |
| | Capability (0x04), length: 4 bytes: (0x0000000a): Transparent Bridge, L2 Switch |
| | Version String (0x05), length: 96 bytes: |
| | WS-C6506 Software, Version McpSW: 7.6(9) NmpSW: 7.6(9) |
| | Copyright (c) 1995-2004 by Cisco Systems |
| | |
| | Platform (0x06), length: 8 bytes: 'WS-C6506' |
| | VTP Management Domain (0x09), length: 9 bytes: 'DOMAINNAME' |
| | Native VLAN ID (0x0a), length: 2 bytes: 213 |
| | Duplex (0x0b), length: 1 byte: full |
| | AVVID trust bitmap (0x12), length: 1 byte: 0x00 |
| | AVVID untrusted ports CoS (0x13), length: 1 byte: 0x00 |
| | System Name (0x14), length: 7 bytes: 'CISCO SWITCH/CORE NAME' |
| | System Object ID (not decoded) (0x15), length: 10 bytes: |
| | 0x0000: 0608 2b06 0104 0109 052d |
| | Management Addresses (0x16), length: 13 bytes: IPv4 (1) CORE IP ADDRESS |
| | Physical Location (0x17), length: 31 bytes: 0x00/TEXT NAME OF LOCATION |
| | 1 packets captured |
| | 117 packets received by filter |
| | 0 packets dropped by kernel |