Tool 9: Sniff and display Ethernet addresses

Description:

  This tool sniffs packets, and tries to decode them. Then, Ethernet
  address associated to decoded IP address is displayed.
  It uses ARP, RARP and IP to obtain this information.
  Please note, this will be inaccurate if IP address is outside the
  Ethernet LAN. It works well in all other cases.
  
  Parameter --device indicates on which device to sniff. Please note
  that under some systems, such as Windows, sniffing on some devices is
  not supported.
  Parameter --filter defines the sniff filter. It permits to restrict
  captured packets. This kind of filter is named a BPF or pcap filter.
  Basic elements of a filter are:
    host 1.2.3.4
    net 192.168.10
    net 192.168.10.0 mask 255.255.255.0
    net 192.168.10.0/24
    port 21
    dst host 1.2.3.4
    src port 2345
    ether host a:b:c:d:e:f ('ether a:b:c:d:e:f' is not working)
    ether src aa:bb:cc:dd:ee:ff
    ip
    arp
    rarp
    tcp
    icmp
    udp
  Here are filter examples:
    "host 1.2.3.4"
    "net 192.168 and icmp"
    "host 1.2.3.4 or dst port 80"
    "(udp or tcp) and not host 1.2.3.4"
  
  This tool may need to be run with admin privilege in order to sniff.
   

Synonyms:

  capture, mac, show

Usage:

  netwox 9 [-d device] [-f filter]

Parameters:

parameter description example
-d|--device device device name Eth0
-f|--filter filter pcap filter  

Example:

  netwox 9