Get list of network interfaces:
> tshark -D
Listen on multiple network interfaces:
> tshark -i ethl -i eth2 -i eth3
Save to pcap and disable name resolution:
> tshark -nn -w <FILE NAME>,pcap
Get absolute date and time stamp:
> tshark -t a
Get arp or icmp traffic:
> tshark arp or icmp
Capture traffic between to [hosts] and/or [nets]:
> tshark "host <HOST l> && host <HOST 2>"
> tshark -n "net <NET 1> && net <NET 2>"
Filter just host and IPs (or not your IP):
> tshark -r <FILE NAME>,pcap -q -z hosts,ipv4
> tshark not host <YOUR IP ADDRESS>
Not ARP and not UDP:
> tshark not arp and not (udp.port -- 53)
Replay a pcap file:
> tshark -r <FILE NAME>.pcap
Replay a pcap and just grab hosts and IPs:
> tshark -r <FILE NAME>.pcap -q -z hosts