On the command line with TSHARK:
sudo tshark -i wlp0s20f3 -c 1 -V host 54.204.39.132 and port 443
must run with sudo
interface wlan
count 1
-V shows the whole packet
host filters packets only from that host
can further filter by port with "and port 443"
can also filter by protocol sudo tshark -i wlan udp
Forwarder
Indexer
Search Head
Chris Kubecka developed it
https://docs.splunk.com/Documentation/Splunk/8.0.1/SearchTutorial/Usefieldstosearch
https://github.com/offensive-security/exploitdb