I've got 50-100MB pcap files captured from Wireshark and need to analyze where most of the traffic is going to/coming from.
What's the best way of doing this? Ideally I'd like to end up with an Excel csv file showing the top 50 or so IP addresses so I can sort and analyze.
You can also use tshark statistics:
Here are some examples:
by source address
by dest address
pipe either of those to | sort | uniq -c | sort -n | tail -50
you can get the top src/dst pairs with
To get a list of fields you can work with
(warning, wireshark has an overwhelming list of fields)