From 142621d6a40eb91db305482e0063aa457994b9bf Mon Sep 17 00:00:00 2001 From: edoardoColi Date: Mon, 22 May 2023 03:02:18 +0200 Subject: [PATCH] README --- README.md | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/README.md b/README.md index b9f3126..fc29a6c 100755 --- a/README.md +++ b/README.md @@ -49,14 +49,14 @@ By leveraging the capabilities of Bash and TShark, the MAC Packet Analyzer scrip ./MACshuffle.sh -h ``` Below we find some execution references: - -* Expected output for analyzing a capture file passed to the program in differents ways.* - -* Expected output for performing the same analysis as before but with combination of unicity flag and n flag to bound the number of packets analyzed.* - -* Expected output for running the analysis using the verbose flag. More details are shown regarding the counts.* - -* Expected output for running the same analysis but accounting for duplicates.* + +*Expected output for analyzing a capture file passed to the program in differents ways.* + +*Expected output for performing the same analysis as before but with combination of unicity flag and n flag to bound the number of packets analyzed.* + +*Expected output for running the analysis using the verbose flag. More details are shown regarding the counts.* + +*Expected output for running the same analysis but accounting for duplicates.* To perform a stream data analysis in a certain interface we can use the following command (in this case it's necessary to have tcpdump). ``` sudo tcpdump -i -U -w .MACprobe.tmp | ./MACshuffle.sh -p