Provided by: scamper_20191102-1_amd64 bug

NAME

     sc_warts2pcap — write packets included in warts object to a pcap file.

SYNOPSIS

     sc_warts2pcap [-o outfile] [-s sort] [file ...]

DESCRIPTION

     The sc_warts2pcap utility provides the ability to extract packets embedded in the tbit, sting, and sniff
     warts objects and write them to a pcap file, which can be read by tcpdump and wireshark.  The options are
     as follows:

     -o outfile
             specifies the name of the output file.  If no output file is specified, it will be written to the
             standard output, provided that it is not a tty.

     -o sort
             specifies how the pcap records (packets) are sorted before being written out.  By default, no
             sorting is applied; the packets are grouped as they are in the warts file.  If packet sorting is
             specified, the packets are written out in timestamp order.  Note that this operation requires the
             packets to be read into memory to be sorted, so it will require a corresponding amount of memory to
             complete.

EXAMPLES

     The command:

        sc_warts2pcap -o output.pcap file1.warts file2.warts

     will read the packet objects from file1.warts, and then file2.warts, and write them to output.pcap.

     The command:

        gzcat file1.warts.gz | sc_warts2pcap -s packet >file1.pcap

     will read the contents of the uncompressed warts file supplied on stdin, sort the packets by their
     timestamp, and then write the output to file1.pcap.

SEE ALSO

     scamper(1), tcpdump(1)

AUTHORS

     sc_warts2pcap was written by Stephen Eichler and Matthew Luckie.