Watch this video on YouTube
Which command can be used to capture live network traffic during a data breach investigation on a Linux-based system?