search for: sniff

Displaying 20 results from an estimated 435 matches for "sniff".

2009 Jun 29
4
how to sniff RTP and SIP traffic only
Hi, do somebody knows how to sniff RTP and SIP traffic only for a faster debugging ? Thanks. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20090629/5e160c92/attachment.htm
2009 Jun 21
6
Program to ban sniffers
...thing. I doubt there is a program like this, but I would love to have a program that listens at common ports that I do not use at all...and only allow that program to listen to it, especially the usual ssh port (using a different one for real ssh)... That program would then, upon receiving a 'sniff' or 'user' would then add that ip to the deny hosts lists..for either a long or short time. Using this would seem like a win as you can easily grab someone before they can get somewhere one hopes. Also, by opening up a few other ports that are unusual like 8561....well, if someone snif...
2005 May 04
6
Segmenting wireless traffic
I''m considering adding a seperate subnet to my loc network making loc1 (192.168.1.0/24) and loc2 (192.168.0.1/24) with the goal of seperating my wireless traffic from my wired LAN traffic. Has anyone had success doing this, or is it still possible to sniff the traffic of a seperate zone on the same interface with tools like ettercap?
2008 Feb 06
4
Using tcpdump to sniff telnet password
Hi all, As long as I can remember reading various articles/docs, they all say that telnet is not secure because all traffic is in clear text. Well, out of boredom, I try to sniff username and password from a telnet session. The command I use: tcpdump tcp port 23 -vvv -w test.txt Then I read the result: strings test.txt |`D |fD |fD 38400,38400 Red Hat Enterprise Linux ESD Ologin: D 5eE LsE _tE Password: F [aG |hG jaH Last login: Wed Feb 6 15:53:3H ]0;test4 at...
2018 Jan 29
2
opus manpages
...r a rewrite of opusrtp.1 and opusinfo.1 as an example of what I have in mind. Please let me know if you are interested. (PS: Should I rather prepare a github pull request?) Jan .Dd January 29, 2018 .Dt OPUSRTP 1 .Os .Sh NAME .Nm opusrtp .Nd Opus audio in RTP .Sh SYNOPSIS .Nm .Op Fl hV .Op Fl -sniff .Ar file.opus .Op Ar ... .Sh DESCRIPTION .Nm sends and receives Opus audio data in RTP, used for interactive applications on the internet. By default, Opus audio from each given file is sent as an RTP stream. .Pp The options are as follows: .Pp .Bl -tag -compact -width versionxxxxx .It Fl h Fl -hel...
2009 Dec 04
2
two questions about ssh tunneling
...t:6000 somebody at 192.168.56.5 -p PORTNUMBER from computer "A" to computer "B" [B = 192.168.56.5] then I can set the SOCKS proxy for e.g.: Firefox to use "localhost:6000" on computer "A". Ok. I can surf the web through "B". But: - Can anyone sniff the traffic of "A"? [e.g.: computers on same subnet as "A"] Like DNS requests? - I think no, but I'm not sure :O - Can anyone sniff the traffic of computer "B"? e.g.: B computer is at a server farm [others in the farm can see the traffic?] - I think yes, but I...
2008 May 25
3
trying directrtpsetup
Hi, I recently installed asterisk, i used sterisk-1.4.20.1, i i set directrtpsetup to yes, no whow would i know if the rtp/media is not passing to asterisk. any tool> or can u just sniff? regards, ron
2008 Jan 16
5
Capturing Packets -- Ethereal
...ntOS platform, and I'd rather not install Ethereal on it, if for no other reason I don't have X-Windows installed on that platform. My question is, can I monitor/write packets to a file on the more remote machine, and then analyze the packets on another machine using my ethereal SW? Can I sniff the packets on the remote w/o a full install of ethereal? === Al
2017 Nov 11
2
how safe is "net use" in a batch file? plus some encryption questions
A customer asked me if someone would be able to sniff (wireshark or something like that) a password if plugging into the same switch as their samba server. They use a desktop icon pointing at a plain old bat-file containing a "net use" command with the password right in there. I *assume* that the "net use" authenticates via en...
2004 Aug 06
3
unwanted oper login
...e if someone in our group had let it out, but the same thing happened two days latter. I'm trying to figure out how this was done, so I can decide whether we should consider the whole system compromised, or if perhaps there is another machine on the LAN that's been compromised and used to sniff us out. Thanks! --- >8 ---- List archives: http://www.xiph.org/archives/ icecast project homepage: http://www.icecast.org/ To unsubscribe from this list, send a message to 'icecast-request@xiph.org' containing only the word 'unsubscribe' in the body. No subject is needed. Uns...
2008 Jan 17
3
tool that records and plots graphs of UPS load over time?
Hi I'm looking for a tool that records and plots graphs of UPS load over time? Any suggestions? JonB
2004 Aug 06
2
a new directory service
...on the server, then certainly those are server-configurable only :) That's the only logical way for them to be :) > Well it's not protecting against spoofing either. Yes it is. To spoof the address you'd have to guess the password. That is reasonable difficult. > Someone can sniff the > hash and then they don't have to spoof, Sniffing is quite difficult. If you can sniff, you've likely gotten onto the box anyway and can cause other michief. The chances of someone on your network wanting to muck with you is slim, and even so, challenge response prevents this....
2007 Apr 18
1
[Bridge] Strange DHCP behaviour with bridging
...one remote computer connetting through tap0. If I assign a static IP to the remote computer, the bridge works perfecly (so I think the problem is not OpenVPN-related). If I start a DHCPd on the server and I configure the remote client to get the IP from it, something strange happens: if I "sniff" on the br0 interface, I can see the DHCP requests coming from the client (from 0.0.0.0.bootpc to 255.255.255.bootps) and the DHCPd answers going back from ip.of.the.server.bootps to 255.255.255.255.bootpc; also sniffing on eth0 gives the same result, but if I sniff on the tap0 interface,...
2015 Feb 16
2
[Bridge] Sniffing a linux bridge vs sniffing enslaved interfaces
...the interfaces generated by the bridge itself. If you have vlan tagged sub interfaces you might also miss that traffic if you were snooping a particular interface. Obviously you will miss any on-wire broadcast traffic specific to the layer1 connection a particular interface was connected to if you sniff on an individual device. Basically unless you are trying to trouble shoot a physical link issue I would likely always use the container link when doing a packet dump, due to several edge cases. If your bridge node host is participating (i.e has an IP etc on the br0 device itself , rather than in...
2001 Mar 15
12
Balancing ip traffic over two or more internet (adsl) connections
Hi. I''ve got here the following configuration: (turn on fixed pitch font to be able to see the scheme in a more accurately way) Client machines <-----> ADSL Router 1 <-----> INTERNET (192.168.0.0/24) (192.168.0.229) NAT Client machines <-----> ADSL Router 1 <-----> INTERNET (192.168.1.0/24) (192.168.1.229) NAT [if doesn''t really
2005 Jan 03
6
QOS / Cisco / Asterisk
...Has anyone had this issue? We're running Cisco everywhere inbetween (even the switches). Is there an alternative way to match these? We've thought of by port but that's kind of ad-hoc IMHO. Asterisk1 --> 3560 --> 2600 -- (T1) --> 7500 --> 2900 --> 3550 --> Asterisk2 Sniff: (note the dumps between the 2 machines are diff times however they show the same occurance) Asterisk1: 1.1.1.1 09:09:10.019191 IP (tos 0x10, ttl 64, id 58, offset 0, flags [DF], proto 17, length: 60) 1.1.1.1.12056 > 1.1.1.2.19726: [no cksum] UDP, length 32 09:09:10.030146 IP (tos 0x0, ttl 62...
2005 Jan 08
7
France has their (first?) SIP carrier with "unlimited" calls for 6eu/mo
...ber, i.e., similar to what you would get from France T?l?com 01, 02... Calls are cut after two hours, but you can then call back if you need to talk more than two hours. International rates look decent, though not cheaper than our favorites. The service is using a GPL SIP client, which after a few sniffs from various Usenet denizons gave us what was needed to make the service work with X-Lite. However, attempts to port the account over to asterisk (which have always worked with all other providers) do not work. I have complete session sniffs if someone is interested. I have already began bugging...
2017 Nov 11
0
how safe is "net use" in a batch file? plus some encryption questions
On Sat, 11 Nov 2017 11:02:31 +0100 "Stefan G. Weichinger via samba" <samba at lists.samba.org> wrote: > > A customer asked me if someone would be able to sniff (wireshark or > something like that) a password if plugging into the same switch as > their samba server. > > They use a desktop icon pointing at a plain old bat-file containing a > "net use" command with the password right in there. > > I *assume* that the &quot...
2007 Dec 12
2
Dump Unencrypted SSL Traffic
I've got an application that I can run under wine. It uses SSL to communicate with a server. Since it's using SSL I can't just sniff the network packets. What would be the best way to have wine be able to dump the unencrypted data to a file for analysis? If this requires modifying code, which files should I look at? -- Anish Mistry amistry at am-productions.biz AM Productions http://am-productions.biz/ -------------- next...
2004 Feb 21
2
Key exchange
Hi, I would like to know the order used by OpenSSH to choose the key exchange algorithm. I've used Ethereal to sniff a complete connection between my FreeBSD workstation and my OpenBSD laptop. I found that ssh used Diffie-Hellman. Why ? How can I use RSA or DSA keys created during the first boot by /etc/rc ? Please note that I'm not asking how to use keys to access a box, but how to choose a different alg...