Displaying 20 results from an estimated 435 matches for "sniffs".
Did you mean:
sniff
2009 Jun 29
4
how to sniff RTP and SIP traffic only
Hi, do somebody knows how to sniff RTP and SIP traffic only for a faster
debugging ?
Thanks.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20090629/5e160c92/attachment.htm
2009 Jun 21
6
Program to ban sniffers
...niff' or 'user' would then add
that ip to the deny hosts lists..for either a long or short time.
Using this would seem like a win as you can easily grab someone before they
can get somewhere one hopes.
Also, by opening up a few other ports that are unusual like 8561....well, if
someone sniffs that it could be a 3 day ban or a month...
In other words, anyone hitting those ports that are not being used at all
except by our sniff protector, would allow instant banning.
So...does something like this exist?
2005 May 04
6
Segmenting wireless traffic
I''m considering adding a seperate subnet to my loc network making loc1
(192.168.1.0/24) and loc2 (192.168.0.1/24) with the goal of seperating
my wireless traffic from my wired LAN traffic.
Has anyone had success doing this, or is it still possible to sniff the
traffic of a seperate zone on the same interface with tools like ettercap?
2008 Feb 06
4
Using tcpdump to sniff telnet password
Hi all,
As long as I can remember reading various articles/docs, they all say that
telnet is not secure because all traffic is in clear text. Well, out of
boredom, I try to sniff username and password from a telnet session.
The command I use: tcpdump tcp port 23 -vvv -w test.txt
Then I read the result: strings test.txt
|`D
|fD
|fD
38400,38400
Red Hat Enterprise Linux ESD
Ologin: D
5eE
2018 Jan 29
2
opus manpages
Dear authors of Opus,
currently, the manpages that come with opus-tools
are written in the traditional man(7) markup language.
I am proposing to rewrite them into the semantic markup
of the mdoc(7) language. I am willing to do the work.
Both the man(7) and mdoc(7) languages have been around for decades,
and are supported by the prevalent formatters: groff(1) on most Linuxes
and mandoc(1) on the
2009 Dec 04
2
two questions about ssh tunneling
if I:
ssh -fND localhost:6000 somebody at 192.168.56.5 -p PORTNUMBER
from computer "A" to computer "B" [B = 192.168.56.5] then I can set the
SOCKS proxy for e.g.: Firefox to use "localhost:6000" on computer "A".
Ok. I can surf the web through "B".
But:
- Can anyone sniff the traffic of "A"? [e.g.: computers on same subnet
as
2008 May 25
3
trying directrtpsetup
Hi,
I recently installed asterisk, i used sterisk-1.4.20.1, i i set directrtpsetup to yes, no whow would i know if the rtp/media is not passing to asterisk. any tool> or can u just sniff?
regards,
ron
2008 Jan 16
5
Capturing Packets -- Ethereal
This may be off topic, but I think my ethereal question might be simple enough.
I am presently compiling ethereal on a CentOS platform to check it out.
But the packets I want to monitor are actually on a different CentOS platform, and I'd rather not install Ethereal on it, if for no other reason I don't have X-Windows installed on that platform.
My question is, can I monitor/write
2017 Nov 11
2
how safe is "net use" in a batch file? plus some encryption questions
A customer asked me if someone would be able to sniff (wireshark or
something like that) a password if plugging into the same switch as
their samba server.
They use a desktop icon pointing at a plain old bat-file containing a
"net use" command with the password right in there.
I *assume* that the "net use" authenticates via encrypted communication?
could someone confirm
2004 Aug 06
3
unwanted oper login
Hi all,
I help administer a Linux(RH6.1) box running icecast 1.3.5.
I'm going to go ahead and upgrade to 1.3.10 shortly. Recently a user from
a strange(to us) dial-in account logged in as operator and issued a shutdown
command. I changed the passwords to see if someone in our group had let it
out, but the same thing happened two days latter.
I'm trying to figure out how this was
2008 Jan 17
3
tool that records and plots graphs of UPS load over time?
Hi
I'm looking for a tool that records and plots graphs of UPS load over
time?
Any suggestions?
JonB
2004 Aug 06
2
a new directory service
> Hopefully.. considering their DSP guy and a handful of others were laid
> off.. the new DSP they have really blows too so I'm forced into using the
> old one.. oh well.
The ogg plugin author was not an employee. He was a contractor. He's
still working on the plugin regardless.
> Oh that's cool.. and I assume the WMP plugin is available through the wacky
> MS
2007 Apr 18
1
[Bridge] Strange DHCP behaviour with bridging
Here is the scenario: I have one server with kernel 2.4.24 with a bridge br0
made of 2 interfaces, eth0 and tap0 (the last is an OpenVPN tunnel), and one
remote computer connetting through tap0. If I assign a static IP to the
remote computer, the bridge works perfecly (so I think the problem is not
OpenVPN-related). If I start a DHCPd on the server and I configure the remote
client to get the
2015 Feb 16
2
[Bridge] Sniffing a linux bridge vs sniffing enslaved interfaces
I can think of several potential differences. ?You may miss any bridge
specific traffic (STP, LLDP) using the interfaces generated by the bridge
itself.
If you have vlan tagged sub interfaces you might also miss that traffic if
you were snooping a particular interface. Obviously you will miss any
on-wire broadcast traffic specific to the layer1 connection a particular
interface was connected to
2001 Mar 15
12
Balancing ip traffic over two or more internet (adsl) connections
Hi.
I''ve got here the following configuration:
(turn on fixed pitch font to be able to see the scheme in a more
accurately way)
Client machines <-----> ADSL Router 1 <-----> INTERNET
(192.168.0.0/24) (192.168.0.229) NAT
Client machines <-----> ADSL Router 1 <-----> INTERNET
(192.168.1.0/24) (192.168.1.229) NAT
[if doesn''t really
2005 Jan 03
6
QOS / Cisco / Asterisk
We're trying to PQ (Priority Queue) packets on a Cisco using ACL's. What
we're trying to avoid is hardcoding the IP address in the ACL. We were
trying to match by TOS set by Asterisk however it seems we've run into a
snag where the packet TOS tends to get reset somewhere on our network.
Has anyone had this issue? We're running Cisco everywhere inbetween
(even the switches). Is
2005 Jan 08
7
France has their (first?) SIP carrier with "unlimited" calls for 6eu/mo
...ber,
i.e., similar to what you would get from France T?l?com 01, 02...
Calls are cut after two hours, but you can then call back if you need
to talk more than two hours. International rates look decent, though
not cheaper than our favorites.
The service is using a GPL SIP client, which after a few sniffs from
various Usenet denizons gave us what was needed to make the service
work with X-Lite. However, attempts to port the account over to
asterisk (which have always worked with all other providers) do not
work. I have complete session sniffs if someone is interested.
I have already began bugging t...
2017 Nov 11
0
how safe is "net use" in a batch file? plus some encryption questions
On Sat, 11 Nov 2017 11:02:31 +0100
"Stefan G. Weichinger via samba" <samba at lists.samba.org> wrote:
>
> A customer asked me if someone would be able to sniff (wireshark or
> something like that) a password if plugging into the same switch as
> their samba server.
>
> They use a desktop icon pointing at a plain old bat-file containing a
> "net
2007 Dec 12
2
Dump Unencrypted SSL Traffic
I've got an application that I can run under wine. It uses SSL to
communicate with a server. Since it's using SSL I can't just sniff
the network packets. What would be the best way to have wine be able
to dump the unencrypted data to a file for analysis? If this
requires modifying code, which files should I look at?
--
Anish Mistry
amistry at am-productions.biz
AM Productions
2004 Feb 21
2
Key exchange
Hi,
I would like to know the order used by OpenSSH to choose the key exchange
algorithm.
I've used Ethereal to sniff a complete connection between my FreeBSD
workstation and my OpenBSD laptop. I found that ssh used Diffie-Hellman.
Why ?
How can I use RSA or DSA keys created during the first boot by /etc/rc ?
Please note that I'm not asking how to use keys to access a box, but how to