search for: sniffs

Displaying 20 results from an estimated 435 matches for "sniffs".

Did you mean: sniff
2009 Jun 29
4
how to sniff RTP and SIP traffic only
Hi, do somebody knows how to sniff RTP and SIP traffic only for a faster debugging ? Thanks. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20090629/5e160c92/attachment.htm
2009 Jun 21
6
Program to ban sniffers
...niff' or 'user' would then add that ip to the deny hosts lists..for either a long or short time. Using this would seem like a win as you can easily grab someone before they can get somewhere one hopes. Also, by opening up a few other ports that are unusual like 8561....well, if someone sniffs that it could be a 3 day ban or a month... In other words, anyone hitting those ports that are not being used at all except by our sniff protector, would allow instant banning. So...does something like this exist?
2005 May 04
6
Segmenting wireless traffic
I''m considering adding a seperate subnet to my loc network making loc1 (192.168.1.0/24) and loc2 (192.168.0.1/24) with the goal of seperating my wireless traffic from my wired LAN traffic. Has anyone had success doing this, or is it still possible to sniff the traffic of a seperate zone on the same interface with tools like ettercap?
2008 Feb 06
4
Using tcpdump to sniff telnet password
Hi all, As long as I can remember reading various articles/docs, they all say that telnet is not secure because all traffic is in clear text. Well, out of boredom, I try to sniff username and password from a telnet session. The command I use: tcpdump tcp port 23 -vvv -w test.txt Then I read the result: strings test.txt |`D |fD |fD 38400,38400 Red Hat Enterprise Linux ESD Ologin: D 5eE
2018 Jan 29
2
opus manpages
Dear authors of Opus, currently, the manpages that come with opus-tools are written in the traditional man(7) markup language. I am proposing to rewrite them into the semantic markup of the mdoc(7) language. I am willing to do the work. Both the man(7) and mdoc(7) languages have been around for decades, and are supported by the prevalent formatters: groff(1) on most Linuxes and mandoc(1) on the
2009 Dec 04
2
two questions about ssh tunneling
if I: ssh -fND localhost:6000 somebody at 192.168.56.5 -p PORTNUMBER from computer "A" to computer "B" [B = 192.168.56.5] then I can set the SOCKS proxy for e.g.: Firefox to use "localhost:6000" on computer "A". Ok. I can surf the web through "B". But: - Can anyone sniff the traffic of "A"? [e.g.: computers on same subnet as
2008 May 25
3
trying directrtpsetup
Hi, I recently installed asterisk, i used sterisk-1.4.20.1, i i set directrtpsetup to yes, no whow would i know if the rtp/media is not passing to asterisk. any tool> or can u just sniff? regards, ron
2008 Jan 16
5
Capturing Packets -- Ethereal
This may be off topic, but I think my ethereal question might be simple enough. I am presently compiling ethereal on a CentOS platform to check it out. But the packets I want to monitor are actually on a different CentOS platform, and I'd rather not install Ethereal on it, if for no other reason I don't have X-Windows installed on that platform. My question is, can I monitor/write
2017 Nov 11
2
how safe is "net use" in a batch file? plus some encryption questions
A customer asked me if someone would be able to sniff (wireshark or something like that) a password if plugging into the same switch as their samba server. They use a desktop icon pointing at a plain old bat-file containing a "net use" command with the password right in there. I *assume* that the "net use" authenticates via encrypted communication? could someone confirm
2004 Aug 06
3
unwanted oper login
Hi all, I help administer a Linux(RH6.1) box running icecast 1.3.5. I'm going to go ahead and upgrade to 1.3.10 shortly. Recently a user from a strange(to us) dial-in account logged in as operator and issued a shutdown command. I changed the passwords to see if someone in our group had let it out, but the same thing happened two days latter. I'm trying to figure out how this was
2008 Jan 17
3
tool that records and plots graphs of UPS load over time?
Hi I'm looking for a tool that records and plots graphs of UPS load over time? Any suggestions? JonB
2004 Aug 06
2
a new directory service
> Hopefully.. considering their DSP guy and a handful of others were laid > off.. the new DSP they have really blows too so I'm forced into using the > old one.. oh well. The ogg plugin author was not an employee. He was a contractor. He's still working on the plugin regardless. > Oh that's cool.. and I assume the WMP plugin is available through the wacky > MS
2007 Apr 18
1
[Bridge] Strange DHCP behaviour with bridging
Here is the scenario: I have one server with kernel 2.4.24 with a bridge br0 made of 2 interfaces, eth0 and tap0 (the last is an OpenVPN tunnel), and one remote computer connetting through tap0. If I assign a static IP to the remote computer, the bridge works perfecly (so I think the problem is not OpenVPN-related). If I start a DHCPd on the server and I configure the remote client to get the
2015 Feb 16
2
[Bridge] Sniffing a linux bridge vs sniffing enslaved interfaces
I can think of several potential differences. ?You may miss any bridge specific traffic (STP, LLDP) using the interfaces generated by the bridge itself. If you have vlan tagged sub interfaces you might also miss that traffic if you were snooping a particular interface. Obviously you will miss any on-wire broadcast traffic specific to the layer1 connection a particular interface was connected to
2001 Mar 15
12
Balancing ip traffic over two or more internet (adsl) connections
Hi. I''ve got here the following configuration: (turn on fixed pitch font to be able to see the scheme in a more accurately way) Client machines <-----> ADSL Router 1 <-----> INTERNET (192.168.0.0/24) (192.168.0.229) NAT Client machines <-----> ADSL Router 1 <-----> INTERNET (192.168.1.0/24) (192.168.1.229) NAT [if doesn''t really
2005 Jan 03
6
QOS / Cisco / Asterisk
We're trying to PQ (Priority Queue) packets on a Cisco using ACL's. What we're trying to avoid is hardcoding the IP address in the ACL. We were trying to match by TOS set by Asterisk however it seems we've run into a snag where the packet TOS tends to get reset somewhere on our network. Has anyone had this issue? We're running Cisco everywhere inbetween (even the switches). Is
2005 Jan 08
7
France has their (first?) SIP carrier with "unlimited" calls for 6eu/mo
...ber, i.e., similar to what you would get from France T?l?com 01, 02... Calls are cut after two hours, but you can then call back if you need to talk more than two hours. International rates look decent, though not cheaper than our favorites. The service is using a GPL SIP client, which after a few sniffs from various Usenet denizons gave us what was needed to make the service work with X-Lite. However, attempts to port the account over to asterisk (which have always worked with all other providers) do not work. I have complete session sniffs if someone is interested. I have already began bugging t...
2017 Nov 11
0
how safe is "net use" in a batch file? plus some encryption questions
On Sat, 11 Nov 2017 11:02:31 +0100 "Stefan G. Weichinger via samba" <samba at lists.samba.org> wrote: > > A customer asked me if someone would be able to sniff (wireshark or > something like that) a password if plugging into the same switch as > their samba server. > > They use a desktop icon pointing at a plain old bat-file containing a > "net
2007 Dec 12
2
Dump Unencrypted SSL Traffic
I've got an application that I can run under wine. It uses SSL to communicate with a server. Since it's using SSL I can't just sniff the network packets. What would be the best way to have wine be able to dump the unencrypted data to a file for analysis? If this requires modifying code, which files should I look at? -- Anish Mistry amistry at am-productions.biz AM Productions
2004 Feb 21
2
Key exchange
Hi, I would like to know the order used by OpenSSH to choose the key exchange algorithm. I've used Ethereal to sniff a complete connection between my FreeBSD workstation and my OpenBSD laptop. I found that ssh used Diffie-Hellman. Why ? How can I use RSA or DSA keys created during the first boot by /etc/rc ? Please note that I'm not asking how to use keys to access a box, but how to