Linux and UNIX Man Pages

Linux & Unix Commands - Search Man Pages

log2pcap(1) [opensolaris man page]

LOG2PCAP(1)							   User Commands						       LOG2PCAP(1)

NAME
log2pcap - Extract network traces from Samba log files SYNOPSIS
log2pcap [-h] [-q] [logfile] [pcap_file] DESCRIPTION
This tool is part of the samba(7) suite. log2pcap reads in a samba log file and generates a pcap file (readable by most sniffers, such as ethereal or tcpdump) based on the packet dumps in the log file. The log file must have a log level of at least 5 to get the SMB header/parameters right, 10 to get the first 512 data bytes of the packet and 50 to get the whole packet. OPTIONS
-h If this parameter is specified the output file will be a hex dump, in a format that is readable by the text2pcap utility. -q Be quiet. No warning messages about missing or incomplete data will be given. logfile Samba log file. log2pcap will try to read the log from stdin if the log file is not specified. pcap_file Name of the output file to write the pcap (or hexdump) data to. If this argument is not specified, output data will be written to stdout. -h|--help Print a summary of command line options. EXAMPLES
Extract all network traffic from all samba log files: $ log2pcap < /var/log/* > trace.pcap Convert to pcap using text2pcap: $ log2pcap -h samba.log | text2pcap -T 139,139 - trace.pcap VERSION
This man page is correct for version 3.0 of the Samba suite. BUGS
Only SMB data is extracted from the samba logs, no LDAP, NetBIOS lookup or other data. The generated TCP and IP headers don't contain a valid checksum. SEE ALSO
text2pcap(1), ethereal(1) AUTHOR
The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed. This manpage was written by Jelmer Vernooij. ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +--------------------+----------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +--------------------+----------------------+ |Availability | SUNWsmbar, SUNWsmbau | +--------------------+----------------------+ |Interface Stability | External | +--------------------+----------------------+ NOTES
Source for Samba is available on http://opensolaris.org. Samba(7) delivers the set of four SMF(5) services as can be seen from the following example: $ svcs samba wins winbind swat STATE STIME FMRI disabled Apr_21 svc:/network/samba:default disabled Apr_21 svc:/network/winbind:default disabled Apr_21 svc:/network/wins:default disabled Apr_21 svc:/network/swat:default where the services are: "samba" runs the smbd daemon managing the CIFS sessions "wins" runs the nmbd daemon enabling the browsing (WINS) "winbind" runs the winbindd daemon making the domain idmap "swat" Samba Web Administration Tool is a service providing access to browser-based Samba administration interface and on-line documentation. The service runs on software loopback network interface on port 901/tcp, i.e. opening "http://localhost:901/" in browser will access the SWAT service on local machine. Please note: SWAT uses HTTP Basic Authentication scheme where user name and passwords are sent over the network in clear text. In the SWAT case the user name is root. Transferring such sensitive data is advisable only on the software loopback network interface or over secure networks. Samba 3.0 01/19/2009 LOG2PCAP(1)

Check Out this Related Man Page

SMBGETRC(4)						   File Formats and Conventions 					       SMBGETRC(4)

NAME
smbgetrc - configuration file for smbget SYNOPSIS
smbgetrc DESCRIPTION
This manual page documents the format and options of the smbgetrc file. This is the configuration file used by the smbget(1) utility. The file contains of key-value pairs, one pair on each line. The key and value should be separated by a space. By default, smbget reads its configuration from $HOME/.smbgetrc, though other locations can be specified using the command-line options. OPTIONS
The following keys can be set: resume on|off Whether aborted downloads should be automatically resumed. recursive on|off Whether directories should be downloaded recursively username name Username to use when logging in to the remote server. Use an empty string for anonymous access. password pass Password to use when logging in. workgroup wg Workgroup to use when logging in nonprompt on|off Turns off asking for username and password. Useful for scripts. debuglevel int (Samba) debuglevel to run at. Useful for tracking down protocol level problems. dots on|off Whether a single dot should be printed for each block that has been downloaded, instead of the default progress indicator. blocksize int Number of bytes to put in a block. VERSION
This man page is correct for version 3.0 of the Samba suite. SEE ALSO
smbget(1) and Samba(7). AUTHOR
The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed. This manual page was written by Jelmer Vernooij ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +--------------------+----------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +--------------------+----------------------+ |Availability | SUNWsmbar, SUNWsmbau | +--------------------+----------------------+ |Interface Stability | External | +--------------------+----------------------+ NOTES
Source for Samba is available on http://opensolaris.org. Samba(7) delivers the set of four SMF(5) services as can be seen from the following example: $ svcs samba wins winbind swat STATE STIME FMRI disabled Apr_21 svc:/network/samba:default disabled Apr_21 svc:/network/winbind:default disabled Apr_21 svc:/network/wins:default disabled Apr_21 svc:/network/swat:default where the services are: "samba" runs the smbd daemon managing the CIFS sessions "wins" runs the nmbd daemon enabling the browsing (WINS) "winbind" runs the winbindd daemon making the domain idmap "swat" Samba Web Administration Tool is a service providing access to browser-based Samba administration interface and on-line documentation. The service runs on software loopback network interface on port 901/tcp, i.e. opening "http://localhost:901/" in browser will access the SWAT service on local machine. Please note: SWAT uses HTTP Basic Authentication scheme where user name and passwords are sent over the network in clear text. In the SWAT case the user name is root. Transferring such sensitive data is advisable only on the software loopback network interface or over secure networks. Samba 3.0 01/19/2009 SMBGETRC(4)
Man Page