Sponsored Content
Special Forums Cybersecurity Need Help with this TCPDUMP output... Post 302885389 by Lost in Cyberia on Saturday 25th of January 2014 04:41:22 PM
Old 01-25-2014
Thanks for the reply! So what is this query asking for? Is it asking for a complete list of A records for a certain domain? Are all those A record IP's actually pointing to something?
 

10 More Discussions You Might Find Interesting

1. Programming

How To Use tcpdump

I have two net-card. one is 172.16.24.99(ENG) ,another is 172.16.25.99(ENG-B). Both masks is 255.255.255.0. I will monitor data on the tcp port 8055 in ENG, How do I set option of tcpdump command (2 Replies)
Discussion started by: chenhao_no1
2 Replies

2. UNIX for Dummies Questions & Answers

tcpdump

does anybody know what the -d -dd and -ddd options are used for ? thanks (2 Replies)
Discussion started by: ant04
2 Replies

3. Shell Programming and Scripting

Tcpdump in cron

I wrote a short BASH script to run tcpdump and save the output to a log file for when I'm away from my desk. The script runs fine normally, but fails to start in cron. Any ideas? #!/bin/bash today=`date +%Y%m%d` tcpdump -i eth0 -s 1500 -w ${today}.cap & exit (5 Replies)
Discussion started by: paulzeromi
5 Replies

4. Shell Programming and Scripting

analyzing tcpdump output

hello, i have a lot of pcap files (tcpdump output) that i want to compare. every tcpdump output has two file, server and client. what i want to do is: 1. take timestamp, source address, destination address, and packet id from each file (server and client) 2. find the packets sent from... (0 Replies)
Discussion started by: slumpia
0 Replies

5. Cybersecurity

i would like to know about tcpdump

i would like to know about tcpdump i would like to use tcpdump to get information about these - Date - time - source hostname - source mac address - source ip address - destination ip address - see outbound only then i use command like this tcpdump -i le0 -n -q -tttt -e src net... (0 Replies)
Discussion started by: chamnanpol
0 Replies

6. IP Networking

i would like to know about tcpdump

i would like to know about tcpdump i would like to use tcpdump to get information about these - Date - time - source hostname - source mac address - source ip address - destination ip address - see outbound only then i use command like this tcpdump -i le0 -n -q -tttt -e src net... (2 Replies)
Discussion started by: chamnanpol
2 Replies

7. Shell Programming and Scripting

write a script to parse some tcpdump output

i am trying to write a script to parse some tcpdump output, in each line of the tcpdump output, I know for sure there are 3 keywords exist: User{different usernamehere} NAS_ipaddr{different ip here} Calling_station{ip or dns name here} But the positions for these 3 keywords in the... (4 Replies)
Discussion started by: fedora
4 Replies

8. IP Networking

tcpdump vs. wireshark

Hi, I am trying to capture manually crafted IP packets, created using Scapy, to a pcap file that can later be replayed using tcpreplay. When using wireshark, I can successfully capture these packets and view them in wireshark. However, when using tcpdump, these packets are then shown in... (2 Replies)
Discussion started by: yotamhc
2 Replies

9. Debian

Tcpdump Help !

Hi. Need Help with TcpDump Trying to sniff associatio-request with tcpdump but when i run this tcpdump -i eth0 wlan subtype assoc-req i get this error can anyone help me with this error ? Thanks alot !!:) (1 Reply)
Discussion started by: SoulZB
1 Replies

10. IP Networking

TCPdump

I've recently started learning to use TCPdump, and I find it pretty interesting. There's one thing I don't understand. When I tell it to capture packets on, say, the WiFi interface en1, it often captures packets sent or received by other hosts on the network. How can it do this? My... (3 Replies)
Discussion started by: Ultrix
3 Replies
DNSPKTFLOW(1p)						User Contributed Perl Documentation					    DNSPKTFLOW(1p)

NAME
dnspktflow - Analyze and draw DNS flow diagrams from a tcpdump file SYNOPSIS
dnspktflow -o output.png file.tcpdump dnspktflow -o output.png -x -a -t -q file.tcpdump DESCRIPTION
The dnspktflow application takes a tcpdump network traffic dump file, passes it through the tshark application and then displays the resulting DNS packet flows in a "flow-diagram" image. dnspktflow can output a single image or a series of images which can then be shown in sequence as an animation. dnspktflow was written as a debugging utility to help trace DNS queries and responses, especially as they apply to DNSSEC-enabled lookups. REQUIREMENTS
This application requires the following Perl modules and software components to work: graphviz (http://www.graphviz.org/) GraphViz (Perl module) tshark (http://www.wireshark.org/) The following is required for outputting screen presentations: MagicPoint (http://member.wide.ad.jp/wg/mgp/) If the following modules are installed, a GUI interface will be enabled for communication with dnspktflow: QWizard (Perl module) Getopt::GUI::Long (Perl module) OPTIONS
dnspktflow takes a wide variety of command-line options. These options are described below in the following functional groups: input packet selection, output file options, output visualization options, graphical options, and debugging. Input Packet Selection These options determine the packets that will be selected by dnspktflow. -i STRING --ignore-hosts=STRING A regular expression of host names to ignore in the query/response fields. -r STRING --only-hosts=STRING A regular expression of host names to analyze in the query/response fields. -f --show-frame-num Display the packet frame numbers. -b INTEGER --begin-frame=INTEGER Begin at packet frame NUMBER. Output File Options These options determine the type and location of dnspktflow's output. -o STRING --output-file=STRING Output file name (default: out%03d.png as PNG format.) --fig Output format should be fig. -O STRING --tshark-out=STRING Save tshark output to this file. -m --multiple-outputs One picture per request (use %03d in the filename.) -M STRING --magic-point=STRING Saves a MagicPoint presentation for the output. Output Visualization Options: These options determine specifics of dnspktflow's output. --layout-style Selects the graphviz layout style to use (dot, neato, twopi, circo, or fdp). -L --last-line-labels-only Only show data on the last line drawn. -z INTEGER --most-lines=INTEGER Only show at most INTEGER connections. -T --input-is-tshark-out The input file is already processed by tshark. Graphical Options: These options determine fields included in dnspktflow's output. -t --show-type Shows message type in result image. -q --show-queries Shows query questions in result image. -a --show-answers Shows query answers in result image. -A --show-authoritative Shows authoritative information in result image. -x --show-additional Shows additional information in result image. -l --show-label-lines Shows lines attaching labels to lines. --fontsize=INTEGER Font Size Debugging: These options may assist in debugging dnspktflow. -d --dump-pkts Dump data collected from the packets. -h --help Show help for command line options. COPYRIGHT
Copyright 2004-2012 SPARTA, Inc. All rights reserved. See the COPYING file included with the DNSSEC-Tools package for details. AUTHOR
Wes Hardaker <hardaker@users.sourceforge.net> SEE ALSO
Getopt::GUI::Long(3) Net::DNS(3) QWizard.pm(3) http://dnssec-tools.sourceforge.net/ perl v5.14.2 2012-06-21 DNSPKTFLOW(1p)
All times are GMT -4. The time now is 08:56 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy