06-16-2005
hi all
thanks for the reply
i cannot establish a connection to box A by any means
i have data being received at port B of A. that's it.
if i am able to establish a connection to box A and that would become easy for me and i am not authorised to do so.
Regarding ethereal i believe i need to have root permission and i dont have root permission also
let me try other options and let u know how i proceed
thanks once again for ur help
9 More Discussions You Might Find Interesting
1. Programming
Can someone please help me figure out how to use pcap.h to sniff packets between only 2 computers whose mac addresses are know?
Thanks (0 Replies)
Discussion started by: papabearcares
0 Replies
2. Shell Programming and Scripting
Can someone please help me figure out how to use pcap.h to sniff packets between only 2 computers whose mac addresses are know?
Thanks (0 Replies)
Discussion started by: papabearcares
0 Replies
3. What is on Your Mind?
Are we safe using the everyday wired keyboard? Although this concept is old, I had never seen an actual implementation on the matter until a few days ago. (Four ways of sniffing the electromagnetic emanations of wired keyboards currently on the market in up to 20 meters.)
Check the videos at:... (2 Replies)
Discussion started by: redoubtable
2 Replies
4. Programming
I am trying to create an application that will be able to sniff memory of other applications.
I am not completely new to systems programming but I am not sure how to go about this task. I understand that accomplishing this mainly require these steps.
1: Get a list of processes
2: Find the... (2 Replies)
Discussion started by: mosey
2 Replies
5. HP-UX
Hi,
I have a few questions.
There is a CORBA connection between 2 HP-UX 11.11i hosts.
Then the LAN of the 2nd host is pulled.
On the 1st host all connections disappear, as expected.
But on the 2nd host all connections still are present, as established.
With lsof one can see that the... (2 Replies)
Discussion started by: ejdv
2 Replies
6. Solaris
I'm not to sure how to go about this questions, so I will just ask it and then get criticized. How many Established connections should a V440 be able to support? (4 Replies)
Discussion started by: adelsin
4 Replies
7. IP Networking
I put lsof -i -P -n into the terminal and this is the output. I believe i am being hacked??
lsof -i -P -n
COMMAND PID USER FD TYPE DEVICE SIZE/OFF NODE NAME
SystemUIS 1578 melodysneed 9u IPv4 0x07d608ec 0t0 UDP *:*
SystemUIS 1578 melodysneed 11u IPv4 0x0ba68810... (5 Replies)
Discussion started by: melodysneed
5 Replies
8. Red Hat
Hi Friends,
On one of my server which having direct connection to internet without firewall ..am seeing a established connection with SSH .. am not getting how ..there no login but I can see this established connection .
## have hidden original IPs with below notations for security concerns .... (0 Replies)
Discussion started by: Shirishlnx
0 Replies
9. Solaris
please find the below o/p for your reference
bash-3.00# fcinfo hba-port
HBA Port WWN: 21000024ff295a34
OS Device Name: /dev/cfg/c2
Manufacturer: QLogic Corp.
Model: 375-3356-02
Firmware Version: 05.03.02
FCode/BIOS Version: BIOS: 2.02; fcode: 2.01;... (3 Replies)
Discussion started by: sb200
3 Replies
LEARN ABOUT DEBIAN
tcpbug
TCPBUG(1) General Commands Manual TCPBUG(1)
NAME
tcpbug - TCP/IP connection bugging device
SYNOPSIS
tcpbug [-cx] [-btT] local-port remote-host remote-port
DESCRIPTION
tcpbug forwards a TCP/IP connection to port local-port on the local machine to the port remote-port on remote-host while spying on the con-
nection and writing all data passing through to standard output. All data coming from the client is printed with a greater than sign (>)
first on each line, and all data coming from the server is printed with a less than sign (<) first on each line. Any byte offsets and
time-stamps are printed before the greater than or less than sign, and are separated from each other by a colon (:).
OPTIONS
-b Print the offset of the first byte in the stream for each line.
-c Display bytes as individual characters. Printable characters are displayed directly, some control characters appear as C-language
escapes (
,
, et.c), while others appear as 3-digit octal numbers. This should be similar to the -c switch of od(1).
-t Print the time at which the data was received for each line. The time is the number of seconds and microseconds, separated by a
decimal point (.), since 00:00 UTC, January 1, 1970, as reported by gettimeofday().
-T Print the time at which the data was received for each line. The time is the number of seconds and microseconds, separated by a
decimal point (.), since the connections were established.
-x Display each byte as a two digit hexadecimal number.
SEE ALSO
tcpconnect(1), tcplisten(1), od(1).
BUGS
The names of the options are not yet finalized, and may change at a future release.
1997 April 13 TCPBUG(1)