Sponsored Content
Special Forums IP Networking intercept the ip address of a telnet session Post 84564 by paololrp on Tuesday 27th of September 2005 07:33:00 AM
Old 09-27-2005
intercept the ip address of a telnet session

The situation:
a Unix system (UnixWare 7.1.3) to which are connected other systems;
various p.c. on the LAN that they connect Unix to the system via TelNet.
The problem:
I need to intercept the address IP of the p.cs. connected via telnet to the Unix system.
Particularly, I have to know the address of the specific p.c., immediately after it has completed the login so that to be able to redirect some elaborations on its shared resources.
This use, obviously, has to be already operating in the shell, immediately after having made login.

I have tried to see between the various commands and file of system, but I have not succeeded in understanding as the system it associates a host to its ip address.

With the command "netstat - n - p tcp" I succeed at the most in knowing what systems are conversing by tcp-ip, but the problem is that this command not me from specific information for the p.c. from which I am performing the session telnet.

---
Smilie
Original message (Italian):

Situazione:
un sistema Unix (UnixWare 7.1.3) a cui si collegano vari altri sistemi;
vari p.c. in rete locale che si collegano al sistema Unix via TelNet.
Problema:
ho bisogno di intercettare l'indirizzo IP dei p.c. che si collegano al sistema Unix.
In particolare, devo conoscere l'indirizzo del p.c. specifico, subito dopo che ha completato il login, in modo da poter reindirizzare alcune elaborazioni sulle sue risorse condivise.
Questo utilizzo, ovviamente, deve essere funzionante già nella shell, subito dopo aver fatto login.

Ho provato a vedere tra i vari comandi e file di sistema, ma non sono riuscito a capire come il sistema associa un host al suo indirizzo ip.

Con il comando "netstat -n -p tcp" riesco al massimo a sapere quali sistemi stanno dialogando in tcp-ip, ma il problema è che questo comando non mi da informazioni specifiche per il p.c. da cui sto eseguendo la sessione telnet.
 

9 More Discussions You Might Find Interesting

1. Programming

Find the IP address that a telnet session uses

Hello Experts, Happy New Year to all of us, In AIX 4.3.3 I am trying to figure out how is possible to find out the IP address that a telnet session - user uses to login in to host machine. My objective is by finding the login IP address to allow the user to login or not. All users uses the... (6 Replies)
Discussion started by: sszago
6 Replies

2. UNIX for Dummies Questions & Answers

telnet session timeout

hi, we can set something such that if the user has been idle for a while, it will auto disconnect. where to do so? thanks (6 Replies)
Discussion started by: yls177
6 Replies

3. UNIX for Advanced & Expert Users

Host IP address for a telnet session

I am using Tru64UX 5.1a on alphaserver 4100. Users access the application through Telnet sessions to this server. My requirement is to limit the users login through their PCs only. Is there any way I can accomplish this on the unix box ? I want to include a script in the .profile ( or... (1 Reply)
Discussion started by: shauche
1 Replies

4. Shell Programming and Scripting

Telnet session does not expire

Dear friends.. Our project has a module that runs on handheld devices. Through the handheld we telnet to solaris where the application actually runs. I noticed that after starting a session through the handheld, if i go out of range or if i remove and replace the battery in the handheld, the... (1 Reply)
Discussion started by: deepsteptom
1 Replies

5. Shell Programming and Scripting

Telnet Session

{ sleep 2 echo "$user" sleep 2 echo "$password" sleep 2 echo " ls" sleep 10 echo "exit" }| telnet $server I have a machine x and i have executed the above script on machine 'x'. i entered the... (6 Replies)
Discussion started by: pathanjalireddy
6 Replies

6. UNIX for Dummies Questions & Answers

Unix Telnet session

Hi Is there any way whilst in a telnet session you can view your client machine name that you are using to connect to the Unix box ? :eek: (2 Replies)
Discussion started by: mlucas
2 Replies

7. UNIX for Dummies Questions & Answers

Telnet Session to AIX

Hello, I have AIX 5.3 at home connected to netgear router. Port Forwarding has been enabled on the router. Problem is that if I want to telnet, I have to try 2 or 3 times before I can get a logon prompt. It times out for first or second time (Connection to session <IP_Address> failed: Connection... (1 Reply)
Discussion started by: bluebee
1 Replies

8. UNIX for Dummies Questions & Answers

Disconnecting a telnet session

How can I disconnect an existing telnet session? The host is a serial port server with multiple ports. The users login using the host's name and a port, i.e. telnet host01 1235. Thanks. (14 Replies)
Discussion started by: cooldude
14 Replies

9. HP-UX

ssh session getting hung (smilar to hpux telnet session is getting hung after about 15 minutes)

Our network administrators implemented some sort of check to kill idle sessions and now burden is on us to run some sort of keep alive. Client based keep alive doesn't do a very good job. I have same issue with ssh. Does solution 2 provided above apply for ssh sessions also? (1 Reply)
Discussion started by: yoda9691
1 Replies
ARPSPOOF(8)						      System Manager's Manual						       ARPSPOOF(8)

NAME
arpspoof - intercept packets on a switched LAN SYNOPSIS
arpspoof [-i interface] [-c own|host|both] [-t target] [-r] host DESCRIPTION
arpspoof redirects packets from a target host (or all hosts) on the LAN intended for another host on the LAN by forging ARP replies. This is an extremely effective way of sniffing traffic on a switch. Kernel IP forwarding (or a userland program which accomplishes the same, e.g. fragrouter(8)) must be turned on ahead of time. OPTIONS
-i interface Specify the interface to use. -c own|host|both Specify which hardware address t use when restoring the arp configuration; while cleaning up, packets can be send with the own address as well as with the address of the host. Sending packets with a fake hw address can disrupt connectivity with certain switch/ap/bridge configurations, however it works more reliably than using the own address, which is the default way arpspoof cleans up afterwards. -t target Specify a particular host to ARP poison (if not specified, all hosts on the LAN). Repeat to specify multiple hosts. -r Poison both hosts (host and target) to capture traffic in both directions. (only valid in conjuntion with -t) host Specify the host you wish to intercept packets for (usually the local gateway). SEE ALSO
dsniff(8), fragrouter(8) AUTHOR
Dug Song <dugsong@monkey.org> ARPSPOOF(8)
All times are GMT -4. The time now is 12:20 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy