9 More Discussions You Might Find Interesting
1. Programming
Hi I have a program that captures packets with the libpcap library by calling the pcap-functions, e.g. pcap_next(...).
I would like to use PF_RING for the program and therefore I would have to adjust the calling functions to
pfring_open(...)
pfring_recv(...)
I'm pretty knew in network... (0 Replies)
Discussion started by: Freaky123
0 Replies
2. Shell Programming and Scripting
Hi,
I have a standard pcap file created using tcpdump. The file looks like
06:49:36.487629 IP 202.1.175.252 > 71.126.222.64: ICMP echo request, id 52765, seq 1280, length 40
06:49:36.489552 IP 192.120.148.227 > 71.126.222.64: ICMP echo request, id 512, seq 1280, length 40
06:49:36.491812 IP... (8 Replies)
Discussion started by: sajal.bhatia
8 Replies
3. Programming
Hi,
i am using a linux CentOS machine. I have 2 real network interfaces
eth0, eth1 and 2 virtual interfaces tap0 and tap1. I am using PCAP library to capture
the packets on theses interfaces. If i specify the interface as "any",
i cannot find a way to know from which interface the packet... (1 Reply)
Discussion started by: rahulnitk2004
1 Replies
4. Programming
I am trying to create an application that will be able to sniff memory of other applications.
I am not completely new to systems programming but I am not sure how to go about this task. I understand that accomplishing this mainly require these steps.
1: Get a list of processes
2: Find the... (2 Replies)
Discussion started by: mosey
2 Replies
5. What is on Your Mind?
Are we safe using the everyday wired keyboard? Although this concept is old, I had never seen an actual implementation on the matter until a few days ago. (Four ways of sniffing the electromagnetic emanations of wired keyboards currently on the market in up to 20 meters.)
Check the videos at:... (2 Replies)
Discussion started by: redoubtable
2 Replies
6. Programming
Can someone please help me figure out how to use pcap.h to sniff packets between only 2 computers whose mac addresses are know?
Thanks (0 Replies)
Discussion started by: papabearcares
0 Replies
7. Programming
I cant use pcap.h include file. How can I do so? :confused: (8 Replies)
Discussion started by: Pervez Sajjad
8 Replies
8. IP Networking
Hi All,
On a solaris box A port B
in which port B is established and receiving data.
My question is how do i listen on that established port ,
how can i get the data received at box A: port B through my application
I had searched the forum for the same, but i am unable to retrieve the... (5 Replies)
Discussion started by: matrixmadhan
5 Replies
9. Programming
I don't know if this is the correct forum to post this but hopefully someone can atleast point me in the right direction if they can't help me.
I am trying to install the Net::Pcap module for perl from Tim Potter version .04. I have installed gcc 2.95.3 on my Solaris 8 box. I am sure it's just... (6 Replies)
Discussion started by: TioTony
6 Replies
SC_WARTS2PCAP(1) BSD General Commands Manual SC_WARTS2PCAP(1)
NAME
sc_warts2pcap -- write packets included in warts object to a pcap file.
SYNOPSIS
sc_warts2pcap [-o outfile] [-s sort] [file ...]
DESCRIPTION
The sc_warts2pcap utility provides the ability to extract packets embedded in the tbit, sting, and sniff warts objects and write them to a
pcap file, which can be read by tcpdump and wireshark. The options are as follows:
-o outfile
specifies the name of the output file. If no output file is specified, it will be written to the standard output, provided that it
is not a tty.
-o sort
specifies how the pcap records (packets) are sorted before being written out. By default, no sorting is applied; the packets are
grouped as they are in the warts file. If packet sorting is specified, the packets are written out in timestamp order. Note that
this operation requires the packets to be read into memory to be sorted, so it will require a corresponding amount of memory to com-
plete.
EXAMPLES
The command:
sc_warts2pcap -o output.pcap file1.warts file2.warts
will read the packet objects from file1.warts, and then file2.warts, and write them to output.pcap.
The command:
gzcat file1.warts.gz | sc_warts2pcap -s packet >file1.pcap
will read the contents of the uncompressed warts file supplied on stdin, sort the packets by their timestamp, and then write the output to
file1.pcap.
SEE ALSO
scamper(1), tcpdump(1)
AUTHORS
sc_warts2pcap is written by Stephen Eichler and Matthew Luckie.
BSD
October 15, 2010 BSD