10 More Discussions You Might Find Interesting
1. Solaris
Hello guys,
I am trying to install ethereal in Solaris10 based on i386 system.
But i can find only packet for sparc.
Any idea?
Thanks a lot! (2 Replies)
Discussion started by: @dagio
2 Replies
2. Solaris
I have installed ethereal on solaris 10. however I can execute the ./ethereal using the root account. if tried to execute same from non-root users i am facing the following error.
ethereal: The capture session could not be initiated (/dev/ce: Permission denied).
Please check to make sure... (2 Replies)
Discussion started by: vishwanathhcl
2 Replies
3. Shell Programming and Scripting
Hi All........
i need a perl script that can trace the traces of the ethereal tool. PLZ help me out...............!!!!!!!!! (1 Reply)
Discussion started by: trupti_rinku
1 Replies
4. Shell Programming and Scripting
Hi All;
plz suggest me any perl script to get the ethereal messeges.To be more specific, i need to write a perl script that when an ethereal tool is started and captures any traces, can get that trace......... :) (0 Replies)
Discussion started by: trupti_rinku
0 Replies
5. AIX
Hi to all ....
i must install ethereal-0.8.18-1 on aix system , for do some problems determination about network problems .
I have a .bff file of ethereal but for resolve dependencies i need this two .bff package needed :
freeware.gtk+.rte 1.2.8.0 # Base Level Fileset... (1 Reply)
Discussion started by: BabylonRocker
1 Replies
6. UNIX for Dummies Questions & Answers
Has anybody installed ethereal on red hat linux. If so how ?, ie a a step by step process. I 've been to ethereal.com but it says not to use the RPM's on the site. When I do attempt to install using binaries or RPM's the list of dependancies seems endless, ie it says I need x I try to install x and... (4 Replies)
Discussion started by: alien12
4 Replies
7. SCO
I have installed the Ethereal package (ethereal-0.8.14.pkg) on a SCO Openserver 5.0.7. Installation went OK but when I try to start Ethereal I get error messages about "linking problems".
I have studied the SCO Technical article 116949 but my filenames differ from article.
Please help!! (1 Reply)
Discussion started by: bean2
1 Replies
8. SCO
Which version of Ethereal can I use for SCO OpenServer 5.0.7??? (0 Replies)
Discussion started by: bean2
0 Replies
9. IP Networking
Hi,
I work with an interface which connects to a Switch company and pulls information from certain sockets. During the night, somehow disconnects and it is difficult to prove if it is the interface or the Switch company responsible. I had the suggestion to install sniffers to do some network... (2 Replies)
Discussion started by: giulianob
2 Replies
10. IP Networking
One of the users on my network took my aside and showed me a program called ethereal that can sniff out packets on the network. He was able to re-build a packet stream and see pretty clearly what other users where looking at.
I am using a hub. If I use a switch will that stop ability to be... (7 Replies)
Discussion started by: macdonto
7 Replies
LOG2PCAP(1) User Commands LOG2PCAP(1)
NAME
log2pcap - Extract network traces from Samba log files
SYNOPSIS
log2pcap [-h] [-q] [logfile] [pcap_file]
DESCRIPTION
This tool is part of the samba(7) suite.
log2pcap reads in a samba log file and generates a pcap file (readable by most sniffers, such as ethereal or tcpdump) based on the packet
dumps in the log file.
The log file must have a log level of at least 5 to get the SMB header/parameters right, 10 to get the first 512 data bytes of the packet
and 50 to get the whole packet.
OPTIONS
-h
If this parameter is specified the output file will be a hex dump, in a format that is readable by the text2pcap utility.
-q
Be quiet. No warning messages about missing or incomplete data will be given.
logfile
Samba log file. log2pcap will try to read the log from stdin if the log file is not specified.
pcap_file
Name of the output file to write the pcap (or hexdump) data to. If this argument is not specified, output data will be written to
stdout.
-h|--help
Print a summary of command line options.
EXAMPLES
Extract all network traffic from all samba log files:
$ log2pcap < /var/log/* > trace.pcap
Convert to pcap using text2pcap:
$ log2pcap -h samba.log | text2pcap -T 139,139 - trace.pcap
VERSION
This man page is correct for version 3.0 of the Samba suite.
BUGS
Only SMB data is extracted from the samba logs, no LDAP, NetBIOS lookup or other data.
The generated TCP and IP headers don't contain a valid checksum.
SEE ALSO
text2pcap(1), ethereal(1)
AUTHOR
The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open
Source project similar to the way the Linux kernel is developed.
This manpage was written by Jelmer Vernooij.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+--------------------+----------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+--------------------+----------------------+
|Availability | SUNWsmbar, SUNWsmbau |
+--------------------+----------------------+
|Interface Stability | External |
+--------------------+----------------------+
NOTES
Source for Samba is available on http://opensolaris.org.
Samba(7) delivers the set of four SMF(5) services as can be seen from the following example:
$ svcs samba wins winbind swat
STATE STIME FMRI
disabled Apr_21 svc:/network/samba:default
disabled Apr_21 svc:/network/winbind:default
disabled Apr_21 svc:/network/wins:default
disabled Apr_21 svc:/network/swat:default
where the services are:
"samba"
runs the smbd daemon managing the CIFS sessions
"wins"
runs the nmbd daemon enabling the browsing (WINS)
"winbind"
runs the winbindd daemon making the domain idmap
"swat"
Samba Web Administration Tool is a service providing access to browser-based Samba administration interface and on-line documentation.
The service runs on software loopback network interface on port 901/tcp, i.e. opening "http://localhost:901/" in browser will access
the SWAT service on local machine.
Please note: SWAT uses HTTP Basic Authentication scheme where user name and passwords are sent over the network in clear text. In the SWAT
case the user name is root. Transferring such sensitive data is advisable only on the software loopback network interface or over secure
networks.
Samba 3.0 01/19/2009 LOG2PCAP(1)