Solved

How to use ipgrab

Posted on 1998-07-14
3
297 Views
Last Modified: 2012-06-27
I am trying to use ipgrab to determine what a machine does to identify itself on a network and also to find out what happens at the frame/packet level when you try to access a site on the local network or an outside host.  My question is if anyone knows the commands that will enable me to do this.  For example, I only want to get packet  information when I try to access a site.  Right now I get packet info about not only myself trying to access sites but also other people trying to access my site.  I have tried the various command line options and can't seem to get what I want.  I would appreciate any help.  Thank you...
0
Comment
Question by:amj120397
  • 2
3 Comments
 
LVL 1

Expert Comment

by:mikegrb
ID: 1019835
What OS do you have?
0
 

Author Comment

by:amj120397
ID: 1019836
I am runnning it in the linux OS.
0
 
LVL 1

Accepted Solution

by:
mikegrb earned 200 total points
ID: 1019837
My suggestion is to use TCPDUMP (most likley similiar to ipgrap) in conjunction with a perl script or grep parsing output.  It would seem that the perl script would be a better way to go.  You might try asking in the perl area by posting example output and saying what you are trying to do.

For TCPDUMP look at:
ftp://ftp.ee.lbl.gov/tcpdump.tar.Z

Additionaly there is a tool that may do what you want that analyses the output from TCPDUMP and it is availible at:
http://www.ipsilon.com/~minshall/sw/tracelook/tracelook.html
Also check:
http://www.ipsilon.com/~minshall/
The parent page as it has some additional programs for analysing TCPDUMP output

Lastley:
If you want to run TCPDUMP at command line use:
# tcpdump -D -s 99999
to dump the Data of the packets to 99999 bytes (default is between 60 and 80)
0

Featured Post

Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

Join & Write a Comment

I use more than 1 computer in my office for various reasons. Multiple keyboards and mice take up more than just extra space, they make working a little more complicated. Using one mouse and keyboard for all of my computers makes life easier. This co…
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

757 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now