Solved

How to use ipgrab

Posted on 1998-07-14
3
307 Views
Last Modified: 2012-06-27
I am trying to use ipgrab to determine what a machine does to identify itself on a network and also to find out what happens at the frame/packet level when you try to access a site on the local network or an outside host.  My question is if anyone knows the commands that will enable me to do this.  For example, I only want to get packet  information when I try to access a site.  Right now I get packet info about not only myself trying to access sites but also other people trying to access my site.  I have tried the various command line options and can't seem to get what I want.  I would appreciate any help.  Thank you...
0
Comment
Question by:amj120397
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 1

Expert Comment

by:mikegrb
ID: 1019835
What OS do you have?
0
 

Author Comment

by:amj120397
ID: 1019836
I am runnning it in the linux OS.
0
 
LVL 1

Accepted Solution

by:
mikegrb earned 200 total points
ID: 1019837
My suggestion is to use TCPDUMP (most likley similiar to ipgrap) in conjunction with a perl script or grep parsing output.  It would seem that the perl script would be a better way to go.  You might try asking in the perl area by posting example output and saying what you are trying to do.

For TCPDUMP look at:
ftp://ftp.ee.lbl.gov/tcpdump.tar.Z

Additionaly there is a tool that may do what you want that analyses the output from TCPDUMP and it is availible at:
http://www.ipsilon.com/~minshall/sw/tracelook/tracelook.html
Also check:
http://www.ipsilon.com/~minshall/
The parent page as it has some additional programs for analysing TCPDUMP output

Lastley:
If you want to run TCPDUMP at command line use:
# tcpdump -D -s 99999
to dump the Data of the packets to 99999 bytes (default is between 60 and 80)
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
This article shows how to use a free utility called 'Parkdale' to easily test the performance and benchmark any Hard Drive(s) installed in your computer. We also look at RAM Disks and their speed comparisons.
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…
Add bar graphs to Access queries using Unicode block characters. Graphs appear on every record in the color you want. Give life to numbers. Hopes this gives you ideas on visualizing your data in new ways ~ Create a calculated field in a query: …

726 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question