Solved

How to use ipgrab

Posted on 1998-07-14
3
303 Views
Last Modified: 2012-06-27
I am trying to use ipgrab to determine what a machine does to identify itself on a network and also to find out what happens at the frame/packet level when you try to access a site on the local network or an outside host.  My question is if anyone knows the commands that will enable me to do this.  For example, I only want to get packet  information when I try to access a site.  Right now I get packet info about not only myself trying to access sites but also other people trying to access my site.  I have tried the various command line options and can't seem to get what I want.  I would appreciate any help.  Thank you...
0
Comment
Question by:amj120397
  • 2
3 Comments
 
LVL 1

Expert Comment

by:mikegrb
ID: 1019835
What OS do you have?
0
 

Author Comment

by:amj120397
ID: 1019836
I am runnning it in the linux OS.
0
 
LVL 1

Accepted Solution

by:
mikegrb earned 200 total points
ID: 1019837
My suggestion is to use TCPDUMP (most likley similiar to ipgrap) in conjunction with a perl script or grep parsing output.  It would seem that the perl script would be a better way to go.  You might try asking in the perl area by posting example output and saying what you are trying to do.

For TCPDUMP look at:
ftp://ftp.ee.lbl.gov/tcpdump.tar.Z

Additionaly there is a tool that may do what you want that analyses the output from TCPDUMP and it is availible at:
http://www.ipsilon.com/~minshall/sw/tracelook/tracelook.html
Also check:
http://www.ipsilon.com/~minshall/
The parent page as it has some additional programs for analysing TCPDUMP output

Lastley:
If you want to run TCPDUMP at command line use:
# tcpdump -D -s 99999
to dump the Data of the packets to 99999 bytes (default is between 60 and 80)
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

What do we know about Legacy Video Conferencing? - Full IT support needed! - Complicated systems at outrageous prices! - Intense training required! Highfive believes we need to embrace a new alternative.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question