sniffing

how to show iphone apps sniffing HTTP Requests?

限于喜欢 提交于 2019-12-03 14:44:27
问题 i have iphone 3 with OS4 (not jailbreaked) and i want to inspect some apps http request urls , i tried fiddler but its not worked , anyone has idea? is the device must be jail breaked? i got ubuntu / windows so i can use one of them , if anyone knows how to do it please answer 回答1: If the device is using WiFi and you have a Wireless Network card that can enter promiscuous mode then you can use WireShark to sniff the raw packets. Use Follow TCP Stream to reconstruct the HTTP requests. More

Sniffing and displaying TCP packets in UTF-8

不问归期 提交于 2019-12-03 14:19:59
I am trying to use tcpdump to display the content of tcp packets flowing on my network. I have something like: tcpdump -i wlan0 -l -A The -A option displays the content as ASCII text, but my text seems to be UTF-8. Is there a way to display UTF-8 properly using tcpdump? Do you know any other tools which could help? Many thanks Make sure your terminal supports outputting UTF-8 and pipe the output to something which replaces non printable characters: tcpdump -lnpi lo tcp port 80 -s 16000 -w - | tr -t '[^[:print:]]' '' tcpdump -lnpi lo tcp port 80 -s 16000 -w - | strings -e S -n 1 If your

Could anyone suggest a good packet sniffer class for c++? [closed]

北城以北 提交于 2019-12-03 09:45:11
Could anyone suggest a good packet sniffer class for c++? Looking for a easy insertable class I can use in my c++ program, nothing complicated. You will never be able to intercept network traffic just by inserting a class into your project. Packet capture functionality requires kernel mode support, hence you will at the very least need to have your application require or install libpcap/WinPcap, as Will Dean pointed out. Most modern Unix-like distributions include libpcap out of the box, in which case you could take a look at this very simple example: http://www.tcpdump.org/pcap.htm If you're

Is there a low level Network library to sniff and change network traffic? [closed]

吃可爱长大的小学妹 提交于 2019-12-03 08:53:14
I am looking for a way to sniff network packets and encode them with C# (in summary: alter network traffic). I don't know how to explain my request but I need something like "Keyboard Hook". Is there any library or software in .net or Windows API? I don't think this is possible by default. But there are plenty of third party libraries that enable you to do that. Take a look at SharpPcap - A Packet Capture Framework for .NET Packet Capture and Analayzer Pcap.Net 来源: https://stackoverflow.com/questions/15614123/is-there-a-low-level-network-library-to-sniff-and-change-network-traffic

Serial / Com Port monitor for Windows x64 [closed]

自古美人都是妖i 提交于 2019-12-03 07:08:21
问题 Closed. This question is off-topic. It is not currently accepting answers. Want to improve this question? Update the question so it's on-topic for Stack Overflow. Closed 3 years ago . Can anyone recommend any good Com port monitor tools, like Portmon, which also work on Windows x64? Ideally something open source / freeware would be good. 回答1: The only one I have found for x64 is "Advanced Serial Port Monitor," which is really quite good. Not free, priced at $60 USD for a single user license.

Understanding Tcpdump filter & bit-masking

♀尐吖头ヾ 提交于 2019-12-03 06:31:54
I am trying to sniff the http headers by using tcpdump. This filter works well but I can't understand it - (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0) I've googled it but I can't find any useful info Here is the whole tcpdump command sudo tcpdump -A 'dst [dest host] or src [src host] and tcp and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' -i eth0 It's not the BPF filter that gets http headers but the "-A" switch on your tcpdump command. Your tcpdump command looks for tcp traffic to certain destination or from a certain source on eth0 where the final BPF filter

How to catch all HTTP traffic (local proxy)

独自空忆成欢 提交于 2019-12-03 03:46:50
I am looking to get access to all HTTP traffic on my machine (my windows machine - not a server). From what I understand having a local proxy through which all traffic routes is the way to go. I have been Googling but failed to find any resources (in respect to Ruby) to help me out. Any tips or links are much appreciated. Jonas Elfström There's an HTTP Proxy in WEBrick (part of Ruby stdlib) and here's an implementation example. If you like living on the edge there's also em-proxy by Ilya Grigorik. This post by Ilya implies that it does seem to need some tweaking to solve your problem. Is

how to show iphone apps sniffing HTTP Requests?

只谈情不闲聊 提交于 2019-12-03 03:37:51
i have iphone 3 with OS4 (not jailbreaked) and i want to inspect some apps http request urls , i tried fiddler but its not worked , anyone has idea? is the device must be jail breaked? i got ubuntu / windows so i can use one of them , if anyone knows how to do it please answer theChrisKent If the device is using WiFi and you have a Wireless Network card that can enter promiscuous mode then you can use WireShark to sniff the raw packets. Use Follow TCP Stream to reconstruct the HTTP requests. More information can be found at http://www.wireshark.org Another option is to force your device to use

Serial / Com Port monitor for Windows x64 [closed]

社会主义新天地 提交于 2019-12-02 20:48:34
Can anyone recommend any good Com port monitor tools, like Portmon, which also work on Windows x64? Ideally something open source / freeware would be good. The only one I have found for x64 is " Advanced Serial Port Monitor ," which is really quite good. Not free, priced at $60 USD for a single user license. There is a 15-day trial. Honestly, I've been hoping (for quite a while now) that Mark R. would release a 64-bit version of portmon. Old question, but very relevant. While serial ports may be gone from consumer devices these days, it is still very much used in industrial hardware, point of

Python Scapy sniff without root

人盡茶涼 提交于 2019-11-30 19:41:35
I'm wondering if there is any possibility to run Scapy's 'sniff(...)' without root priveleges. It is used in an application, where certain packages are captured. But I don't want to run the whole application with root permissions or change anything on scapy itselfe. Thanks in advance! EDIT: For testing I use following code: from scapy.all import * def arp_monitor_callback(pkt): if ARP in pkt and pkt[ARP].op in (1,2): #who-has or is-at return pkt.sprintf("%ARP.hwsrc% %ARP.psrc%") sniff(prn=arp_monitor_callback, filter="arp", store=0) I'm only able to run it using sudo. I tried to set