![]() Create as many screen listeners for each pcap file that needs to be recorded. On the raspberry pi, open a new screen and start a nc listener to an arbitrary port (4444 for example) and then detach the screen. I needed to be able to send and listen for this packets on multiple interfaces, with multiple capture rules, while in the background, indefinite amount of time and without having to stop the capture to be able to analyze the results. ![]() This works but is awkward and time consuming. The setup is straight-forward but I couldn’t find an exact answer for it. One method is to capture the traffic with tcpdump on the remote host and then download the completed capture to your local computer and open it for analysis. Run tcpdump over ssh on your remote machine and redirect the packets to the named pipe: ssh rootfirewall.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |