Rezultati pretraživanja
  1. 3. velj

    and UPD port 53 -nr91e710b7ff38.pcap -Avvv udp and port 53 | egrep 'q\: A\? .+' | awk '{print $8}' FS=, | rg -v 'CNAME|NS' |sort |uniq |sed 's/\. /\t/g;' |awk '{print $1,"->",$4}' |sed 1d |sed 1i. |column -t | sort | uniq

  2. 14. ruj 2019.

    Day 70/100 Finished 3 lessons (270 Mnts) of Developer tools in Full Stack Web Developer Nanodegree from Udacity. - Names and Addresses - Addressing the Network - Protocol Layers

  3. 7. lip 2019.

    I do not want to see again today.

  4. 9. sij

    Argus / ra payload & tcpdump -nn -reb.pcap -w - | argus -r - -AZJmRU 10240 -w - | ra -c'\t' -L0 -r - -s stime saddr daddr sport dport dur state proto bytes synack pkts rate loss suser:2000 duser:2000 -- tcp | .... S_payload: "$14"\n"" D_payload: "$15"\n"}' ...

  5. 11. sij

    soundscape playground ~~ eventually each node will play its corresponding track -- but for now just playing a track generated with data while I was in a motel in :)

  6. 16. kol 2019.

    You know you’re as ready as you’re going to be when you spot your own mistake in your notes...

  7. 17. ožu 2019.

    Finally found a solution to my DHCP Relay issue on my Wireless bridge 🤘🏽Thanks to the different implementations of the DHCP protocol... As a reminder, when you're connected behind a bridge and trying to get an IP and passing your time to dig in to understand why (next)

    Prikaži ovu nit
  8. 23. srp 2019.

    TIL: recent versions of can capture packets for incoming or outgoing directions only by specifying the --direction=in or --direction=out parameter More about this here:

    tcpdump example of using the "direction=in" parameter
  9. 13. tra 2019.

    Update: added to this little thing. Awwwww Yissssss

    Prikaži ovu nit
  10. 15. ruj 2019.
  11. 8. pro 2019.
  12. 30. srp 2019.

    It’s did you know you can capture traffic by network using dot notation? tcpdump net 10.0.0

  13. 21. svi 2019.

    When in doubt...

  14. 18. ožu 2019.

    just to clarify, UNICAST = broadcast flag not set... so you'll see flag[none] on as showed on the picture. Anyway, for those interested I'll post a new tweet with the complete bridge setup.

    Prikaži ovu nit
  15. 13. pro 2018.

    A new blog post by yours truly: Using a Raspberry Pi to capture IoT data flows on a testbed.

  16. 1. stu 2019.
  17. 20. stu 2019.

    Capturing packets with a free tool like is an essential skill that you need to acquire as a sysadmin. Anthony Critelli shows you the ropes.

  18. 30. sij

    . Últimos retoques al script para envío (TCP/IP) automático de alertas. Recibiendo alertas con sudo stdbuf -oL tcpdump -nK -ieth2 src port 555 and host 192.168.1.46 -A | stdbuf -oL egrep -o '\.\[.*\]' | stdbuf -oL awk '{print "Alerta detectada --- "$0}'

    Prikaži ovu nit
  19. 18. sij

    // Analizando duración y pérdida de paquetes por flujos de tráfico y puertos destino. 'SELECT SrcAddr,DstAddr,Dport,sum(Dur) AS "Total Duración",sum(Loss) AS "Total Loss" FROM stdin where( Dport==443 OR Dport==80) group by SrcAddr,DstAddr,Dport'

  20. 14. sij

    Wiecie co łączy te cztery projekty? Odpowiedź usłyszycie na jednej z naszych dzisiejszych prezentacji :)

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.