Home page logo
/

pen-test logo Penetration Testing mailing list archives

Re: Auditing / Logging
From: Steve Shah <sshah () planetoid org>
Date: Tue, 13 Jan 2004 09:13:26 -0800

On Tue, Jan 13, 2004 at 05:43:21AM -0000, Travis Schack wrote:
When I am testing, I capture all network traffic using TCPdump (in
binary) and I use the script command to capture all terminal activity.

Be sure to set the -s option ("snaplen") to zero so that you capture
all of the activity. Many people forget this and only capture the
headers a few bytes of the payload itself. Under Linux and a stock
ethernet card, you'd want:

tcpdump -i eth0 -s 0 -n -w dumpfile.pcap 

If you are doing this on a gateway, you may want to specify some
filters so that only your attack network is captured. e.g. if my
attack network is 200.100.50.0/24, 

tcpdump -i eth0 -s 0 -n -w dumpfile.pcap net 200.100.50.0/24

-Steve

-- 
Steve Shah
sshah () planetoid org - http://www.planetoid.org/
Beating code into submission, one OS at a time...

---------------------------------------------------------------------------
----------------------------------------------------------------------------


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]
AlienVault