log2pcap - Extract network traces from Samba log files
log2pcap reads in a samba log file and generates a pcap file (readable by most sniffers, such as ethereal or tcpdump) based on the packet dumps in the log file.
The log file must have a log level of at least 5 to get the SMB header/parameters right, 10 to get the first 512 data bytes of the packet and 50 to get the whole packet.
Extract all network traffic from all samba log files:
$ log2pcap < /var/log/* > trace.pcap .fi Convert to pcap using text2pcap: $ log2pcap -h samba.log | text2pcap -T 139,139 - trace.pcap .fi
This man page is correct for version 3.0 of the Samba suite.
Only SMB data is extracted from the samba logs, no LDAP, NetBIOS lookup or other data.
The generated TCP and IP headers don't contain a valid checksum.
The original Samba software and related utilities were created by Andrew Tridgell. Samba is now developed by the Samba Team as an Open Source project similar to the way the Linux kernel is developed.
This manpage was written by Jelmer Vernooij.
Закладки на сайте Проследить за страницей |
Created 1996-2024 by Maxim Chirkov Добавить, Поддержать, Вебмастеру |