⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 dsniff.8

📁 一个网络工具包,可以嗅探email和http等数据包中的密码等信息.注意要先把libnet-1.0.2a.tar.gz和 libnids-1.16.tar.gz装上,不然会因为缺少库函数而无法编译和安
💻 8
字号:
.TH DSNIFF 8.ad.fi.SH NAMEdsniff\-password sniffer.SH SYNOPSIS.na.nf.fi\fBdsniff\fR [\fB-c\fR] [\fB-d\fR] [\fB-m\fR] [\fB-n\fR] [\fB-i\fIinterface\fR] [\fB-s \fIsnaplen\fR] [\fB-f \fIservices\fR][\fB-t \fItrigger[,...]\fR]][\fB-r\fR|\fB-w\fR \fIsavefile\fR] [\fIexpression\fR].SH DESCRIPTION.ad.fi\fBdsniff\fR is a password sniffer which handles FTP, Telnet, SMTP,HTTP, POP, poppass, NNTP, IMAP, SNMP, LDAP, Rlogin, RIP, OSPF, PPTPMS-CHAP, NFS, VRRP, YP/NIS, SOCKS, X11, CVS, IRC, AIM, ICQ, Napster,PostgreSQL, Meeting Maker, Citrix ICA, Symantec pcAnywhere, NAISniffer, Microsoft SMB, Oracle SQL*Net, Sybase and Microsoft SQLprotocols..LP\fBdsniff\fR automatically detects and minimally parses eachapplication protocol, only saving the interesting bits, and usesBerkeley DB as its output file format, only logging uniqueauthentication attempts. Full TCP/IP reassembly is provided bylibnids(3)..LPI wrote \fBdsniff\fR with honest intentions - to audit my own network,and to demonstrate the insecurity of cleartext network protocols.Please do not abuse this software..SH OPTIONS.IP \fB-c\fRPerform half-duplex TCP stream reassembly, to handle asymmetricallyrouted traffic (such as when using arpspoof(8) to intercept clienttraffic bound for the local gateway)..IP \fB-d\fREnable debugging mode..IP \fB-m\fREnable automatic protocol detection..IP \fB-n\fRDo not resolve IP addresses to hostnames..IP "\fB-i \fIinterface\fR"Specify the interface to listen on..IP "\fB-s \fIsnaplen\fR"Analyze at most the first \fIsnaplen\fR bytes of each TCP connection,rather than the default of 1024..IP "\fB-f \fIservices\fR"Load triggers from a \fIservices\fR file..IP "\fB -t \fItrigger\fR[,...]"Load triggers from a comma-separated list, specified as\fIport\fR/\fIproto\fR=\fIservice\fR (e.g. 80/tcp=http)..IP "\fB-r \fIsavefile\fR"Read sniffed sessions from a \fIsavefile\fR created with the \fB-w\fRoption..IP "\fB-w \fIfile\fR"Write sniffed sessions to \fIsavefile\fR rather than parsing andprinting them out..IP "\fIexpression\fR"Specify a tcpdump(8) filter expression to select traffic to sniff..LPOn a hangup signal \fBdsniff\fR will dump its current trigger table to\fIdsniff.services\fR..SH FILES.IP \fI/usr/local/lib/dsniff.services\fRDefault trigger table.IP \fI/usr/local/lib/dsniff.magic\fRNetwork protocol magic.SH "SEE ALSO"arpspoof(8), libnids(3), services(5), magic(5).SH AUTHOR.na.nfDug Song <dugsong@monkey.org>.SH BUGS\fBdsniff\fR's automatic protocol detection feature is based on theclassic file(1) command by Ian Darwin, and shares its historicallimitations and bugs.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -