Archive for September, 2015
Bosch eBike Systems – uphill flow
Samstag, September 26th, 2015Prof. Dr. Gunter Dueck – Einsatz von Robotern und Computern im Gesundheitssystem der Zukunft
Freitag, September 25th, 2015Papst Franziskus hat die Staatengemeinschaft eindringlich gewarnt – dass sich die Menschheit aus materieller Gier und mangelndem Gerechtigkeitssinn selbst auslöschen könnte
Freitag, September 25th, 2015Ferrari 488 Spider – with blistering acceleration 0 to 100 km/h in 3s and 0 to 200 km/h in 8.7s
Freitag, September 25th, 2015Gaviapass (Passo di Gavia) – online webcam
Freitag, September 25th, 2015
Sparkassen Geldautomaten – sind in vielen Bundesländern ausgefallen wegen IT Problemen
Freitag, September 25th, 2015VMware vSphere – configuring „Promiscuous Mode“ on a virtual switch or portgroup
Freitag, September 25th, 2015VMware vSphere – by default a guest operating system’s virtual network adapter only receives frames that are meant for it. Placing the guest’s network adapter in promiscuous mode causes it to receive all frames passed on the virtual switch that are allowed under the VLAN policy for the associated portgroup. This can be useful for intrusion detection monitoring or if a sniffer needs to analyze all traffic on the network Segment
DevOps (a clipped compound of „development“ and „operations“) – is a software development method that stresses communication, collaboration, integration, automation, and measurement of cooperation between software developers and other information-technology (IT) professionals
Freitag, September 25th, 2015DevOps aids in software application release management for an organization by standardizing development environments. Events can be more easily tracked as well as resolving documented process control and granular reporting issues. Companies with release/deployment automation problems usually have existing automation but want to more flexibly manage and drive this Automation – without needing to enter everything manually at the command-line. Ideally, this automation can be invoked by non-operations employees in specific non-production environments. The DevOps approach grants developers more control of the environment, giving infrastructure more application-centric understanding
Wireshark – Packet Sniffing Usernames, Passwords and Web Pages
Donnerstag, September 24th, 2015Apple iOS 9.0.1 – jetzt verfügbar
Donnerstag, September 24th, 2015Noke Padlock – you unlock with your smartphone, eliminating the hassle and frustration of lost keys and forgotten combinations
Donnerstag, September 24th, 2015Noke Padlock – is the world’s first Bluetooth padlock you can easily share
Wireshark Network Analysis (Second Edition) – The Official Wireshark Certified Network Analyst Study Guide
Donnerstag, September 24th, 2015Volkswagen Passat TDI Fuel Efficient – Clean Diesel
Mittwoch, September 23rd, 2015Linux tcpdump command – capturing for viewing with Wireshark
Mittwoch, September 23rd, 2015Linux tcpdump command – allows you to save the packets that are captured so that you can use it for future analysis the saved file can be viewed by the same tcpdump command and you can also use open source software like Wireshark to read the tcpdump pcap files
See the list of interfaces on which tcpdump can listen:
# tcpdump -D
Listen on interface eth0:
# tcpdump -i eth0
Print a timestamp, as hours, minutes, seconds, and fractions of a second since midnight, preceded by the date, on each dump line:
# tcpdump -tttt
Record the packet capture to a file called „capture.cap“:
# tcpdump -w capture.cap
Display IP addresses and port numbers instead of domain and service names when capturing packets:
# tcpdump -nn
Capture any packets where the source host is 192.168.221.29.:
# tcpdump src host 192.168.221.29
Capture any packets where the destination host is 192.168.221.29.:
# tcpdump dst host 192.168.221.29
Capture any packets where the source network is 192.168.221.0/24. Display IP addresses and port numbers:
# tcpdump -nn src net 192.168.221.0/24
Capture any packets where the source port is is between 5000 and 5999 inclusive. Display IP addresses and port numbers:
# tcpdump -nn src portrange 5000-5999
Capture any packets with source IP 192.168.221.29 and destination port 5102. Display IP addresses and port numbers
# tcpdump -nn „src host 192.168.221.29 and src port 5102“
Capture all bytes of data within the packet:
# tcpdump -s 0
Capture network traffic every 60 seconds and write it to trace file which has time format directives:
# tcpdump -nn -G 60 -w ‚capture_%Y%m%d-%H%M%S.cap‘
Capture network traffic every 60 seconds and write it to rotating file which has time format for every minutes directives:
# tcpdump -i eth0 -G 3600 -w tcpdump-%H.pcap
Implement max file size limits and “log Rotation”:
# tcpdump -nn -C 100 -W 50 -w capture.cap
Kill process by name:
# killall tcpdump