Telnet question
Ken D'Ambrosio
ken at jots.org
Fri May 29 10:39:58 UTC 2020
On 2020-05-29 03:08, Phil wrote:
> On 29/5/20 3:01 pm, Rashkae wrote:
>> As for intercepting the commands sent by your program, you can use
>> something like wireshark to snoop on the network packets.
A little more info to help you conceptualize stuff. For the VAST
majority of services/daemons, each incoming connection is essentially a
dedicated, point-to-point connection. The daemon spawns a daughter
process to handle each individual connection, and that's why you can't
see what's going on with telnet (which is just another connection, at
the end of the day).
Also, firing up Wireshark and doing a capture will show a LOT of stuff
unless you close down your browser windows, SSH sessions, etc. And even
then, you'll be seeing normal broadcast traffic (e.g., ARP requests,
etc.). So what you might want to do is to specify in the "using this
filter" field either the port you want to sniff ("port 1234") or the
host you're talking to ("host 1.2.3.4"), or both ("port 1234 and host
1.2.3.4"). Probably best to click the "any" interface, assuming you're
running Linux; I don't remember if that exists for Windows or not, but
with the above info, you have enough to do some trial and error without
being spammed by a zillion extraneous network packets.
Good luck!
-Ken
More information about the ubuntu-users
mailing list