Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 6 Jun 2002 15:18:49 -0300 (ART)
From:      Fernando Gleiser <fgleiser@cactus.fi.uba.ar>
To:        Sheldon Hearn <sheldonh@starjuice.net>
Cc:        <freebsd-questions@FreeBSD.ORG>
Subject:   Re: Sniffing HTTP requests off the wire
Message-ID:  <20020606151525.U82269-100000@localhost>
In-Reply-To: <3545.1023358851@axl.seasidesoftware.co.za>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, 6 Jun 2002, Sheldon Hearn wrote:

>
> Hi folks,
>
>
> I'm interested in the HTTP request and the IP address of the requesting
> host.  I'm also interested in the HTTP headers( like referer), cookie
> contents etc, but that's all secondary.
>
> I know I can just use 'tcpdump -s 1500 -x -X dst port 80' and
> cook the output myself, but I'm hoping there's already something out
> there that does the cooking for me.

Install tcpshow and it will cook the tcpdump output for you.
I use it and works like a charm, but you won't get CLF output


			Fer

>
> First prize would be to get output in common log format, as used by
> Apache, but obviously beggars can't be choosers.
>
> Anything in the ports tree?
>
> Ciao,
> Sheldon.
>
> To Unsubscribe: send mail to majordomo@FreeBSD.org
> with "unsubscribe freebsd-questions" in the body of the message
>


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020606151525.U82269-100000>