Re: Listen in promiscuous mode (Sniffer) on UDP port 162 and copypacketsto another port
the proper solution to this problem ist to use on libpcap's python bindings,
like for example Billy The Kid.
Here are some pointers:
----- Original Message -----
From: Henko Gouws (H)
Sent: Tuesday, October 25, 2005 10:26 AM
Subject: Listen in promiscuous mode (Sniffer) on UDP port 162 and copy
packetsto another port
An application A opens UDP port 162 and listens for incoming packets. We
have another application B that wants to receive the same information from
UDP port 162 but this application cannot open the port 162 because it is
already opened by application A. We want both A and B to receive
information from port 162.
Does anyone know how to implement such a solution using Python or give
relevant advice? Alternatively does anyone know about any postings that
involved Ethernet sniffers or Python programs listening to network traffic
in promiscuous mode?
Henko Gouws (Pr. Eng.)
Senior Engineer: Technical Product Development
Telkom Development Lab
Tel: +27 12 529 7385
Fax: +27 12 548 0065
This e-mail and its contents are subject to the Telkom SA Limited
e-mail legal notice available at
|All times are GMT. The time now is 11:59 AM.|
Powered by vBulletin®. Copyright ©2000 - 2013, vBulletin Solutions, Inc.
SEO by vBSEO ©2010, Crawlability, Inc.