Ask Your Question

Revision history [back]

click to hide/show revision 1
initial version

forward capture from pipe to virtual NIC

Hi!

I have a script running (fritzdump.sh) which captures the traffic directly from my router into a pipe:

wget --no-check-certificate -qO- $FRITZIP/cgi-bin/capture_notimeout?ifaceorminor=$IFACE\&snaplen=\&capture=Start\&sid=$SID | /usr/bin/tshark -r -

I would like to "forward" this traffic to a service (on the same machine) which analyzes the traffic for VoIP data (http://oreka.sourceforge.net/).

Is this possible with tshark?

Something like:

programname -i - -OPTION_FOR_FORWARD_TRAFFIC_TO_VIRTUAL_IP_WHICH_CAN_BE_ANALYZED_BY_ANOTHER_TOOL

Capturing the traffic frist to a pcap file and then analyzing with wireshark is way to complicated. I am looking for an automated solution. I don't want to save pcap -> open pcap in wireshark -> analyze for VoIP -> export to Audio

greetz duffy6

forward capture from pipe to virtual NIC

Hi!

I have a script running (fritzdump.sh) which captures the traffic directly from my router into a pipe:

wget --no-check-certificate -qO- $FRITZIP/cgi-bin/capture_notimeout?ifaceorminor=$IFACE\&snaplen=\&capture=Start\&sid=$SID | /usr/bin/tshark -r -

I would like to "forward" this traffic to a service (on the same machine) which analyzes the traffic for VoIP data (http://oreka.sourceforge.net/).

Is this possible with tshark?

Something like:

programname -i - -OPTION_FOR_FORWARD_TRAFFIC_TO_VIRTUAL_IP_WHICH_CAN_BE_ANALYZED_BY_ANOTHER_TOOL

Capturing the traffic frist to a pcap file first and then analyzing with wireshark is way to complicated. I am looking for an automated solution. I don't don't want to to:

save pcap -> open pcap in wireshark -> analyze for VoIP -> export to Audio

greetz duffy6