log2pcap man page on SunOS

Man page or keyword search:  
man Server   20652 pages
apropos Keyword Search (all sections)
Output format
SunOS logo
[printable version]

LOG2PCAP(1)			 User Commands			   LOG2PCAP(1)

NAME
       log2pcap - Extract network traces from Samba log files

SYNOPSIS
       log2pcap [-h] [-q] [logfile] [pcap_file]

DESCRIPTION
       This tool is part of the samba(7) suite.

       log2pcap reads in a samba log file and generates a pcap file (readable
       by most sniffers, such as ethereal or tcpdump) based on the packet
       dumps in the log file.

       The log file must have a log level of at least 5 to get the SMB
       header/parameters right, 10 to get the first 512 data bytes of the
       packet and 50 to get the whole packet.

OPTIONS
       -h
	   If this parameter is specified the output file will be a hex dump,
	   in a format that is readable by the text2pcap utility.

       -q
	   Be quiet. No warning messages about missing or incomplete data will
	   be given.

       logfile
	   Samba log file. log2pcap will try to read the log from stdin if the
	   log file is not specified.

       pcap_file
	   Name of the output file to write the pcap (or hexdump) data to. If
	   this argument is not specified, output data will be written to
	   stdout.

       -h|--help
	   Print a summary of command line options.

EXAMPLES
       Extract all network traffic from all samba log files:

			  $ log2pcap < /var/log/* > trace.pcap

       Convert to pcap using text2pcap:

		$ log2pcap -h samba.log | text2pcap -T 139,139 - trace.pcap

VERSION
       This man page is correct for version 3 of the Samba suite.

BUGS
       Only SMB data is extracted from the samba logs, no LDAP, NetBIOS lookup
       or other data.

       The generated TCP and IP headers don't contain a valid checksum.

SEE ALSO
       text2pcap(1), ethereal(1)

AUTHOR
       The original Samba software and related utilities were created by
       Andrew Tridgell. Samba is now developed by the Samba Team as an Open
       Source project similar to the way the Linux kernel is developed.

       This manpage was written by Jelmer Vernooij.

ATTRIBUTES
       See attributes(5) for descriptions of the following attributes:

       ┌────────────────────┬─────────────────────────────────┐
       │  ATTRIBUTE TYPE    │	      ATTRIBUTE VALUE	      │
       ├────────────────────┼─────────────────────────────────┤
       │Availability	    │ SUNWsmbar, SUNWsmbac, SUNWsmbau │
       ├────────────────────┼─────────────────────────────────┤
       │Interface Stability │ External			      │
       └────────────────────┴─────────────────────────────────┘
NOTES
       Source code for Samba is available in the SUNWsmbaS package.

       Samba(7) delivers the set of four SMF(5) services as can be seen from
       the following example:

	    $ svcs samba wins winbind swat
	   STATE	  STIME	   FMRI
	   disabled	  Apr_21   svc:/network/samba:default
	   disabled	  Apr_21   svc:/network/winbind:default
	   disabled	  Apr_21   svc:/network/wins:default
	   disabled	  Apr_21   svc:/network/swat:default

       where the services are:

	"samba"
	   runs the smbd daemon managing the CIFS sessions

	"wins"
	   runs the nmbd daemon enabling the browsing (WINS)

	"winbind"
	   runs the winbindd daemon making the domain idmap

	"swat"
	   Samba Web Administration Tool is a service providing access to
	   browser-based Samba administration interface and on-line
	   documentation.  The service runs on software loopback network
	   interface on port 901/tcp, i.e. opening "http://localhost:901/" in
	   browser will access the SWAT service on local machine.

       Please note: SWAT uses HTTP Basic Authentication scheme where user name
       and passwords are sent over the network in clear text. In the SWAT case
       the user name is root. Transferring such sensitive data is advisable
       only on the software loopback network interface or over secure
       networks.

Samba 3.6			  04/10/2012			   LOG2PCAP(1)
[top]

List of man pages available for SunOS

Copyright (c) for man pages and the logo by the respective OS vendor.

For those who want to learn more, the polarhome community provides shell access and support.

[legal] [privacy] [GNU] [policy] [cookies] [netiquette] [sponsors] [FAQ]
Tweet
Polarhome, production since 1999.
Member of Polarhome portal.
Based on Fawad Halim's script.
....................................................................
Vote for polarhome
Free Shell Accounts :: the biggest list on the net