[ale] Monitor Internet Traffic
Darrell Golliher
darrell at golliher.net
Wed Aug 12 21:18:50 EDT 2015
Thanks or all the responses y’all. My need for sniffing has been satisfied — partly though your help and partly though some dumb luck / trial an error I determined what I need to about my Sharp TV.
cheers,
-Darrell
—http://golliher.net
On Wed, Aug 12, 2015 at 2:43 PM, Michael B. Trausch <mike at trausch.us>
wrote:
> On Wed, 2015-08-12 at 11:31 -0700, Darrell Golliher wrote:
>> Anybody have a easy to use way to listen in on a network connection
>> that uses a line based text protocol? In other words something that
>> taps into a telnet connection, but on a custom port. I’m looking
>> for something to show me exactly what is transpiring between my
>> networked Sharp TV and the Sharp remote control app.
>>
>> I tried wireshark, though I’m completely unskilled in its use. What
>> it produces for me does not look like the text based traffic I’m
>> looking for.
> If you know the <ip:port> tuple you wish to monitor, just use tcpdump
> (which you can use to save a file to later analyze in Wireshark).
> Also, common mistake: Telnet and raw TCP stream are *NOT* the same.
> Telnet specifies a network virtual terminal on top of the TCP socket,
> and a Telnet link isn't wholly binary clean. A raw TCP stream is just
> that. It just so happens that you can often use a telnet client to
> connect to a raw TCP stream because the Telnet commands are often
> ignored by ASCII/UTF-8 based layer 7 protocols. If you want to use a
> binary-safe method that doesn't inject any extra bytes into the stream,
> use netcat, socat, or similar tools.
> However, you should note that you may not find what you're looking
> for... commands over sockets are typically encoded and/or encrypted.
> Many first-screen/second-screen device pairings use HTTPS for the RPC
> communications. They often use text-based protocols for the RPC
> itself, but that information is wrapped in an encrypted session. In
> order to analyze that successfully, you'll have to find a way to insert
> a MITM between the remote and the TV. Even for an expert that can be
> difficult to impossible; you have to get both sides to trust your MITM
> before you can successfully capture and analyze, because in some cases
> the only way to MITM is to brute-force the ability to forge a CA
> signature (infeasible) or modify the software on both ends to disregard
> the trust checks (likely also infeasible).
> No matter how you go about it, you've quite a bit of learning to do in
> order to do network taps well, even if you're just looking for a
> solution to a one-off problem. Today's operating systems and
> components are so chatty and much of the traffic is signed, encrypted,
> or both, meaning you have to have high confidence in what you're
> looking at before you start making sense of it. I highly recommend
> practicing with tcpdump before moving on to Wireshark. You'll have a
> much better understanding of the capabilities of Wireshark then, and be
> able to use it better.
> — Mike
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.ale.org/pipermail/ale/attachments/20150812/0cdf24ff/attachment.html>
More information about the Ale
mailing list