mirror of
https://git.FreeBSD.org/ports.git
synced 2024-11-04 22:33:27 +00:00
40 lines
891 B
Plaintext
40 lines
891 B
Plaintext
tcpdump(1) hacked to better understand SMB packets.
|
|
smbtcpdump gives the ability to interpret NBT and SMB packets in a fair bit
|
|
of detail.
|
|
|
|
To capture all SMB packets going to or from host "fred" try this:
|
|
|
|
tcpdump -i eth0 -s 1500 port 139 host fred
|
|
|
|
If you want name resolution or browse packets then try ports 137 and
|
|
138 respectively.
|
|
|
|
Example Output:
|
|
|
|
Here is a sample of a capture of a "SMBsearch" directory search. If
|
|
you don't get output that looks like this then smbtcpdump is not working
|
|
correctly.
|
|
|
|
NBT Session Packet
|
|
Flags=0x0
|
|
Length=57
|
|
|
|
SMB PACKET: SMBsearch (REQUEST)
|
|
SMB Command = 0x81
|
|
Error class = 0x0
|
|
Error code = 0
|
|
Flags1 = 0x8
|
|
Flags2 = 0x3
|
|
Tree ID = 2048
|
|
Proc ID = 11787
|
|
UID = 2048
|
|
MID = 11887
|
|
Word Count = 2
|
|
smbvwv[]=
|
|
Count=98
|
|
Attrib=HIDDEN SYSTEM DIR
|
|
smbbuf[]=
|
|
Path=\????????.???
|
|
BlkType=0x5
|
|
BlkLen=0
|