Provided by: sniffit_0.5-3ubuntu1_amd64 bug

NAME

       sniffit - packet sniffer and monitoring tool

SYNOPSIS

       sniffit  [-xdabvnN]  [-P proto ] [-A char ] [-p port ] [(-r|-R) recordfile ] [-l sniflen ] [-L logparam ]
       [-F snifdevice ] [-D tty ] [-M plugin ] [(-t Target-IP | -s Source-IP ) | (-i|-I) | -c config-file ]

DESCRIPTION

       sniffit is a packet sniffer for TCP/UDP/ICMP  packets.   sniffit  is  able  to  give  you  very  detailed
       technical  info  on  these  packets  (SEQ,  ACK,  TTL, Window, ...) but also packet contents in different
       formats (hex or plain text, ...).

       sniffit can by default handle ethernet and PPP devices, but can easily be forced into using other devices
       (read the README.FIRST and sn_config.h files on this subject!)

       The sniffer can easily be configured in order to 'filter' the incoming  packets  (to  make  the  sniffing
       results easier to study). The config file (see sniffit(5) ) allows you to be very specific on the packets
       to be processed.

       sniffit  also  has  an  interactive  mode  for  active  monitoring,  and  can also be used for continuous
       monitoring on different levels.

NOTE

       This man page is supposed to be a reference manual. So please read README.FIRST first, and use this  only
       for better understanding or for a quick check on the use of sniffit

OPTIONS

       -v     Shows the version of sniffit you are running and exits (overrides all)

       -t Target-IP
              Only process packets TO Target-IP. If Target-IP is in dot-nr notation, ´x' is allowed as wildcard.
              (e.g. '-t 157.193.x', '-t x', ...)  (NOT compatible with: '-s' '-i' '-I' '-c' '-v' '-L')

       -s Source-IP
              Similar  to  '-t', only process packets FROM Source-IP.  (NOT compatible with: '-t' '-i' '-I' '-c'
              '-v' '-L')

       -b     ´both' mode, together with '-s' or '-t', only process FROM/TO the IP specified  by  '-s'  or  '-t'
              (NOT compatible with: '-t' '-i' '-I' '-c' '-v' '-L')

       -c config-file
              Use config-file for the packet filtering. This allows you to be very specific on the packets to be
              processed  (see  sniffit(5) for details on the format).  (NOT compatible with: '-t' '-s' '-i' '-I'
              '-v' '-L')

       -i     Launch the ncurses interface for active monitoring ('interactive mode').  (NOT  available  if  you
              compiled  without  INTERACTIVE support see sn_config.h and README.FIRST ) (one of the options '-t'
              '-s' '-i' '-I' '-c' is required) (NOT compatible with: '-t' '-s' '-c' '-v' '-L')

       -I     Same as '-i', but gives you more information.  (one of the options '-t' '-s'  '-i'  '-I'  '-c'  is
              required) (NOT compatible with: '-t' '-s' '-c' '-v' '-L')

       -R <file>
              Record  all traffic in <file> This file can then be fed to Sniffit with the '-r' option.  (Needs a
              selection parameter like '-c' '-t' '-s') (NOT compatible with '-i' '-I' '-v' '-L' '-r')

       -r <file>
              This option feeds the recorded <file> to sniffit.  It requires the '-F' option  with  the  correct
              device. Suppose you log a file on a machine with 'eth0'. When feeding the logged file to sniffit ,
              you  will  need to add '-F eth0' or '-F eth' to the command line. It doesn't need much explanation
              that using '-i' or '-I' in combination with '-r' makes no sense (at this moment).  (requires '-F',
              NOT compatible with '-R' '-i' '-I')

       -n     Turn of IP checksum checking. This can show you bogus packets.  (mind you ARP, RARP, other  non-IP
              packets will show up bogus too) (compatible with ALL options)

       -N     Don't  perform  any  of  the  build  in  Sniffit  functions.  Useful  for  only  running a Plugin.
              (compatible with ALL options)

       -x     Prints extended info on TCP packets to stdout (SEQ, ACK, Flags, etc...)  Interesting when  tracing
              spoofs,  packet  loss and other real net debugging/checking tasks.  (if you want to log this, pipe
              stdout to a file) (NOT compatible with: '-i' 'I' '-v')

       -d     ´dump mode', shows the packets on the screen (stdout) instead of  logging  into  files  (default).
              Data is printed in bytes (hex).  (NOT compatible with: '-i' 'I' '-v' '-L')

       -a     ´dump  mode',  same of '-d' but outputs ASCII. Non printable chars are replaced by '.'.  ('-d' and
              '-a' mix without any problem) (NOT compatible with: '-i' '-I' '-v' '-L')

       -P proto
              Specify the protocols that should be processed (default TCP). Possible options currently are:  IP,
              TCP, ICMP, UDP. They can be combined.  IP, ICMP, UDP info is dumped to stdout. IP gives ADDITIONAL
              info  on  the  IPwrapping  around  other  packets,  it  is not needed to specify IP for TCP packet
              logging.  IP, ICMP packets are not filtered (UDP packets are as of 0.3.4).  (NOT compatible  with:
              '-i' '-I' '-v' '-L')

       -A char
              When  in 'normal mode' (not '-d','-a','-i','-I','-L'), all non-printable chars will be replaced by
              char (NOT compatible with: '-a' '-d' '-i' '-I' '-v' '-L')

       -p port
              Only checks packets going TO (!!)  port port , 0 means  all  ports,  default  is  0  (all).   (NOT
              compatible with: '-c' '-i' '-I' '-v' '-L')

       -l sniflen
              Amount  of  data  to  log  (default  300 bytes) in 'normal mode'. The first sniflen bytes of every
              connection are logged. Length 0 logs means everything. (look out with diskspace!)  (NOT compatible
              with: '-i' '-I' '-v' '-L')

       -F snifdevice
              Force sniffit to use a certain network  device.   snifdevice  can  be  found  with  ifconfig  (see
              ifconfig(8)).  sniffit supports ethernet and PPP by default. Read README.FIRST for info on forcing
              the use of other devices.  (compatible with ALL options)

       -D tty All logging output will be send to that device.  (ONLY works with '-i' and '-I')

       -M plugin
              Activate  Plugin  nr.   Plugin  ,  for a list on all plugins compiled in your version, just type '
              sniffit ´. Read all about Plugins in the PLUGIN-HOWTO (READ IT!)  (NOT compatible with: '-i'  '-I'
              '-v')

       -L logparam
              Use  sniffit  as  a  monitoring  tool and enable different logging modes ( logparam ) The File for
              logging can be specified in the config file (see sniffit(5)  )  but  is  sniffit.log  by  default.
              Different logparam can be combined.  (ONLY works with '-c')

NORMAL MODE

       A  bunch  of  sniflen  initial  bytes  (default  300) of each connection is logged into a file x.x.x.x.p-
       y.y.y.y.o where 'x.x.x.x' is the sending host (port 'p') and 'y.y.y.y' the receiving host (port 'o').

DUMP MODE ('-d' and/or '-a')

       Output is dumped to stdout, the packet contents is shown in it's unwrapped form (the complete IP packet).

INTERACTIVE MODE ('-i' or '-I')

       Keys available in interactive mode:

       'UP or 'k'
              self explanatory

       DOWN or j'
              self explanatory

       F1 or '1'
              Enter a host (enter 'all' for no mask) for packet filtering (host that sends the packets)

       F2 or '2'
              Enter a host (enter 'all' for no mask) for packet filtering. (host that receives the packets)

       F3 or '3'
              Enter a port (enter '0' for no mask) for packet filtering. (host that sends the packets)

       F4 or '4'
              Enter a port (enter '0' for no mask) for packet filtering. (host that receives the packets)

       F5 or '5'
              Start a program 'sniffit_key5' with arguments <from IP> <from port>  <to  IP>  <to  port>  If  the
              program  doesn't exist, nothing is done. Sniffit should be in the same path as sniffit was STARTED
              FROM (not necessarily the path sniffit is stored in)  This  function  is  useful  for  interactive
              connection  killing  or extra monitoring. A little shell script can always transform the arguments
              given and pass them on to other programs.

       F6 or '6'
              Same as F5 or '5', but with program 'sniffit_key6'

       F7 or '7'
              Same as F5 or '5', but with program 'sniffit_key7'

       F8 or '8'
              Same as F5 or '5', but with program 'sniffit_key8'

       ENTER  a window will pop up and log the connection, or the connection output will be  send  at  a  chosen
              device if you used the '-D' option.

       'q'    When in logging mode, stop logging. Otherwise, quit.

       'n'    Toggle netstatistics. These are sampled at 3 secs, look in the sn_config.h file to change this.

       'g'    Sniffit  is  now able to generate some traffic load. Currently this is a 'underdevelloped' feature
              with very few options, but it will be expanded a lot.  Currently only UDP packets  are  generated.
              When  pressing 'g' you will be asked the source/dest IP/port and how much packets are needed to be
              transmitted.  Packets contain the line: "This Packet was fired with Sniffit!

       'r'    Reset.. clears all current connections from memory and restarts.

LOGGING MODE ('-L')

       Output is saved to sniffit.log , unless you have specified some  other  name  in  the  config  file  (see
       sniffit(5) ).

       raw    Log  all  SYN,  FIN,  RST packets. This will give you an overview of all network (TCP) trafic in a
              'RAW' way (a connection starting could gives you at least 2 SYN packets, etc...).

       norm   Same as raw, but a bit more intelligent. Unless packets are transmitted multiple times because  of
              packet  loss,  you  will only get 1 notice of a connection starting or ending. (the packet id will
              give you the host that initiated the connection first)

       telnet Sniffit will try to catch login and passwords for this application. (see telnet(1) )

       ftp    Sniffit will try to catch login and passwords for this application.  (see ftp(1) )

       mail   Sniffit will try to identify all mail that was logged.

IP ICMP UDP LOGGING

       Information on these packets is dumped to stdout. Packet Filtering options only  refer  to  TCP  and  UDP
       packets.  The contents of UDP packets is only shown when enabling '-a' or '-d'.

AUTHOR

       Brecht Claerhout <coder@reptile.rug.ac.be>

SEE ALSO

       sniffit(5)

                                                                                                      SNIFFIT(8)