use wire shark or SHARKNADO tool
On 10/09/2015 03:02 PM, Josh Luthman wrote:
Stream it =)
Josh Luthman
Office: 937-552-2340
Direct: 937-552-2343
1100 Wayne St
Suite 1337
Troy, OH 45373
On Fri, Oct 9, 2015 at 3:57 PM, That One Guy /sarcasm
<[email protected] <mailto:[email protected]>> wrote:
without dumping it to a server.
the sniffer doesnt seem to have a verbose option that ive read
On Fri, Oct 9, 2015 at 2:53 PM, Josh Luthman
<[email protected] <mailto:[email protected]>>
wrote:
tools > sniffer
Josh Luthman
Office: 937-552-2340 <tel:937-552-2340>
Direct: 937-552-2343 <tel:937-552-2343>
1100 Wayne St
Suite 1337
Troy, OH 45373
On Fri, Oct 9, 2015 at 3:52 PM, That One Guy /sarcasm
<[email protected] <mailto:[email protected]>>
wrote:
is there a way to get a tcpdump package onto mikrotik
On Fri, Oct 9, 2015 at 1:00 PM, Forrest Christian (List
Account) <[email protected]
<mailto:[email protected]>> wrote:
If you can capture the traffic, you may find that it
is legitimate traffic for a misconfigured domain.
I.e. some domain has their name servers listed
including that ip. A capture should show which
domain the query is for.
I seem to recall the sniffer functionality in a
mikrotik will either decode this, or more likely save
and/or stream it so that you can use Wireshark on a PC
to decode.
On Oct 9, 2015 9:12 AM, "That One Guy /sarcasm"
<[email protected]
<mailto:[email protected]>> wrote:
My policy on this interface is default deny, so it
is dropping them, but its still going on to just
the one IP out if the /28 subnet. I dont mind
dropping them, its not noticable bandwidth, I just
cant figure out why it is the traffic is focused
there, I almost wonder if I ws to stick a DNS
server on that IP if it would increase
On Fri, Oct 9, 2015 at 8:08 AM, David
<[email protected] <mailto:[email protected]>>
wrote:
DDOSDNS bot trying to find a live host for
pushing responses.
add rule
input udp dest-port 53 interface=to internet
drop in your firewall
hate those little bastards dont have anything
else to do except do what their programmed to do
On 10/08/2015 11:42 PM, That One Guy /sarcasm
wrote:
So I'm at home, turning up a subnet on a
mikrotik on the network. Mind you this subnet
hasn't been in use in 6 months. This is for
some servers so I create a default deny
policy with logging. One of the IPs is being
hammered on port 53 udp per the packet
sniffer. The IP isn't live, its just dropping
because of the policy. Its not much bandwidth
but as best I can tell its constantl and
different IPs.
Is the packet sniffer on these things similar
to tcpdump, the manual page didn't seem so.
All I can guess is these are part of
something I'm not related to and since this
IP hasn't been live in 6 months its spoofed
or something and these are some sort of
response packet to a denial of service
somewhere else.
but this subnet, not this particular IP, will
house a couple DNS servers, I just want to
make sure theres no shenanigans going on
before I turn anything up
Without being at the office to wireshark this
from a switch, how do I get more out of this
mikrotik packet sniffer
--
If you only see yourself as part of the team
but you don't see your team as part of
yourself you have already failed as part of
the team.
--
If you only see yourself as part of the team but
you don't see your team as part of yourself you
have already failed as part of the team.
--
If you only see yourself as part of the team but
you don't see your team as part of yourself you
have already failed as part of the team.
--
If you only see yourself as part of the team but you don't see
your team as part of yourself you have already failed as part of
the team.