Listen in promiscuous mode (Sniffer) on UDP port 162 and copy packetsto another port

Gerald Klix Gerald.Klix at klix.ch
Wed Oct 26 04:11:39 EDT 2005


Hi Henko,
the proper solution to this problem ist to use on libpcap's python bindings,
like for example Billy The Kid.

Here are some pointers:
http://home.student.utwente.nl/g.v.berg/btk/
http://pycap.sourceforge.net/
http://monkey.org/~dugsong/pypcap/
http://www.tcpdump.org/ (libpcap)

HTH Gerald

----- Original Message -----
From: Henko Gouws (H)
To: python-list at python.org
Sent: Tuesday, October 25, 2005 10:26 AM
Subject: Listen in promiscuous mode (Sniffer) on UDP port 162 and copy
packetsto another port


Dear reader

An application A opens UDP port 162 and listens for incoming packets.  We
have another application B that wants to receive the same information from
UDP port 162 but this application cannot open the port 162 because it is
already opened by application A.  We want both A and B to receive
information from port 162.

Does anyone know how to implement such a solution using Python or give
relevant advice?  Alternatively does anyone know about any postings that
involved Ethernet sniffers or Python programs listening to network traffic
in promiscuous mode?

Thank you

regards
Henko Gouws (Pr. Eng.)
Senior Engineer: Technical Product Development
Telkom Development Lab
Tel:  +27 12 529 7385
Fax: +27 12 548 0065

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This e-mail and its contents are subject to the Telkom SA Limited
e-mail legal notice available at
http://www.telkom.co.za/TelkomEMailLegalNotice.PDF
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~





--
http://mail.python.org/mailman/listinfo/python-list




More information about the Python-list mailing list