THIS IS A TEST INSTANCE. Feel free to ask and answer questions, but take care to avoid triggering too many notifications.

Revision history  [back]

forward capture from pipe to virtual NIC

Hi!

I have a script running (fritzdump.sh) which captures the traffic directly from my router into a pipe:

wget --no-check-certificate -qO- $FRITZIP/cgi-bin/capture_notimeout?ifaceorminor=$IFACE\&snaplen=\&capture=Start\&sid=$SID | /usr/bin/tshark -r -

I would like to "forward" this traffic to a service (on the same machine) which analyzes the traffic for VoIP data (http://oreka.sourceforge.net/).

Is this possible with tshark?

Something like:

programname -i - -OPTION_FOR_FORWARD_TRAFFIC_TO_VIRTUAL_IP_WHICH_CAN_BE_ANALYZED_BY_ANOTHER_TOOL

Capturing the traffic to a pcap file first and then analyzing with wireshark is way to complicated. I am looking for an automated solution. I don't want to:

save pcap -> open pcap in wireshark -> analyze for VoIP -> export to Audio

greetz duffy6

forward capture from pipe to virtual NIC

Hi!

I have a script running (fritzdump.sh) which captures the traffic directly from my router into a pipe:

wget --no-check-certificate -qO- $FRITZIP/cgi-bin/capture_notimeout?ifaceorminor=$IFACE\&snaplen=\&capture=Start\&sid=$SID | /usr/bin/tshark -r -

I would like to "forward" this traffic to a service (on the same machine) which analyzes the traffic for VoIP data (http://oreka.sourceforge.net/).

Is this possible with tshark?

Something like:

programname -i - -OPTION_FOR_FORWARD_TRAFFIC_TO_VIRTUAL_IP_WHICH_CAN_BE_ANALYZED_BY_ANOTHER_TOOL

Capturing the traffic frist to a pcap file first and then analyzing with wireshark is way to complicated. I am looking for an automated solution. I don't don't want to:

to save pcap -> open pcap in wireshark -> analyze for VoIP -> export to Audio

greetz duffy6