50241faa57
This version of the sniffer supports packet filtering after the packet count variable, like so: meterpreter > sniffer_interfaces 1 - 'eth0' ( type:0 mtu:1514 usable:false dhcp:false wifi:false ) 2 - 'any' ( type:0 mtu:1514 usable:false dhcp:false wifi:false ) 3 - 'lo' ( type:0 mtu:1514 usable:false dhcp:false wifi:false ) meterpreter > use sniffer Loading extension sniffer...success. meterpreter > sniffer_start 1 500000 icmp <-- picks up only icmp packets. [*] Capture started on interface 1 (500000 packet buffer) meterpreter > sniffer_stop 1 [*] Capture stopped on interface 1 git-svn-id: file:///home/svn/framework3/trunk@10424 4d416f70-5f16-0410-b530-b9f4589650da
31 lines
1.0 KiB
Makefile
31 lines
1.0 KiB
Makefile
VPATH=../../source/extensions/sniffer
|
|
|
|
OPENSSL=${PWD}/../../source/openssl/include
|
|
COMMON=${PWD}/../../source/common
|
|
SERVER=../../source/server
|
|
PCAP=../../source/libpcap
|
|
|
|
CFLAGS=-fno-stack-protector -nostdinc -nostdlib -fPIC -DPIC -g -Wall
|
|
CFLAGS+=-D_UNIX -D__linux__
|
|
CFLAGS+=-I${COMMON} -I${SERVER} -I${OPENSSL} -I${PCAP}
|
|
CFLAGS+= -I ../../source/bionic/libc/include -I ../../source/bionic/libc/kernel/common/linux/ -I ../../source/bionic/libc/kernel/common/ -I ../../source/bionic/libc/arch-x86/include/
|
|
CFLAGS+= -I ../../source/bionic/libc/kernel/arch-x86/
|
|
CFLAGS+= -Dwchar_t="char" -fno-builtin -D_SIZE_T_DECLARED -DElf_Size="u_int32_t"
|
|
CFLAGS+= -D_BYTE_ORDER=_LITTLE_ENDIAN
|
|
CFLAGS+= -lgcc -L../../source/bionic/compiled -gstabs+
|
|
CFLAGS+= -fPIC -Os
|
|
CFLAGS+= -I../../source/extensions/networkpug -lc -lpcap -lsupport -lmetsrv_main
|
|
CFLAGS+= -I.
|
|
|
|
objects = sniffer.o
|
|
|
|
all: ext_server_sniffer.so
|
|
|
|
|
|
ext_server_sniffer.so: $(objects)
|
|
$(CC) -shared $(CFLAGS) -o $@ $(objects)
|
|
|
|
.PHONY: clean
|
|
clean:
|
|
rm -f *.o *.so *~; rm -f $(objects)
|