![]() |
![]()
| ![]() |
![]()
NAMEnetleakd - Network Leak Finder daemonSYNOPSISnetleakd [OPTIONS]DESCRIPTIONnetleakd is a network sniffer that gather packets sent by netleak(8) in the combined effort to detect network connectivity, or network leaks , between different network segments.OPTIONS
EXAMPLESTo just start looking for packets that netleak(8) produces by default:#$ netleakd If netleak(8) was conducting a sweep on 10.0.0.0/24 with default signature, ICMP as protocol and the spoofing address correctly pointing to the host netleakd is running on, a packet that got through would look like this: [!] Found leak (IP:) 10.0.0.3 (icmp 8:0) from 192.0.34.166 This tells us that the internal host "10.0.0.3" leaked an ICMP-echo response with signature "IP:" through the gateway "192.0.34.166", which is the leaking gateways ip-address on the Internet. "10.0.0.3" might be the gateway itself on the inside but remember that most responses will probably be workstations and when you actually detect leaks you get a whole bunch at a time - where one of them is the gateway. BUGSIf you find any please let me knowAUTHORJonas Hansen <jonas.v.hansen@gmail.com>FILES~/.netleakd/etc/netleakd.conf /usr/local/etc/netleakd.conf SEE ALSOnetleak (8)
|