FYI: following SAB's traffic with tcpflow
Posted: November 10th, 2013, 8:11 am
Interesting (debug) command to follow SAB's traffic:
It will show all traffic via port 119. Useful if you get no traffic, or weird responses.
A very ugly way to filter out most of the body and focus a bit more on 'readable' stuff:
Example of the tcpflow output when clicking on SAB's Test Server:
HTH
Code: Select all
sudo tcpflow -i any -C -e port 119
A very ugly way to filter out most of the body and focus a bit more on 'readable' stuff:
Code: Select all
sudo tcpflow -i any -C -e port 119 | grep -vi '\.\.'
Code: Select all
201 Welcome to test.xennanews.com (nntpswitch)
ARTICLE <test@home>
430 No such article.
HTH