Page 1 of 1

FYI: following SAB's traffic with tcpflow

Posted: November 10th, 2013, 8:11 am
by sander
Interesting (debug) command to follow SAB's traffic:

Code: Select all

sudo tcpflow -i any -C -e port 119
It will show all traffic via port 119. Useful if you get no traffic, or weird responses.

A very ugly way to filter out most of the body and focus a bit more on 'readable' stuff:

Code: Select all

sudo tcpflow -i any -C -e port 119 | grep -vi '\.\.'
Example of the tcpflow output when clicking on SAB's Test Server:

Code: Select all

201 Welcome to test.xennanews.com (nntpswitch)

ARTICLE <test@home>

430 No such article.


HTH