You might find dumpcap works better than tshark with your suggested
solution.

Though this is a Wireshark mailing list, perhaps netcat would be useful to
try.

http://www.vulnwatch.org/netcat/

Look for:

-DGAPING_SECURITY_HOLE

here:

http://www.vulnwatch.org/netcat/readme.html

Good luck!

On 10/30/07, Travis Love <[EMAIL PROTECTED]> wrote:
>
> Okay, this is a bit trickier of a question than my last one.  I've been
> beating my head on this for a couple of weeks, and have almost nothing.  So
> here goes:
>
> I have a reasonably complex capture filter designed to capture packets
> from rogue DHCP servers on our network.  However, the boss wants something
> that will alert the tech using the machine that the filter is running on
> that he's got to hunt down a rogue.  The only solution I've thought of so
> far is to use tshark, dumping to a cap file, and have another script running
> concurrently to check the file every minute or so and alert the user if the
> size is larger than 0.
>
> There's got to be a better way than that, right?  Any ideas would be very
> much appreciated.
>
> -Travis
>
> _______________________________________________
> Wireshark-users mailing list
> Wireshark-users@wireshark.org
> http://www.wireshark.org/mailman/listinfo/wireshark-users
>
>
_______________________________________________
Wireshark-users mailing list
Wireshark-users@wireshark.org
http://www.wireshark.org/mailman/listinfo/wireshark-users

Reply via email to