Profile

4g8

4g8

NAME

4g8 - Packet Capture and Interception for Switched Networks

SYNOPSIS

4g8 -i <device> -g <gw_ip> -G <gw_mac> -s <host_ip> -S <host_mac> [-w file] [-Xh]

DESCRIPTION

4G8 allows you to capture traffic from a third party in a switched environment at the expense of a slight increase in latency to that third party host. Utilizing ARP cache poisoning, packet capture and packet reconstruction techniques, 4G8 works with nearly all TCP, ICMP and UDP IPv4 traffic flows.

Required parameters:

-g gw_ip
IP address of gateway to impersonate
-G gw_mac
MAC address of gateway to impersonate
-s host_ip
IP address of victim host
-S host_mac MAC address of victim host

OPTIONS

-h
Display this message
-i device
Device to listen on
-w file
Write captured data to file
-X
Dump the packet in hex and ascii

AUTHORS

4g8 was written by Darren Bounds <dbounds@intrusense.com>

This manpage was written by Marcela Tiznado <mlt@debian.org>

Latest Tech News
Your Notes

Sign in/Sign up

Signing in to our system allows you to post your contributions and vote on the contributions of others. It will also allow you to get extra perts like having your favorites in the cloud and having your persistent personal notes wherever you go. More will be added as we scale up our services.

By signing in to our system, you agree our Member Terms and Conditions


Sign-in with one of the following services

Almost finished!

Please select a screen name for NET SOUP.



 Please send me news and special offers from NET SOUP.

 I have read and accept the Terms of Use.

COMPLIMENTARY EXAMPLES

We have no example yet for this entry


Your Name
Now

Community Contributions and Discussions

Modify your search

View Documentation

Jobs from Indeed