Linux - NetworkingThis forum is for any issue related to networks or networking.
Routing, network cards, OSI, etc. Anything is fair game.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
i am running ethereal and capturing packets while i chat with my friend on aol instant messager. The wierd thing is that i dont see his ip as the source. do i have something set up wrong? how do i enable it so i can see his ip?
Most IM services including AIM use a server to comunicate and do not connect directly. This is partly designed to stop you doing exactly what you are trying. The system is as follows:
obviously, my intentions are misunderstood but guess what, "I don't care!" hmmmm...... how bout that! Yeah, i am trying to track the ip thru aol im. of course, I ALREADY KNOW HIS IP!!!! Damn, he's my friend. In fact, he is the sys admin for the ISP!!!!!! In fact, if i wanted to reroute all his traffic to my box and watch it, i have his full permission and since he is the person they call when you do something like that i would be allowed to do it. So basically, if you are dogging me for thinking i want to hack people and screw there stuff up then this is for you,
"FUCK YOU!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!"
and if you kick me off the board for this message i dont care either
sorry if i got pissed but i hack for my own security purposes and i am trying to learn and it is very discouraging to not be helped or accused otherwise
Originally posted by phishintrip sorry if i got pissed but i hack for my own security purposes and i am trying to learn and it is very discouraging to not be helped or accused otherwise
I wasn't saying you were trying to hack him - I was merely pointing out that tracking his IP via AIM will not be possible since you NEVER communicate with HIM directly. ALL communication goes via a server.
sorry i got so mad then, its just that sometimes when i dont get responses to questions i feel like its because people think i am trying to hack other people and thats been happening a lot lately especially when i ask questions about ethereal. I am a complete noob and i realize there are lots of scriptkiddies and malicious peoples but i have been trudging thru a lot of this crap to find real info about how tcp/ip works, where weaknesses are, etc. I plan to set up a web server and intranet at my company soon and i figure the only way to be secure is to know the holes. I do have full permission from my ISP (well, he's my good friend so) and the owner of the computer (same person) to do all the hacking stuff i want as long as i dont mess anything up. With that in mind if i ask questions that seem like i am trying to hack people, I am. Mostly, that person is myself and if not its my friend that is helping me learn. He is the sys admin so he doesn't have a lot of time to answer my dumb noob questions so i come here where i have not gotten the response i am looking for most of the time. I get shit like a samba question (which i know people use) with like 50 views and no responses. I am the one that just assumed that this is because i try to hack because my friends at work accuse me of hacking there machine every time their windows crashes. I try to explain to them that that is in windows nature. It doesn't need to be hacked to crash. Anyway, sorry for the language!
well there is 1 hell of a funny story on grc.com where the guy was ddos'd by a 13 year old.
Most applications with big names are supposed to make us feel as secure as possible. Application services like 'instant messaging' would require the use of a central server, just to make sure that not malicious activity would be going on. Imagine all the people using AIM or ICQ, imagine if their computer information was handy if they just signed on.
I know a few years back, ICQ could be patched to let you know the persons ip. But most those days are gone.
You just need to understand connections.
Going to use aim as the topic discussion:
John begins chatting with Jane.
John wants to show Jane a picture he has.
John requests a direct connection to Jane, and Jane accepts.
Now John inserts his picture and sends it to Jane, Jane likes the bondage picture .
Eventually John gets disconnected from AIM, but left the window he had with Jane up. (Little did he know, his kid brother signed on as him in the other room)
Soon thereafter John still recieves messages from Jane, even though he is not 'signed' on AIM.
How?
This is a pretty normal cause to use a server for regular chatting.
lol............bondage is so cool!! <--- in a cartman kinda voice
allright i understand now
here's another question then, when i am setting up my iptables should i just build a set of rules in the INPUT, OUTPUT, FORWARD chains (or tables i guess) or should i create my own tables and send things thru those?
What is the reason for having a table like say 'Red Hat 9.0' or something like that that you see with the red hat standard firewall?
i dunno cause they feel obligated to make it non standard and confusing?
btw the answer was that john and jane setup a tcp connection with each other outside the server.
You aren't really going to want to setup a input chain firewall, if hes going to pass you traffic, but you will want to setup a deviated forward setup to just sniff the traffic.
your going to want to enable ipv4 forwarding, and i pray you have a hugh bandwidth connection, or he has a small client base :P
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.