1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40
|
.TH URLSNARF 8
.ad
.fi
.SH NAME
urlsnarf
\-
sniff HTTP requests in Common Log Format
.SH SYNOPSIS
.na
.nf
.fi
\fBurlsnarf\fR [\fB-n\fR] [\fB-i \fIinterface\fR | \fB-p \fIpcapfile\fR] [[\fB-v\fR] \fIpattern [\fIexpression\fR]]
.SH DESCRIPTION
.ad
.fi
\fBurlsnarf\fR outputs all requested URLs sniffed from HTTP traffic in
CLF (Common Log Format, used by almost all web servers), suitable for
offline post-processing with your favorite web log analysis tool
(analog, wwwstat, etc.).
.SH OPTIONS
.IP \fB-n\fR
Do not resolve IP addresses to hostnames.
.IP "\fB-i \fIinterface\fR"
Specify the interface to listen on.
.IP "\fB-p \fIpcapfile\fR"
Process packets from the specified PCAP capture file instead of the network.
.IP \fB-v\fR
"Versus" mode. Invert the sense of matching, to select non-matching
URLs.
Specify the interface to listen on.
.IP \fIpattern\fR
Specify regular expression for URL matching.
.IP "\fIexpression\fR"
Specify a tcpdump(8) filter expression to select traffic to sniff.
.SH "SEE ALSO"
dsniff(8)
.SH AUTHOR
.na
.nf
Dug Song <dugsong@monkey.org>
|