OK i've made some progress..... here is where i'm at.

sudo tcpdump -vvv -i en0 dst 
ec2-52-25-111-41.us-west-2.compute.amazonaws.com and port 80 > 
~/Desktop/test

 

obviously writes the dump to a file that the destination is 
ec2-52-25-111-41.us-west-2.compute.amazonaws.com which is fine.

 

To verify  the dump I send it to the host that I wish it would get it to 
with the following command...

nc 10.0.1.120 9999 < ~/Desktop/test

and it works all fine, the host receives and parse it.

 

now with that logic is assumed that this would have worked but it's not.

sudo tcpdump -vvv -i en0 dst 
ec2-52-25-111-41.us-west-2.compute.amazonaws.com and port 80 | nc -D -v 
10.0.1.120 9999 &


at least now I know that weewx is running and that the interceptor is 
also running and working... 

just got to figure out how to get the a shell script running on my 
mac/router.....


On Monday, April 23, 2018 at 11:28:51 AM UTC-4, Lorin Tremblay wrote:
>
> I have tried those on the router/server (10.0.1.1):
>
> sudo tcpdump -vvv -i en0 dst 
> ec2-52-25-111-41.us-west-2.compute.amazonaws.com and port 80 | nc -D -v 
> 10.0.1.120 9999
>
> and 
>
> sudo tcpdump -vvv -i en0 dst 
> ec2-52-25-111-41.us-west-2.compute.amazonaws.com and port 80 | xargs -n 1 
> curl http://10.0.1.120:9999 -s -d -v
>
> and on the PI (10.0.1.120)
> I have those all running at the same time because i'm not sure anymore of 
> what it should be:
>
> sudo PYTHONPATH=/home/weewx/bin python /home/weewx/bin/user/interceptor.py 
> --device=observer --mode=sniff --iface=wlan0  --filter="src 10.0.1.144 and 
> dst port 9999"  --debug
>
> and
>
> sudo PYTHONPATH=/home/weewx/bin python /home/weewx/bin/user/interceptor.py 
> --device=observer --mode=sniff --iface=wlan0  --filter="src 10.0.1.1 and 
> dst port 9999"  --debug
>
> sudo PYTHONPATH=/home/weewx/bin python /home/weewx/bin/user/interceptor.py 
> --device=observer --mode=sniff --iface=wlan0  --filter="src 10.0.1.120 and 
> dst port 9999"  --debug
>
>
> and yet still no success....
>
>
> On Monday, April 23, 2018 at 11:17:23 AM UTC-4, jan hallink wrote:
>>
>>
>>
>> pi@raspberrypi:~ $ nwetstat -lpnt tn do
>> (Not all processes could be identified, non-owned process info
>>  will not be shown, you would have to be root to see it all.)
>> Active Internet connections (only servers)
>> Proto Recv-Q Send-Q Local Address           Foreign Address        
>>  State       PID/Program name    
>> tcp        0      0 0.0.0.0:22              0.0.0.0:*              
>>  LISTEN      -                   
>> tcp6       0      0 :::22                   :::*                    
>> LISTEN      -                   
>> pi@raspberrypi:~ $ exit
>>
>>>

-- 
You received this message because you are subscribed to the Google Groups 
"weewx-user" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to weewx-user+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to