OK i've made some progress..... here is where i'm at. sudo tcpdump -vvv -i en0 dst ec2-52-25-111-41.us-west-2.compute.amazonaws.com and port 80 > ~/Desktop/test
obviously writes the dump to a file that the destination is ec2-52-25-111-41.us-west-2.compute.amazonaws.com which is fine. To verify the dump I send it to the host that I wish it would get it to with the following command... nc 10.0.1.120 9999 < ~/Desktop/test and it works all fine, the host receives and parse it. now with that logic is assumed that this would have worked but it's not. sudo tcpdump -vvv -i en0 dst ec2-52-25-111-41.us-west-2.compute.amazonaws.com and port 80 | nc -D -v 10.0.1.120 9999 & at least now I know that weewx is running and that the interceptor is also running and working... just got to figure out how to get the a shell script running on my mac/router..... On Monday, April 23, 2018 at 11:28:51 AM UTC-4, Lorin Tremblay wrote: > > I have tried those on the router/server (10.0.1.1): > > sudo tcpdump -vvv -i en0 dst > ec2-52-25-111-41.us-west-2.compute.amazonaws.com and port 80 | nc -D -v > 10.0.1.120 9999 > > and > > sudo tcpdump -vvv -i en0 dst > ec2-52-25-111-41.us-west-2.compute.amazonaws.com and port 80 | xargs -n 1 > curl http://10.0.1.120:9999 -s -d -v > > and on the PI (10.0.1.120) > I have those all running at the same time because i'm not sure anymore of > what it should be: > > sudo PYTHONPATH=/home/weewx/bin python /home/weewx/bin/user/interceptor.py > --device=observer --mode=sniff --iface=wlan0 --filter="src 10.0.1.144 and > dst port 9999" --debug > > and > > sudo PYTHONPATH=/home/weewx/bin python /home/weewx/bin/user/interceptor.py > --device=observer --mode=sniff --iface=wlan0 --filter="src 10.0.1.1 and > dst port 9999" --debug > > sudo PYTHONPATH=/home/weewx/bin python /home/weewx/bin/user/interceptor.py > --device=observer --mode=sniff --iface=wlan0 --filter="src 10.0.1.120 and > dst port 9999" --debug > > > and yet still no success.... > > > On Monday, April 23, 2018 at 11:17:23 AM UTC-4, jan hallink wrote: >> >> >> >> pi@raspberrypi:~ $ nwetstat -lpnt tn do >> (Not all processes could be identified, non-owned process info >> will not be shown, you would have to be root to see it all.) >> Active Internet connections (only servers) >> Proto Recv-Q Send-Q Local Address Foreign Address >> State PID/Program name >> tcp 0 0 0.0.0.0:22 0.0.0.0:* >> LISTEN - >> tcp6 0 0 :::22 :::* >> LISTEN - >> pi@raspberrypi:~ $ exit >> >>> -- You received this message because you are subscribed to the Google Groups "weewx-user" group. To unsubscribe from this group and stop receiving emails from it, send an email to weewx-user+unsubscr...@googlegroups.com. For more options, visit https://groups.google.com/d/optout.