-
Notifications
You must be signed in to change notification settings - Fork 9
/
urlsnarf.8
40 lines (40 loc) · 1.04 KB
/
urlsnarf.8
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
.TH URLSNARF 8
.ad
.fi
.SH NAME
urlsnarf
\-
sniff HTTP requests in Common Log Format
.SH SYNOPSIS
.na
.nf
.fi
\fBurlsnarf\fR [\fB-n\fR] [\fB-i \fIinterface\fR | \fB-p \fIpcapfile\fR] [[\fB-v\fR] \fIpattern [\fIexpression\fR]]
.SH DESCRIPTION
.ad
.fi
\fBurlsnarf\fR outputs all requested URLs sniffed from HTTP traffic in
CLF (Common Log Format, used by almost all web servers), suitable for
offline post-processing with your favorite web log analysis tool
(analog, wwwstat, etc.).
.SH OPTIONS
.IP \fB-n\fR
Do not resolve IP addresses to hostnames.
.IP "\fB-i \fIinterface\fR"
Specify the interface to listen on.
.IP "\fB-p \fIpcapfile\fR"
Process packets from the specified PCAP capture file instead of the network.
.IP \fB-v\fR
"Versus" mode. Invert the sense of matching, to select non-matching
URLs.
Specify the interface to listen on.
.IP \fIpattern\fR
Specify regular expression for URL matching.
.IP "\fIexpression\fR"
Specify a tcpdump(8) filter expression to select traffic to sniff.
.SH "SEE ALSO"
dsniff(8)
.SH AUTHOR
.na
.nf
Dug Song <dugsong@monkey.org>