You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
nohup tcpdump -i nflog:${userId} -w ${pcapPath} > /dev/null 2>&1 &
`
but I cannot analyse this pcap, because the packet wrapped by "Linux Netfilter NFLOG".
The text was updated successfully, but these errors were encountered:
I think you are suggesting that mercury support the PCAP LINKTYPE for Netfilter https://www.tcpdump.org/linktypes/LINKTYPE_NFLOG.html, and parse the packet payload from that LINKTYPE and apply normal packet processing to it. Is that right? Thanks!
I captured packets through following codes on Android devices
`
iptables -A OUTPUT -p udp --dport 53 -j CONNMARK --set-mark ${userId}
iptables -A OUTPUT -m owner --uid-owner ${userId} -j CONNMARK --set-mark ${userId}
iptables -A INPUT -m connmark --mark ${userId} -j NFLOG --nflog-group ${userId}
iptables -A OUTPUT -m connmark --mark ${userId} -j NFLOG --nflog-group ${userId}
nohup tcpdump -i nflog:${userId} -w ${pcapPath} > /dev/null 2>&1 &
`
but I cannot analyse this pcap, because the packet wrapped by "Linux Netfilter NFLOG".
The text was updated successfully, but these errors were encountered: