[NTLUG:Discuss] snmptrap not appearing

Chris Cox cjcox at acm.org
Sun Sep 8 16:22:02 CDT 2002


jeremyb at univista.com wrote:
>  
> hey folks,
>   I'm tinkering with ettercap and have been watching traffic between my
> web server and
> the Linksys router I've got in front of this LAN.  I'm seeing an
> snmp-trap datagram
> every couple of seconds originating from the  router to the web server.
> I'm not converned about why the router is doing this at the moment...
> what I'm curious about is why I can't see ANY trace of these connections
> on the web server.

My LinkSys sends snmp traps to a desginated host for record keeping
of hits to the firewall.  Go to Log on the LinkSys tab'd menu.
I run snmptrapd to capture the messages on the host I designated
on the Log setup.

> I've tried the following commands:
> 
> netstat -an --inet
> netstat -an
> lsof | grep IPv4
> lsof | grep 162
> lsof | less

Not sure what you are looking for.  You can snoop the traffic with
something like tcpdump.

> 
> Here's a snip of what ettercap is showing me:
> 
> 101)     192.168.1.1:2395    <-->     192.168.1.2:162   ?   UDP  ?
> snmptrap 

I'm guessing that 192.168.1.2 is being setup as the
recipient of the access traps coming from the router.

> 
> Here are corosponding entries in /var/log/messages:
> 
> Sep  8 10:40:22 localhost kernel: Suspect short first fragment.
> Sep  8 10:40:22 localhost kernel: eth0 PROTO=1 192.168.1.1:0
> 192.168.1.2:0 L=20 S=0x00 I=0 F=0x0000 T=150 (#0)
> 
> For every ettercap snmptrap entry there are two messages entries like
> those above.
> Is this really snmp-trap or just some junk that the router is coughing
> up because it's
> got issues?  My next step is to bind port 162 using a little Perl script
> and just see what's what.  ...may do that just for kicks anyhow :)
> 

I'd run snmptrapd and capture the results so you can see everyone
who is pounding on your router.... an interesting experience.

Maybe I'm just not understanding the issue.

Ettercap is a great way to arp spoof your local switch (allowing
you to sniff traffic on the switch)... for more fun you could
try arp spoofing AT&T's switch... but since many abused this
recently, don't expect to be an AT&T customer very long if
you do this.  Still you can see what ports on the AT&T switch
are listening to your traffic... also an eye opening experience.
(as mentioned, probably not your neighbor, but AT&T doing this)

Have fun!
Chris





More information about the Discuss mailing list