log2pcap — Extract network traces from Samba log files
log2pcap
[-h] [-q] [logfile] [pcap_file]
This tool is part of the samba(7) suite.
log2pcap
reads in a
samba log file and generates a pcap file (readable
by most sniffers, such as ethereal or tcpdump) based on the packet
dumps in the log file.
The log file must have a log level
of at least 5
to get the SMB header/parameters
right, 10
to get the first 512 data bytes of the
packet and 50
to get the whole packet.
If this parameter is specified the output file will be a hex dump, in a format that is readable by the text2pcap utility.
Be quiet. No warning messages about missing or incomplete data will be given.
Samba log file. log2pcap will try to read the log from stdin if the log file is not specified.
Name of the output file to write the pcap (or hexdump) data to. If this argument is not specified, output data will be written to stdout.
Print a summary of command line options.
Extract all network traffic from all samba log files:
$
log2pcap < /var/log/* > trace.pcap
Convert to pcap using text2pcap:
$
log2pcap -h samba.log | text2pcap -T 139,139 - trace.pcap