Name | Modified | Size | Downloads / Week |
---|---|---|---|
ReadMe.txt | 2015-09-17 | 1.4 kB | |
SniffRouteMe (source and bin).zip | 2015-09-17 | 58.0 kB | |
Totals: 2 Items | 59.4 kB | 0 |
Use this application to sniff incoming packets on a local IPv4 interface and port, and if the source ip of the packet has not yet been detected, it will execute the defined program. Once you restart this program the cache of previous detected ip's is cleared. The %sourceIP is the source ip of the detected packet, %IFgateway is the gateway ip of the chosen interface (defaults to %sourceIP if no gateway detected), and %IFnumber is the chosen interface number. Click START to begin sniffing for packets. You can run any program using any parameters you choose, however the original purpose of this program is to AUTOMATICALLY configure a tcp/ip route in windows when otherwise you cannot communicate with the server because of an active VPN. Assuming you can normally connect to this computer when the VPN is not active then this program should work without any further firewall configuration. The first time you try to connect to the chosen interface and port you are sniffing/monitoring this application will define a route path which then enables you to directly transfer data over the native internet connection assuming you chose the physical internet interface (for example connecting to VNC/Teamviewer-over-ip when there is an active VPN). Only the second time you try to connect will it actually work. You can add -p to the parameters to make the route permanent.