| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Back To MAN Pages From BackTrack 5 R1 Master List
This resulting file can be compiled as a Wireshark plugin, and
used to monitor GIOP/IIOP traffic that is using this IDL.
idl2wrs is actually a shell script wrapper for two Python programs.
These programs are:
wireshark_gen.py - Contains the Source Code Generator Class
idl2wrs supports heuristic dissection of GIOP/IIOP traffic,
and some experimental code for explicit dissection, based on
Object Key <-> Repository Id mapping.
However, code for heuristic based plugins is
generated by default, and users should consider this the preferred
method unless you have some namespace collisions.
1. To write the C code to stdout.
2. To write to a file, just redirect the output.
The -p option passed to omniidl (inside idl2wrs) indicates where
wireshark_be.py and wireshark_gen.py will be searched. This may
need tweaking if you place these files somewhere else.
If it complains about being unable to find some modules (eg tempfile.py),
you may want to check if PYTHONPATH is set correctly.
eg: PYTHONPATH=/usr/lib/python1.5/
idl2wrs uses omniidl, an IDL parser, and can be found at
<http://omniorb.sourceforge.net/>
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast