W4GPL
07-24-2013, 06:40 AM
Possible dumb question -- Does anyone happen to know...
Is it possible to get the process ID (or name) of the traffic being dumped with wireshark or tcpdump?
E.g. 'tshark -i wlan0 -f "udp port 53"'
I'd like to know what processes are making the DNS request. I know this can be done with lsof -i or netstat -pnu but I'm looking for something real time and constant.
------------------------------------
Completely unrelated note -- I've discovered that if you're using DNS prefetching ("predict network actions to improve page load performance") in Chrome, your DNS won't be sent over your SOCKS5 proxy, if you're using one. Just a FYI if you're concerned about privacy leaks on a public wifi.. or elsewhere.
Is it possible to get the process ID (or name) of the traffic being dumped with wireshark or tcpdump?
E.g. 'tshark -i wlan0 -f "udp port 53"'
I'd like to know what processes are making the DNS request. I know this can be done with lsof -i or netstat -pnu but I'm looking for something real time and constant.
------------------------------------
Completely unrelated note -- I've discovered that if you're using DNS prefetching ("predict network actions to improve page load performance") in Chrome, your DNS won't be sent over your SOCKS5 proxy, if you're using one. Just a FYI if you're concerned about privacy leaks on a public wifi.. or elsewhere.