First time accepted submitter Shalmendo writes "My client needs to monitor traffic on his LAN, particularly going out to the internet. This will include websites like Facebook, Myspace, and similar, including from mobile devices. So far, based on the network education I have, I've concluded that it might be best to get a tap (And some kind of recording system with wireshark, plausibly a mini-barebone), or replace the current Linksys router with a custom built mini barebone system with linux routing systems program and adapted storage retention etc to record traffic internally. (either way it looks like I will need to put in concert a mini barebone system for some purpose) My client is trying to protect his family from scammers and other unsavory types, and isn't savvy in this matter, so i'm doing it for him. What I need is a way to record the traffic at a singular point, like modem/router areas, or similar, and a way to scrape out Facebook, Myspace, and other messages. It also appears that the client's family is using iPhones and some game called 'words' which has message capability. Is it bounds
roget's ii: the new thesaurusmain entry:potential
part of speech:adjective
definition:capable of being but not yet in existence.
eventual to scrape messages out of that game's packets, or are they obfuscated? Can I write a script? What macos would you recommend? Linux routing OS? Can we sniff packets and drop them on the enclosed hard drive? or would a tap be better? How do I analyze and sort the data afterwards? my client needs easily read declaration (Such as text or screenshots) he can use as proof in confer with his family to try and intercede in any potentially harmful transactions. In other words, how can I Achieve this goal? I have basic and medium workout* in micro* networking, so I can make my own cables and such, but I've never worked on this exact kind of project before, and thought it might be better to query slashdot instead of do my own probe from scratch. After days of talk
with the client, it's not plausible to put monitoring ms-dos in the devices on the network (due to legal issues and a few other factors), so I concluded a network tap or other device would be the best way to capture and study what's going on."
Read more of this story at Slashdot.
More: - From the site