![]() ![]() The goal is to detect the peripheral connection with powershell alone. I have adjacent solutions in python with scapy (3-12mb compiled, and I'm the only one comfortable w/ python) and can come up with something using tshark, but we'd rather not use tshark if we can avoid it. Note that method matters: it's not that I don't have some way to do this. What is the proper way to detect or watch what happens during a ping -t IPADDR command in Windows? The problem is that netstat either cannot see the ping -t command, or I am using it incorrectly.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |