-
-
Notifications
You must be signed in to change notification settings - Fork 715
Ability to read PCAP files #283
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Thanks for the feedback. |
This is all based on spending about 15min looking at things. Feel free to tell me if I've missed something, or don't understand how things already work. Also, none of this is criticism. This is a slick tool. I think the charts and inspection would be useful. Things like traffic rate, network host, application protocol. These would be based on the sample that is read from the pcap file. It wouldn't have any realtime aspects associated (changing graphs, lists, etc), but would show the information in a time slice that equals the beginning-to-end of the capture.
The inspection window giving an overview of the list of packets is nice. Being able to drill into more details of a packet would be awesome, but that may be different (related) feature. |
Yeah, it's pretty much what I was thinking about, with the only difference that I had in mind to exclude charts.
This request has already been raised, but I prefer to keep it separate for the moment. |
Write of PCAP files has been implemented in #473. I was starting to work also on PCAP files read, but I've realised that there are some aspects I was neglecting that will require me more time, and that's the reason why I'm postponing the introduction of this feature to version 1.4. One of the aspects to keep in mind is that while reading PCAPs we don't have the knowledge about local IP addresses, so there is the need to completely change the approach used to identify traffic directionality. |
Quick update: I've tested setting |
If you were to use this tool on a campus network using a span/mirrored port, for example, it wouldn’t be hard for the network operator to map internal IPs that are NAT'ed to a virtual private IP address. For instance, consider a network with three users accessing YouTube:
A PCAP file capturing a connection to YouTube from User1 would contain packets like:
All subsequent packets in this TCP session would follow this source-destination structure. Now, consider a case where User1 is communicating with a game server over UDP:
Since UDP is connectionless, these packets exist independently and don’t rely on a handshake like TCP does. |
I recommend adding a function to extract all domains and IP v4 and V6 addresses to this function to make the work of security researchers more convenient. |
Describe the solution you'd like
it would be very nice to be able to read pcap files. This would allow troubleshooting of packers captured on other devices where this application doesn’t run.
Writing is also nice, but less important than reading.
The text was updated successfully, but these errors were encountered: